
Sign up to save your podcasts
Or


Jimi Piggott-Bader, Bas Jennen and Leonard van den Ende summarise the DORA rules for reporting incidents and significant cyber threats.
Leonard van den Ende: “DORA now prescribes that you have specific processes for identifying, tracking and logging ICT-related incidents.”
To download a copy of the guide, visit our website.
By LinklatersJimi Piggott-Bader, Bas Jennen and Leonard van den Ende summarise the DORA rules for reporting incidents and significant cyber threats.
Leonard van den Ende: “DORA now prescribes that you have specific processes for identifying, tracking and logging ICT-related incidents.”
To download a copy of the guide, visit our website.

394 Listeners

694 Listeners

5 Listeners

654 Listeners

3,558 Listeners

2,156 Listeners

973 Listeners

679 Listeners