DORA regulation outlining process for identifying critical ICT third-parties published
It implements the specific assessment approach to be used by supervisory authorities and outlines fees payable by vendors designated as critical.
GRIP2 min read
GRIP2 min read
GRIP4 min read
EU DORA Del Reg - CTPP designation criteria
The assessment is to be targeted at the individual or group level as appropriate with subcontractors also evaluated.
The assessment criteria include:
DORA regulation outlining process for identifying critical ICT third-parties published
It implements the specific assessment approach to be used by supervisory authorities and outlines fees payable by vendors designated as critical.
Thomas Hyrkiel2 min read
Your DORA questions answered – CIFs
This third of a series of six articles covering a practical session organised by Ashurst focuses on critical or important functions.
Thomas Hyrkiel4 min read
Managing vendors supporting critical or important functions - from zero to full compliance with DORA
A summary of key practical steps based on the draft technical standard.
Thomas Hyrkiel, Katarzyna Parchimowicz5 min read
Technology
DORA regulation outlining process for identifying critical ICT third-parties published
Technology
Your DORA questions answered – CIFs
Technology
Managing vendors supporting critical or important functions - from zero to full compliance with DORA
Developments include: potential standardization of threat-led penetration testing, new oversight director for DORA and ESA's work program.
Nathaniel Lalone | Katten, Ciara McBrien | Katten3 min read
Although non-mandatory and applicable to regulated entities in Germany the practical guidance offers helpful insight into key aspects of the new regime.
Thomas Hyrkiel1 min read
Increasing reliance on digital platforms and a growing threat from bad actors means regulators are giving more attention to cybersecurity compliance.
The mass data breach of the infamous Ashley Madison website offers insight into data privacy and cybersecurity.
Alice Wallbank | Shoosmiths5 min read
A faulty code resulted in one of the most widespread tech outages in recent years for companies using Windows.
Julie DiMauro3 min read
The RTSs focus on ICT-incident reporting, ICT risk management and contractual relationships with third-parties supporting critical or important functions
Thomas Hyrkiel1 min read
How mandatory contract provisions under DORA map to existing regulatory regimes in respect of outsourcing arrangements and highlighting some of the gaps.
Ashurst Partner Bradley Rice addressed some of the key practical challenges of DORA at Global Relay’s gathering of compliance professionals.
Thomas Hyrkiel4 min read