{"id":16229,"date":"2024-05-16T08:54:50","date_gmt":"2024-05-16T08:54:50","guid":{"rendered":"https:\/\/dpoassociates.eu\/dora\/"},"modified":"2025-02-10T12:52:33","modified_gmt":"2025-02-10T12:52:33","slug":"dora-implementation","status":"publish","type":"page","link":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/","title":{"rendered":"DORA"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16229\" class=\"elementor elementor-16229 elementor-16112\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7d189ef elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d189ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58672d3b\" data-id=\"58672d3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-285d23b0 elementor-widget elementor-widget-heading\" data-id=\"285d23b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><b>What Is DORA and Why?  <\/b><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-300b7437 elementor-widget elementor-widget-text-editor\" data-id=\"300b7437\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><div><div><div dir=\"auto\" data-testid=\"conversation-turn-5\" data-scroll-anchor=\"true\"><div><div><div><div><div><div dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"cfc56e72-0e2c-4730-978f-3eeb0c932861\"><div><div><p style=\"text-align: center;\"><span style=\"font-family: var(--uicore-typography--p-f,'Inter'); font-style: var(--uicore-typography--p-st,'normal'); letter-spacing: var(--uicore-typography--p-ls,'-0.027em'); text-transform: var(--uicore-typography--p-t,'none');\"> <\/span><\/p><p style=\"text-align: center;\"><span style=\"font-family: var(--uicore-typography--p-f,'Inter'); font-style: var(--uicore-typography--p-st,'normal'); letter-spacing: var(--uicore-typography--p-ls,'-0.027em'); text-transform: var(--uicore-typography--p-t,'none');\"> <\/span><span style=\"font-family: var(--uicore-typography--p-f,'Inter'); font-style: var(--uicore-typography--p-st,'normal'); letter-spacing: var(--uicore-typography--p-ls,'-0.027em'); text-transform: var(--uicore-typography--p-t,'none'); font-size: inherit;\">DORA (Digital Operational Resilience Act) targets all financial entities within the EU such as banks, insurance companies and investment funds with specific requirements regarding their digital operational resilience. The core of DORA includes ICT risk management, including cybersecurity, data governance and business continuity management.<\/span><\/p><p style=\"text-align: center;\"><span style=\"font-family: var(--uicore-typography--p-f,'Inter'); font-style: var(--uicore-typography--p-st,'normal'); letter-spacing: var(--uicore-typography--p-ls,'-0.027em'); text-transform: var(--uicore-typography--p-t,'none'); font-size: inherit;\"> <\/span><\/p><p style=\"text-align: center;\">With increasing interconnectedness and digitization in the financial sector, the risk of cyber attacks is also growing.<span style=\"text-decoration: underline; color: #33cccc;\">\n  <a style=\"color: #33cccc; text-decoration: underline;\" href=\"https:\/\/www.statista.com\/statistics\/1315805\/cyber-attacks-top-industries-worldwide\/\"> <b>Statista<\/b><\/a>\n<\/span> reported that the financial and insurance sector was one of the top targets for cybercriminals in 2022, highlighting its vulnerability to digital threats.<\/p><p style=\"text-align: center;\">\u2193<\/p><p style=\"text-align: center;\"> <\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b5b4330 elementor-widget elementor-widget-image\" data-id=\"5b5b4330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1400\" height=\"1071\" src=\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/05\/230704-glossary-dora-02.jpeg\" class=\"attachment-full size-full wp-image-16169\" alt=\"\" srcset=\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/05\/230704-glossary-dora-02.jpeg 1400w, https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/05\/230704-glossary-dora-02-300x230.jpeg 300w, https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/05\/230704-glossary-dora-02-1024x783.jpeg 1024w, https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/05\/230704-glossary-dora-02-768x588.jpeg 768w, https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/05\/230704-glossary-dora-02-650x497.jpeg 650w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e9287f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e9287f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a6ec75f\" data-id=\"1a6ec75f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26b5b7d1 elementor-widget elementor-widget-heading\" data-id=\"26b5b7d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><b>5 Important Elements Of DORA<\/b><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e482ce9 elementor-widget elementor-widget-toggle\" data-id=\"2e482ce9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7761\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-7761\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Risk Management<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7761\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-7761\"><p>Financial institutions should implement robust mechanisms for identifying, assessing, and mitigating ICT risks.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65b85414 elementor-widget elementor-widget-toggle\" data-id=\"65b85414\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1701\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1701\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Incident reporting<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1701\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1701\"><p>There should be a detailed process for reporting significant cyber incidents to relevant regulators.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ff93ba6 elementor-widget elementor-widget-toggle\" data-id=\"6ff93ba6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1871\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1871\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Digital Resilience Testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1871\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1871\"><p>Regular testing of digital infrastructure to verify resilience against various types of failures and attacks.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c64c19c elementor-widget elementor-widget-toggle\" data-id=\"7c64c19c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2081\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2081\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Third Party Management<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2081\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2081\"><p>Strict rules for managing the risks associated with outsourcing ICT services, including the requirement for contractual and audit rights.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90e6d0c elementor-widget elementor-widget-toggle\" data-id=\"90e6d0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1511\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1511\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Information and Communication Technology and Security<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1511\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1511\"><p>A framework for establishing a secure ICT environment, including adequate management of ICT assets, data integrity, and protection against data breaches.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26bf726 elementor-section-content-middle elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"26bf726\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1773ae69\" data-id=\"1773ae69\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b83b60b elementor-widget elementor-widget-heading\" data-id=\"4b83b60b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Request a Dora Audit!<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af45f6c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4af45f6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2513ccac elementor-widget elementor-widget-heading\" data-id=\"2513ccac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contact Info<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26791824 elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"26791824\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">info@dpoassociates.eu<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">legal@dpoassociates.eu<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-67a85f76\" data-id=\"67a85f76\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dd84694 elementor-widget elementor-widget-text-editor\" data-id=\"7dd84694\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Please fill out the form below and we will contact you as soon as possible!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25eafaa9 elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"25eafaa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width_tablet&quot;:&quot;100&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contact Form\" aria-label=\"Contact Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"16229\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"25eafaa9\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"What Is DORA And How Do You Comply? - DPO Associates%\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"16229\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-md-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tYour email\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_5057311 elementor-col-50 elementor-md-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_5057311\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tPhone Number\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_5057311]\" id=\"form-field-field_5057311\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Phone number\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_d6c1e2e elementor-col-50 elementor-md-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d6c1e2e\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tService Type\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_d6c1e2e]\" id=\"form-field-field_d6c1e2e\" class=\"elementor-field-textual elementor-size-md\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"GDPR Audit\">GDPR Audit<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"NIS2 Audit\">NIS2 Audit<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"ISO27001 Audit\">ISO27001 Audit<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"DORA Audit\">DORA Audit<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Cybersecurity maturity Assessment\">Cybersecurity maturity Assessment<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Service Type\">Service Type<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-field_71766c7 elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_71766c7\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-md\" name=\"form_fields[field_71766c7]\" id=\"form-field-field_71766c7\" rows=\"4\" placeholder=\"Additional\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_cc69bba elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_cc69bba\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tpermission\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_cc69bba]\" id=\"form-field-field_cc69bba\" class=\"elementor-field elementor-size-md  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_cc69bba\">I authorize DPOAssociates.eu to process my data.*<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons elementor-md-100\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Send<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<input\n                    class=\"apbct_special_field apbct_email_id__elementor_form\"\n                    name=\"apbct__email_id__elementor_form\"\n                    aria-label=\"apbct__label_id__elementor_form\"\n                    type=\"text\" size=\"30\" maxlength=\"200\" autocomplete=\"off\"\n                    value=\"\"\n                \/><\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b19dbe6 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b19dbe6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ffd168f\" data-id=\"3ffd168f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d441838 elementor-widget elementor-widget-heading\" data-id=\"6d441838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How to Comply with DORA.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7f272f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f272f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1f7c6ea8\" data-id=\"1f7c6ea8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-533a67b1 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"533a67b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDevelop risk management policies\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tFinancial institutions should begin developing comprehensive ICT risk management policies that encompass all aspects of digital operational resilience. These policies should be regularly reviewed and updated to meet the changing technological and threat landscapes.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3fd86f76\" data-id=\"3fd86f76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69be140c elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"69be140c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tImplementation of Strong Cybersecurity Measures\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tImplementing advanced cybersecurity technologies and practices is critical. This includes the use of firewalls, antivirus programs, intrusion detection systems, and regular security audits.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2125cb12\" data-id=\"2125cb12\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77f65e57 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"77f65e57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTraining and Awareness\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tRaising awareness and training staff in cybersecurity and digital resilience best practices is essential. Employees need to be aware of the potential risks and how they can help strengthen operational resilience.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5fa1f740 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fa1f740\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e6e98ce\" data-id=\"3e6e98ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13abb737 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"13abb737\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t  Testing and Recovery Planning\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tRegular testing of systems for resilience against failures and attacks helps identify vulnerabilities. In addition, it is essential to have an effective recovery plan that kicks in after an incident to ensure business continuity.\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-591968b6\" data-id=\"591968b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6564cf9d elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"6564cf9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tManagement of Third Parties\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tManaging relationships with third-party ICT service providers requires thorough due diligence and continuous monitoring. Contracts should contain clear and enforceable provisions regarding compliance with DORA requirements.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-657bace elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"657bace\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a11af4f\" data-id=\"a11af4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0321c4 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"d0321c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tInformation Exchange About Cyber-threads And Vulnerability\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOrganizations are required to submit three separate reports for critical incidents: an initial notification to notify authorities, an interim report on the progress of incident resolution, and a final report analyzing the root causes of the incident.\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-731d8efd elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"731d8efd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a42e745\" data-id=\"5a42e745\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5993845 elementor-widget elementor-widget-text-editor\" data-id=\"5993845\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 id=\"ep-5b2bfda0\" class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Hier typen...\"><span style=\"text-decoration: underline;\"><b>Start DORA Implementation Yourself!<\/b><\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e5d8a3 elementor-widget elementor-widget-text-editor\" data-id=\"2e5d8a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><strong>Leave your contact information and we&#8217;ll send you the DORA information registry!<\/strong><\/p><p style=\"text-align: center;\"><em>The information register is part of the third-party ICT risk management framework and enables financial entities to identify and assess risks related to contractual arrangements for the use of ICT services.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bc4bfb4 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"6bc4bfb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"16229\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"6bc4bfb4\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"What Is DORA And How Do You Comply? - DPO Associates%\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"16229\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCompany Name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_c47bf89 elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_c47bf89\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tPhone number\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_c47bf89]\" id=\"form-field-field_c47bf89\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Phone number (optional)\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-checkbox elementor-field-group elementor-column elementor-field-group-6ed25c0 elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field-subgroup  \"><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"I authorize DPOAssociates.eu to process my data. *\" id=\"form-field-6ed25c0-0\" name=\"form_fields[6ed25c0]\"> <label for=\"form-field-6ed25c0-0\">I authorize DPOAssociates.eu to process my data. *<\/label><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Form AAnquestions<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<input\n                    class=\"apbct_special_field apbct_email_id__elementor_form\"\n                    name=\"apbct__email_id__elementor_form\"\n                    aria-label=\"apbct__label_id__elementor_form\"\n                    type=\"text\" size=\"30\" maxlength=\"200\" autocomplete=\"off\"\n                    value=\"\"\n                \/><\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What Is DORA and Why? DORA (Digital Operational Resilience Act) targets all financial entities within the EU such as banks, insurance companies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12677,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","footnotes":""},"class_list":["post-16229","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is DORA And How Do You Comply? - DPO Associates%<\/title>\n<meta name=\"description\" content=\"Find out what DORA (Digital Operational Resilience Act) is and its specific requirements for financial entities within the EU. Learn about cybersecurity, data governance and business continuity management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA\" \/>\n<meta property=\"og:description\" content=\"Find out what DORA (Digital Operational Resilience Act) is and its specific requirements for financial entities within the EU. Learn about cybersecurity, data governance and business continuity management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/\" \/>\n<meta property=\"og:site_name\" content=\"DPO Associates\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100083400514207\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-10T12:52:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/\",\"url\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/\",\"name\":\"What Is DORA And How Do You Comply? - DPO Associates%\",\"isPartOf\":{\"@id\":\"https:\/\/dpoassociates.eu\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png\",\"datePublished\":\"2024-05-16T08:54:50+00:00\",\"dateModified\":\"2025-02-10T12:52:33+00:00\",\"description\":\"Find out what DORA (Digital Operational Resilience Act) is and its specific requirements for financial entities within the EU. Learn about cybersecurity, data governance and business continuity management.\",\"breadcrumb\":{\"@id\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#primaryimage\",\"url\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png\",\"contentUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png\",\"width\":1080,\"height\":1080,\"caption\":\"wat is CISO\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dpoassociates.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dpoassociates.eu\/en\/#website\",\"url\":\"https:\/\/dpoassociates.eu\/en\/\",\"name\":\"DPO Associates\",\"description\":\"Protect, Detect, Respond\",\"publisher\":{\"@id\":\"https:\/\/dpoassociates.eu\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dpoassociates.eu\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dpoassociates.eu\/en\/#organization\",\"name\":\"DPO Associates\",\"url\":\"https:\/\/dpoassociates.eu\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dpoassociates.eu\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png\",\"contentUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png\",\"width\":651,\"height\":651,\"caption\":\"DPO Associates\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100083400514207\",\"https:\/\/www.linkedin.com\/company\/dpo-associates-da\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is DORA And How Do You Comply? - DPO Associates%","description":"Find out what DORA (Digital Operational Resilience Act) is and its specific requirements for financial entities within the EU. Learn about cybersecurity, data governance and business continuity management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/","og_locale":"en_US","og_type":"article","og_title":"DORA","og_description":"Find out what DORA (Digital Operational Resilience Act) is and its specific requirements for financial entities within the EU. Learn about cybersecurity, data governance and business continuity management.","og_url":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/","og_site_name":"DPO Associates","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100083400514207","article_modified_time":"2025-02-10T12:52:33+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/","url":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/","name":"What Is DORA And How Do You Comply? - DPO Associates%","isPartOf":{"@id":"https:\/\/dpoassociates.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#primaryimage"},"image":{"@id":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#primaryimage"},"thumbnailUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png","datePublished":"2024-05-16T08:54:50+00:00","dateModified":"2025-02-10T12:52:33+00:00","description":"Find out what DORA (Digital Operational Resilience Act) is and its specific requirements for financial entities within the EU. Learn about cybersecurity, data governance and business continuity management.","breadcrumb":{"@id":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dpoassociates.eu\/en\/dora-implementation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#primaryimage","url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png","contentUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2023\/09\/Ontwerp-zonder-titel-239.png","width":1080,"height":1080,"caption":"wat is CISO"},{"@type":"BreadcrumbList","@id":"https:\/\/dpoassociates.eu\/en\/dora-implementation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dpoassociates.eu\/en\/"},{"@type":"ListItem","position":2,"name":"DORA"}]},{"@type":"WebSite","@id":"https:\/\/dpoassociates.eu\/en\/#website","url":"https:\/\/dpoassociates.eu\/en\/","name":"DPO Associates","description":"Protect, Detect, Respond","publisher":{"@id":"https:\/\/dpoassociates.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dpoassociates.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dpoassociates.eu\/en\/#organization","name":"DPO Associates","url":"https:\/\/dpoassociates.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dpoassociates.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png","contentUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png","width":651,"height":651,"caption":"DPO Associates"},"image":{"@id":"https:\/\/dpoassociates.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100083400514207","https:\/\/www.linkedin.com\/company\/dpo-associates-da\/"]}]}},"_links":{"self":[{"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/pages\/16229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/comments?post=16229"}],"version-history":[{"count":0,"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/pages\/16229\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/media\/12677"}],"wp:attachment":[{"href":"https:\/\/dpoassociates.eu\/en\/wp-json\/wp\/v2\/media?parent=16229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}