Final steps to DORA compliance – Technical Standards Batch 2

WEBINAR ON DEMAND | FINANCIAL SECTOR

Watch the replay of this engaging webinar about the latest DORA Regulatory Technical Standards: Batch 2. If you work in the financial sector, this is something you'll want to know more about. We look at what these new EU cybersecurity standards for financial organizations mean, and how you can apply them in your organization.

Keypoints in this webinar:

  • New rules for incident reporting (almost identical to NIS2, with some extra requirements)
  • Technical standards for Threat Led Penetration Testing
  • What do critical suppliers in the financial sector need to prove cybersecurity?

Peter Rozier from Bureau Veritas Cybersecurity and Jelmer Noordam from CC Security discuss the keypoints of DORA RTS 2. They explain how to put these processes and procedures into place. This webinar is about giving you useful information that you can start using immediately.

WATCH THE REPLAY

Intended Audience

This webinar is designed for C-level management, Chief Information Security Officers, Information Security Officers, Compliance Officers, and IT Management in financial organizations and suppliers to financial organizations in the world.

WHAT YOU WILL LEARN

  1. Keypoints of the latest batch of DORA Regulatory Technical Standards, published on 17 July.
  2. Interpretation of the latest standards and how to put them into practice.
  3. Stories from the field, especially smaller firms and suppliers suffer from the compliance burden.
  4. Details on the new rules for incident reporting.
  5. Details on the new requirements for threat led penetration testing.
  6. What kind of proof do smaller suppliers need? ISAE 3402 is quite rigorous, and most chain partners don't have it.

WATCH THE REPLAY

ABOUT THE SPEAKERS

Peter Rozier, Teamlead Finance at Bureau Veritas Cybersecurity

Experienced Professional at Bureau Veritas Cybersecurity, with an extensive background in Operational and Information Risk Management, Information Security, Internal Control Advisory and IT Security Testing. My focus is on advising the Financial Service Industry by translating technical matters to the Boardroom and helping organizations build or strengthen their security and risk frameworks. Raising security awareness by delivering boardroom trainings on NIS2/DORA and supporting our clients as interim CISO. At Bureau Veritas Cybersecurity I am also leading the ethical hackers team for the Financial sector.

Jelmer Noordam, Information Security Consultant, CC Security

Jelmer Noordam is a distinguished Cybersecurity Consultant at CC Security, specializing in Cybersecurity Governance, Risk Management, and Compliance, with a particular emphasis on compliance with the worldan Union regulations. His expertise extends to privacy and AI risk management and compliance. Jelmer is currently leading projects to ensure organizational compliance with the Digital Operational Resilience Act (DORA). Additionally, he regularly provides cybersecurity training to executives and employees and has authored multiple papers on DORA and the AI Act.

CONTACT US FOR MORE INFORMATION

Would you like to have more information on how we can help you with DORA Compliance? Please fill out the form and we will contact you within one business day.

USP

Why choose Bureau Veritas Cybersecurity

Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.

We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.