DORA is coming. Are you ready? The Openli Community is thrilled to welcome back renowned privacy and cybersecurity expert Stewart Room, Global Head of Data Protection & Cyber Security at DWF, for a highly requested masterclass on the EU's Digital Operational Resilience Act (DORA). 🗓️ Date: June 05, 2024 ⏰ Time: 03:00 PM Europe/Copenhagen In this session, Stewart Room will: ➡ Introduce you to DORA: Learn about its purpose, scope, and key elements, including its interaction with the NIS2 directive. ➡ Prepare for Compliance: Discover how in-house legal and privacy teams can best prepare for DORA compliance. ➡ Take Action: Understand the steps you need to take today to be ready for the January 2025 deadline. ➡ Engage in Q&A: Get answers to your most pressing questions during the Q&A session. If your company is in the financial sector or provides any data/digital services to this sector, this is an event you don't want to miss! 🔗 https://lnkd.in/eDyMcZDr #DORA #CyberSecurity #DataProtection #OpenliCommunity
Openli’s Post
More Relevant Posts
-
Want to know how #DORA links in with #NIS2, the wider EU legislative framework for #cybersecurity and international standards for security operational best practice? Of course you do! If so, join me on Wednesday 5th June for my next webinar with Openli. Details below. 👇
DORA is coming. Are you ready? The Openli Community is thrilled to welcome back renowned privacy and cybersecurity expert Stewart Room, Global Head of Data Protection & Cyber Security at DWF, for a highly requested masterclass on the EU's Digital Operational Resilience Act (DORA). 🗓️ Date: June 05, 2024 ⏰ Time: 03:00 PM Europe/Copenhagen In this session, Stewart Room will: ➡ Introduce you to DORA: Learn about its purpose, scope, and key elements, including its interaction with the NIS2 directive. ➡ Prepare for Compliance: Discover how in-house legal and privacy teams can best prepare for DORA compliance. ➡ Take Action: Understand the steps you need to take today to be ready for the January 2025 deadline. ➡ Engage in Q&A: Get answers to your most pressing questions during the Q&A session. If your company is in the financial sector or provides any data/digital services to this sector, this is an event you don't want to miss! 🔗 https://lnkd.in/eDyMcZDr #DORA #CyberSecurity #DataProtection #OpenliCommunity
DORA - what to know and how to best prepare?
video.openli.com
To view or add a comment, sign in
-
Ready to take charge in auditing digital resilience? 📖 Explore the Certified DORA Lead Auditor (C DORA LA) and understand how it equips you to lead assessments in information security, cyber threats, and data privacy. Uncover the insights and become a pivotal force in ensuring robust digital operational resilience. 🔑 You can find out more 👉 https://lnkd.in/d5cbN6Wz Book an Online@Home Exam 👉 https://lnkd.in/d5cbN6Wz #IBITGQ #DORAexam #InformationSecurity
To view or add a comment, sign in
-
-
Definitions matter. Take the proposed EU Cyber Resilience Act, which for the most part has good requirements in it. However, it has one section that requires companies to notify governments within 24 hours of discovering that vulnerability in one their products is being exploited. Wait, you ask, how can that be bad? If it's being exploited by the bad guys, shouldn't governments know? The answer is that the definition of "exploited" includes way more than the malicious use of vulnerability, going so far as to include research activity. If a vuln is being exploited in the wild by malicious actors to do bad things, telling governments isn't a bad thing. By that point, the information is out there. But before that point? Well, you can read this letter from the Center for Cybersecurity Policy and Law, backed by some real cyber luminaries, for how that requirement could go wrong. https://lnkd.in/eh4U6FcH #cybersecurity #responsibledisclosure
Joint Letter of Experts on CRA and Vulnerability Disclosure
centerforcybersecuritypolicy.org
To view or add a comment, sign in
-
For government entities, protecting sensitive data is not just a priority—it's a legal obligation. With the increasing frequency of cyber threats, ensuring the integrity and security of government information is non-negotiable. We believe connectivity service providers should go the extra mile when it comes to accountability for information security. By partnering with Orion Satellite Systems, who recently achieved ISO 27001 Certification, government businesses and organisations can rest assured that their connectivity provider complies with a global standard of data security. Our blog outlines the importance of this certification in key suppliers. Take a look at it here: https://lnkd.in/gBN6gwXw #SatelliteConnectivityExperts #ISO27001 #Certification #Government
To view or add a comment, sign in
-
-
Data protection is a multifaceted endeavor that requires a proactive and comprehensive approach to safeguard sensitive information in an increasingly interconnected world. By understanding the common threats, implementing best practices, and staying abreast of emerging trends, individuals and organizations can strengthen their defenses and mitigate the risks posed by cyber threats, ensuring the integrity, confidentiality, and availability of their data assets. #dataprotection https://bit.ly/3Nz138X
To view or add a comment, sign in
-
Did you know that many companies remain non-operational for days, weeks, and sometimes even months following a hack? 😱 The new European directive for Network and Information Security (NIS2) is imminent and will come into effect from October. This directive aims to bolster the resilience of essential services and digital service providers against cyber attacks. 𝗕𝘂𝘁 𝘄𝗵𝗮𝘁 𝗱𝗼𝗲𝘀 𝘁𝗵𝗶𝘀 𝗺𝗲𝗮𝗻 𝗳𝗼𝗿 𝘆𝗼𝘂𝗿 𝗰𝗼𝗺𝗽𝗮𝗻𝘆? NIS2 not only mandates reporting cyber incidents but also requires the implementation of appropriate security measures. As a company, it's crucial to take proactive steps and not wait until the legislation is enforced. Patrick Hauspie from VLAIO shares invaluable insights to safeguard your business and secure financial assistance through the Flemish government and the Cyber Fundamentals Framework of the Centre for Cybersecurity Belgium.
To view or add a comment, sign in
-
The parliament gave the green light last week to transpose the new European directive on cybersecurity, or the #NIS2 directive, into national legislation. Companies in 18 sectors deemed essential for the economy, with more than 50 employees and an annual turnover of 10 million euros, are now required to adequately protect themselves against hackers. Furthermore, there is now an obligation to report cyber incidents to the CCB, the Belgian Center for Cybersecurity. Failure to comply with the regulations risks heavy penalties of up to 10 million euros. At Secutec, we've got you covered! 🛡️The Secutec #SecureDNS solution safeguards your network and data from threats originating from unsecured DNS connections. 🛡️Secutec #SecureSIGHT offers full Threat Intelligence as a managed service. Our Security Operations Centre (SOC) gathers attack data, provides detailed reports, and offers actionable insights, ensuring your organization stays protected. More info 👉 www.secutec.eu
To view or add a comment, sign in
-
-
Explore the evolution of safeguarding your Digital Assets against the relentless tide of cyber threats. Delve into Yuri Bobbert's expertise on why traditional defences are becoming inadequate and why embracing zero-trust strategies is the key to lasting security. This article, featured in AG Connect, (in Dutch) unravels the profound transformation taking place. Within these pages, Yuri Bobbert explains, based on 6 years of research in this field, the four truths of the Zero Trust paradigm and the five critical steps to its implementation. Witness how Zero Trust's significance extends beyond mere data protection and at the same time assures your digital assets. Are you curious to learn more or eager to share your viewpoints? Join the conversation in the comments section. #ZeroTrust #Dataprotection #DigitalAssets
To view or add a comment, sign in
-
New article from my colleague Ali Vaziri on the new Memorandum of Understanding (MoU) between the ICO and the NCSC and the framework it sets out for cooperation and information sharing between the two authorities. #dataandprivacy #cyber #ICO #NCSC #dataprotection #cybersecurity
What does the new ICO and NCSC cybersecurity MoU mean in practice, including on information sharing? (via Passle)
dataprivacy.lewissilkin.com
To view or add a comment, sign in
-
Protecting sensitive data is crucial in today's digital world, especially in unified communications. 📞☎️📱 Through the implementation of robust security measures, organizations can safeguard their information from cyber threats and unauthorized access. 💻🔐 If a gap exists in one channel, there is a greater risk to others. Don't take risks with data - prioritize security at all levels! The Barrington team has unified communications and privacy experts who can assist your organization with its telephony and information security needs. Reach out to them today! 👇 https://ow.ly/Iliu50Qzzbu #UnifiedCommunications #UC #SecureCommunication #DataProtection #Consulting
To view or add a comment, sign in
-
Head of Legal by day. Legal community builder and moderator by night.
2moLooking forward to this event!