DORA Preparation Checklist
For a personalized session to review the DORA Preparation Checklist with your firm, click the button below to contact us.
We’ll reach out to schedule a free 30-minute review.
Contact UsWhat’s Included
Policies and procedures, staff awareness training, internal controls, governance, reporting, and the protections around personally identifiable information are included in DORA.
The DORA Preparation Checklist covers what is outlined in the EU regulation, including:
Information and Communication Technology (ICT) Risk Management includes continuous evaluation of cybersecurity policies, identifying critical function gaps, and improving strategies ensures robust protection for ICT assets and offline infrastructure.
Under DORA, firms must assess reporting capabilities, classify Information and Communication Technology (ICT) incidents, and streamline processes to ensure efficient incident identification and reporting.
Conduct diverse tests—vulnerability assessments, penetration tests, scenario-based tests—to meet compliance ahead of the deadline, ensuring independence and risk mitigation.
Engage with third parties to assess and enhance risk management practices, ensuring security of internal and external systems for operational resilience.
Start sharing threat information now—DORA encourages collaboration among financial entities and regulators. Join organizations like FS-ISAC, CiSP, or connect directly through Drawbridge.