Episode 3: PanDORA’s box
Jimi Piggott-Bader, Bas Jennen and Leonard van den Ende summarise the DORA rules for reporting incidents and significant cyber threats.
Leonard van den Ende: “DORA now prescribes that you have specific processes for identifying, tracking and logging ICT-related incidents.”
To download a copy of the guide, visit our website.
Information
- Show
- FrequencyUpdated weekly
- Published25 April 2024 at 11:02 UTC
- Length10 min
- Season1
- Episode3
- RatingClean