{"id":54468,"date":"2024-12-17T12:00:40","date_gmt":"2024-12-17T11:00:40","guid":{"rendered":"https:\/\/www.usd.de\/?p=54468"},"modified":"2024-12-17T12:00:43","modified_gmt":"2024-12-17T11:00:43","slug":"dora-countdown-one-month-left-until-deadline","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/dora-countdown-one-month-left-until-deadline\/","title":{"rendered":"DORA Countdown: One Month Left Until the Deadline"},"content":{"rendered":"\n<p><strong>DORA<\/strong>, the <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022R2554&amp;qid=1673554022989\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Operational Resilience Act<\/a>, will fully apply as of 17 January 2025. The EU regulation requires that all regulated financial institutions implement the listed requirements for internal processes and systems and ensure that their third-party ICT service providers do the same. The approaching deadline in addition to the regular year-end business is most likely causing sleepless nights for some information security managers. They are asking themselves: How can they make the most of the short time left until 17 January 2025? Which steps are practical \u201cquick wins\u201d? What measures are \u201cmust-haves\u201d for the first supervisory review?<\/p>\n\n\n\n<p>To help you find the right answers, we have summarized everything you need to know from our news blog:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Everything you need to know in compact form<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/7-questions-on-dora\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-AG-7-questions-on-digital-operational-resilience-act-dora-1024x589.jpg\" alt=\"\" class=\"wp-image-41895\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/7-questions-on-dora\/\">Digital Operational Resilience Act (DORA): The 7 Most Important Questions<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DORA &amp; NIS-2<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/nis-2-and-dora-why-two-pieces-of-eu-legislation\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-AG-EU-NIS-2-vs-DORA-1024x589.jpg\" alt=\"\" class=\"wp-image-44847\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/nis-2-and-dora-why-two-pieces-of-eu-legislation\/\">NIS-2 and DORA: Why Two Pieces of EU Cybersecurity Legislation?<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Thread-Led Penetration Testing (TLPT)<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/dora-deep-dive-threat-led-penetration-testing-tlpt\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/threat-led-penetration-testing-tlpt-usdAG-1024x589.jpg\" alt=\"\" class=\"wp-image-49357\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/dora-deep-dive-threat-led-penetration-testing-tlpt\/\">DORA Deep Dive: Threat-Led Penetration Testing (TLPT)<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">RTS &amp; ITS<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/dora-new-batch-of-rts-and-its\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-dora-rts-its-en-1024x589.jpg\" alt=\"\" class=\"wp-image-51199\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/dora-new-batch-of-rts-and-its\/\">DORA Requirements Become More Concrete: Further RTS and ITS Published<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Obligation to report ICT-related incidents<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/dora-reporting-ict-related-incidents\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-news-dora-deep-dive-reporting-1024x589.jpg\" alt=\"Person holds a telephone to the reader and next to it is the title of the article.\" class=\"wp-image-52488\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/dora-reporting-ict-related-incidents\/\">DORA Deep Dive: Reporting of ICT-Related Incidents<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">We take the next steps with you<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/dora-5-tips-on-what-to-consider-during-planning\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/usd-ag-dora-1024x589.jpg\" alt=\"DORA\" class=\"wp-image-31852\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/dora-5-tips-on-what-to-consider-during-planning\/\">Are You Ready for DORA? If Not, Here\u2019s 5 Tips on What to Consider during Planning<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.usd.de\/en\/dora-preparation-in-3-steps\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/news-usd-ag-dora-vorbereitung-1024x589.jpg\" alt=\"\" class=\"wp-image-47669\" style=\"object-fit:cover\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p><a href=\"https:\/\/www.usd.de\/en\/dora-preparation-in-3-steps\/\">Setting off for DORA \u2013 Your Preparation in 3 Steps<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>Do you have further questions about DORA or need specific support with implementation in your company? <a href=\"https:\/\/www.usd.de\/en\/contact-form-security-consulting\/\">Get in touch.<\/a> We will be happy to assist you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.<\/p>\n","protected":false},"author":91,"featured_media":54460,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[410,373],"tags":[11653,8179,3971,3972,5700,11654,10958,10956,10866,8192,8180,10957,5702,5703,5653],"class_list":["post-54468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-financial-sector-compliance-en","category-news-en","tag-best-practices-2","tag-digital-operation-resilience-act-dora-en","tag-digital-operational-resilience-act-2","tag-dora-2","tag-dora-en","tag-dora-implementation","tag-dora-preparation","tag-dora-requirements","tag-dora-anforderungen-en","tag-eu-regulation","tag-eu-verordnung-en","tag-ict-2","tag-ikt-en","tag-risikomanagement-en","tag-risk-management-2"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/54468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=54468"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/54468\/revisions"}],"predecessor-version":[{"id":54511,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/54468\/revisions\/54511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/54460"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=54468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=54468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=54468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}