The Digital Operational Resilience Act (DORA) aims to enhance digital resilience within the financial system. The regulation requires all companies to prepare for various types of ICT risks and threats. One of the key obligations under DORA is to train employees and members of the governing body to recognize and prevent these threats effectively.
DORA Article 5, paragraph 4, stipulates:
Members of the management body of the financial entity shall actively maintain sufficient knowledge and skills to understand and assess ICT risks and their impact on the operations of the financial entity, including by regularly attending specific training sessions proportionate to the ICT risks being managed.
Training overview
The DORA training covers all topics relevant for senior management, including the relationship between DORA and other regulations, the five pillars of DORA, and the specific requirements for management. As part of the preparation, participants will complete Cyber Security and DORA Awareness modules included in the training.
Tailor-made
On this page, you can find more information about our standard DORA training for decision-makers. We can also tailor this training to meet your organization’s specific needs.
Contact us for more information about a tailor-made training or planning an in-company session.
Planning
The training is held at locations in Amsterdam (IJburg) or Driebergen. The training is available in both Dutch and English.
Target audience
Members of the management body as defined by DORA and other senior management responsible for ICT risk management implementation.
Prerequisites
Participants should have prior knowledge of Cyber Security and DORA regulations, as covered in the e-learning modules. If this knowledge is insufficient, both e-learnings will be included as preparation for the session. This background knowledge will be assumed during the training.
Objectives
The training focuses on equipping senior management with the knowledge required to comply with the requirements outlined in Article 13, paragraph 6 of DORA. By the end of the training, participants will be able to answer the following questions:
What are the five pillars of DORA?
What responsibilities does senior management have in complying with DORA regulations?
How does DORA relate to other regulations and good practices?
Where should the organization currently stand regarding ICT risk management, and what steps should be taken next?
What pitfalls exist in daily practice, and how can they be avoided?
How can you ensure ICT risk management works effectively in practice?
The training focuses on equipping senior management with the knowledge required to comply with the requirements outlined in Article 13, paragraph 6 of DORA.
Structure
The training combines theoretical introductions with short interactive exercises, each followed by a group discussion.
Certification
Participants will receive a certificate upon active completion of the training.
Study Load
The DORA training lasts 3 hours. The study load for the e-learnings is 1–2 hours for Cyber Security Awareness and 2–3 hours for DORA Awareness.
Pricing
The price per participant is €650, VAT-exempt under the CRKBO registration of Projective Group NL B.V. For an in-company program, we are happy to provide a tailor-made quote.
Why this DORA training?
Developed by Projective Group’s DORA specialists
Comply with the requirements of DORA article 13 paragraph 6
Tailor-made training for your organization
In-company
This training program can also be delivered in-company, for example, with an entire team or department at once. We are happy to tailor the program to your organization to ensure the content aligns with your specific situation. For more information about start dates and customized options, feel free to contact us.
We use technologies such as cookies to store and/or access device information. We do this to enhance the browsing experience and to show (non-)personalized ads. By giving consent to these technologies we may process data such as browsing behavior or unique IDs on this site. If you do not give consent or withdraw your consent, this may negatively impact certain functions and features.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service expressly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences not requested by the subscriber or user.
Statistics
De technische opslag of toegang die uitsluitend voor statistische doeleinden wordt gebruikt.The technical storage or access used solely for anonymous statistical purposes. Without a subpoena, voluntary compliance by your Internet Service Provider, or additional data from a third party, information stored or retrieved solely for this purpose usually cannot be used to identify you.
Marketing
The technical storage or access is necessary to create user profiles for sending advertising or to track the user on a site or across different sites for similar marketing purposes.