Cyber Profiles at hand
IN A NUTSHELL…
“Cyber Profiles at hand” IS FOR COMPANIES THAT STRUGGLE TO FIND THE APPROPRIATE CYBER SECURITY CONSULTANTS
The lack of consultants with Cyber Security skills is a worldwide problematic observation.
Technologies evolve quickly, and Cyber threats follow the same evolving trend
The landscape of Cyber attacks expands every year
The necessary compliance to more and more regulations
ssociated with each DOReAdy item
"ONE LOOK IS WORTH A THOUSAND WORDS" (FRED R. BARNARD)
* * *
"ONE LOOK IS WORTH A THOUSAND WORDS" (FRED R. BARNARD) * * *
Example from the DOReAdy Methodology Matrix
Here is an example of the “Testing” category related to Risk. The Testing category contains multiple themes, including one called “Framework”, which contains the greatest number of DOReAdy items and is consequently the most important theme to implement. The DOReAdy item #119 is listed under this “Framework” theme.
Now using the mapping table, you can easily retrieve the DOReAdy item #119, the associated exact words from the DORA text, as well as be able to retrieve the chapter, article, and paragraph where these words are located in the text.

The contents of the DOReAdy Methodology Matrix are made available through our secured DOReAdy Member Site.
"EITHER WRITE SOMETHING WORTH READING, OR DO SOMETHING WORTH WRITING" (BENJAMIN FRANKLIN)
* * *
"EITHER WRITE SOMETHING WORTH READING, OR DO SOMETHING WORTH WRITING" (BENJAMIN FRANKLIN) * * *

PUBLISHED CYBERSEC AT HAND’s CONSULTATION FOR GOVERNMENTAL ORGANIZATIONS
The linked document is a public consultation by the European Supervisory Authorities in which CYBERSEC AT HAND participated regarding the second batch of the Digital Operational Resilience Act (DORA)’s RTS and ITS. It addresses the following:
the content of the notification and reports for major incidents and significant cyber threats
determining the time limits for reporting major incidents
the standard forms, templates and procedures for financial entities to report a major incident
the standard forms, templates and procedures for financial entities to notify a significant cyber threat