Cyber Profiles at hand

IN A NUTSHELL…

“Cyber Profiles at hand” IS FOR COMPANIES THAT STRUGGLE TO FIND THE APPROPRIATE CYBER SECURITY CONSULTANTS

The lack of consultants with Cyber Security skills is a worldwide problematic observation.

  • Technologies evolve quickly, and Cyber threats follow the same evolving trend

  • The landscape of Cyber attacks expands every year

  • The necessary compliance to more and more regulations

      • ssociated with each DOReAdy item

"ONE LOOK IS WORTH A THOUSAND WORDS" (FRED R. BARNARD)

* * *

"ONE LOOK IS WORTH A THOUSAND WORDS" (FRED R. BARNARD) * * *

Example from the DOReAdy Methodology Matrix

Here is an example of the “Testing” category related to Risk. The Testing category contains multiple themes, including one called “Framework”, which contains the greatest number of DOReAdy items and is consequently the most important theme to implement. The DOReAdy item #119 is listed under this “Framework” theme.

Now using the mapping table, you can easily retrieve the DOReAdy item #119, the associated exact words from the DORA text, as well as be able to retrieve the chapter, article, and paragraph where these words are located in the text.

The contents of the DOReAdy Methodology Matrix are made available through our secured DOReAdy Member Site.

"EITHER WRITE SOMETHING WORTH READING, OR DO SOMETHING WORTH WRITING" (BENJAMIN FRANKLIN)

* * *

"EITHER WRITE SOMETHING WORTH READING, OR DO SOMETHING WORTH WRITING" (BENJAMIN FRANKLIN) * * *

PUBLISHED CYBERSEC AT HAND’s CONSULTATION FOR GOVERNMENTAL ORGANIZATIONS

The linked document is a public consultation by the European Supervisory Authorities in which CYBERSEC AT HAND participated regarding the second batch of the Digital Operational Resilience Act (DORA)’s RTS and ITS. It addresses the following:

  • the content of the notification and reports for major incidents and significant cyber threats

  • determining the time limits for reporting major incidents

  • the standard forms, templates and procedures for financial entities to report a major incident

  • the standard forms, templates and procedures for financial entities to notify a significant cyber threat