On December 2022, the regulation (EU) 2022/2554 on Digital Operational Resilience for the financial sector was published in the Official Journal of the European Union. Also known as Digital Operational Resilience Act (DORA), the regulation intends to harmonise rules regarding digital resilience in the financial sector across all member states.
This training is about understanding the implications of DORA and how your organisation will be impacted from business, compliance, governance, operational and IT perspectives.
This training will provide you an overview of the main provisions and the difference with the existing Information and Communication Technologies (ICT) regulatory framework.
15 February 2024 (EN) - 9am-11am - On site
Price: 390.00 €
Duration: 2h
Language: Available in English and French
Number of participants: max. 15
By the end of this training, participants will be able to understand:
Target audience
This course essentially (but not only) addresses to:
This training is coordinated by Michael Horvath and Koen Maris, Partners at PwC Luxembourg.
Michael has acquired a strong financial and regulatory audit as well as advisory background and significant experience leading projects in the asset management sphere.
In the recent past, Michael has been particularly involved in various regulatory projects related to the implementation of the EU regulatory framework for sustainable finance (i.e. SFDR, taxonomy regulation, CSRD) at entity and product level. Michael is involved in various other regulatory projects for clients, from DORA, AML/CFT regulation over CSSF circular 18/698 to MICA.
Koen is partner at PwC Luxembourg, leading the Cyber Security practice with more than 20 years of experience in information/cyber security in cross industry environments.
Koen is specialised in Secure Operations Centers, incident response and awareness raising at all levels of an organisation. He has experience with Distributed Ledger Technology, IoT, OT/IT security, threat intelligence and forensics. Koen has a strong technical background and operational experience in cyber security as well as strong competencies in security architecture, solution design, program management, business development.