EU DORA Audit Readiness

AUD-24 – ICT Incident Reporting

ICT Incident Reporting translates DORA expectations into practical audit steps that teams can execute and evidence. You will learn what supervisors typically test, how to scope audits to critical services and dependencies, and how to document conclusions with defensible evidence. The course is designed for auditors, risk owners, and control functions who need repeatable, inspection-ready […]

AUD-24 – ICT Incident Reporting Read More »

AUD-19 – Network Security and Segmentation Audit

Network Security and Segmentation Audit translates DORA expectations into practical audit steps that teams can execute and evidence. You will learn what supervisors typically test, how to scope audits to critical services and dependencies, and how to document conclusions with defensible evidence. The course is designed for auditors, risk owners, and control functions who need

AUD-19 – Network Security and Segmentation Audit Read More »

AUD-12 – ICT Asset Identification and Classification

ICT Asset Identification and Classification translates DORA expectations into practical audit steps that teams can execute and evidence. You will learn what supervisors typically test, how to scope audits to critical services and dependencies, and how to document conclusions with defensible evidence. The course is designed for auditors, risk owners, and control functions who need

AUD-12 – ICT Asset Identification and Classification Read More »

AUD-15 – ICT Change Management

ICT Change Management translates DORA expectations into practical audit steps that teams can execute and evidence. You will learn what supervisors typically test, how to scope audits to critical services and dependencies, and how to document conclusions with defensible evidence. The course is designed for auditors, risk owners, and control functions who need repeatable, inspection-ready

AUD-15 – ICT Change Management Read More »

AUD-16 – Information Security Policy Audit

Information Security Policy Audit translates DORA expectations into practical audit steps that teams can execute and evidence. You will learn what supervisors typically test, how to scope audits to critical services and dependencies, and how to document conclusions with defensible evidence. The course is designed for auditors, risk owners, and control functions who need repeatable,

AUD-16 – Information Security Policy Audit Read More »

AUD-18 – Privileged Access and Key Management Audit

Privileged Access and Key Management Audit translates DORA expectations into practical audit steps that teams can execute and evidence. You will learn what supervisors typically test, how to scope audits to critical services and dependencies, and how to document conclusions with defensible evidence. The course is designed for auditors, risk owners, and control functions who

AUD-18 – Privileged Access and Key Management Audit Read More »

Shopping Cart
  • Your cart is empty.
The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.
Scroll to Top