Der er dog stadig mange usikkerheder vedrørende DORA, og om hvem der nøjagtigt falder ind under dens anvendelsesområde? Og vigtigst af alt om, hvordan du implementerer dens krav, der påvirker dine tredjeparts risikostyrings- og hændelsesresponsprogrammer. Det er her, vores download af guiden til operationelle risici er her for at hjælpe.Vi har arbejdet med for at give dig denne DORA-overholdelsesvejledning, så du har alt hvad du behøver for at besvare alle dine DORA-relaterede spørgsmål og sikre, at du ved, hvad du skal gøre.
The supply chain threat landscape is evolving rapidly & traditional defences aren't keeping pace. This landmark study provides a comprehensive analysis of the supply chain security risk landscape facing the UK in 2025, based on data collected from over 500 cybersecurity professionals as well as proprietary risk insights.
36.8% of UK cyber security professionals identified the lack of visibility into supply chain dependencies as a key shortcoming
While 34.8% regard the lack of collaboration and information sharing with industry peers as a key shortcoming
62% organisations said that their TPRM function either only occasionally or rarely collaborate with their industry peers
Denne vejledning indeholder alt fra hvorfor du skal bekymre dig, til hovedsøjlerne i DORA, og hvilke organisationer uden for EU, der falder ind under dens ansvarsområde.
DORA lægger stor vægt på IKT-tredjeparts risikostyring. Denne hvidbog beskriver alt, hvad du behøver at vide om, hvordan DORA påvirker TPRM.
Dette dokument giver dig en køreplan, der oversætter lovgivningssprog til specifikke trin, der kan gøres til handling. Vi giver dig et nyttigt resumé af hver af de regulatoriske tekniske standarder.
What you’ll learn: Why supply chains have become the attacker’s easiest entry point — and how the threat landscape is rapidly changing. This chapter unpacks the frequency of attacks, and provides insides into the threat perception among UK cyber security professionals as well as which aspects of their supply chain they feel are most exposed.
What you’ll learn: Why traditional TPRM approaches based on manual processes are struggling to keep pace with the evolving threat landscape. This section digs into the biggest shortcomings flagged by UK cyber pros: lack of monitoring, poor visibility, and limited collaboration.
What you’ll learn: Why seeing beyond your tier-one suppliers is critical, and how concentration risk and hidden dependencies can cause cascading disruption across entire sectors. This chapter explores how greater visibility supports resilience and aligns with regulatory expectations.
What you’ll learn: How collaboration across organisations can uncover systemic risks, enables burden sharing, and helps build more resilient sectors. This section highlights the benefits of breaking down silos in third-party risk management.
This report is essential reading for CISOs, risk managers, supply chain leaders, and anyone responsible for securing third-party ecosystems. It offers an unfiltered view into how over 500 UK cyber security and risk professionals perceive the growing threat from supply chain attacks and what they’re doing about it.
You’ll uncover why traditional, siloed TPRM approaches are no longer enough, and how a more collaborative model is already taking shape in highly regulated industries.
The report also explores how deeper collaboration between organisations is enabling enhanced visibility across supply chains, revealing hidden dependencies and previously undetected systemic risks that could affect entire sectors. If you have any questions click here to get in contact with the team.