DORA

Frequently Asked Questions

What Is DORA?

The Digital Operations Resilience Act (DORA) is a piece of EU legislation relating to the cyber security and digital of financial institutions...

Read more

Which Organisations Does DORA Apply to?

DORA is applicable to a wide range of organisations in the financial sector, including banks, insurance companies...

Read more

‍How does DORA differ from ISO 27001?

If your organisation is already certified to ISO 27001, this will provide a strong starting point for compliance with DORA, as the two cover...

Read more

How is DORA structured?

DORA is structured around five core ‘pillars’ that relate to ICT and cyber security, which aim to provide a comprehensive digital resiliency framework for financial organisations...

Read more

What are the regulatory technical standards (RTS) and implementing technical standards (ITS)?

In addition to DORA itself, the European Supervisory Authorities (ESAs) have produced a number of regulatory technical standards (RTS)...

Read more

How is DORA enforced?

DORA is enforced by designated regulators in each EU member state, known as competent authorities.  These competent authorities can request that financial organisations implement...

Read more

DORA - The Digital Operations Resilience Act

Published on
5 Jun
2025

URM’s blog discusses the EU’s Digital Operation’s Resilience Act (DORA), explaining who it will apply to, its requirements, how it will be enforced, and more.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
16/12/2025
ISO 27001 Control 8.17: Why Clock Synchronisation Is Critical for Security and Conformance

Read URM’s blog, where we explore the importance of clock synchronisation for cyber security and resilience, and how to meet the requirements of Control 8.17.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
8/9/2025
ISO 27001 Clause 5.1: Leadership and Commitment Explained

URM’s blog explores Clause 5.1 of ISO 27001, what you must do to meet its requirements, and why leadership & commitment are vital to an effective ISMS.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
29/8/2025
Critical Cyber Security Practices to Defend Against Ransomware Attacks

URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.

Read more
"
We were incredibly impressed with our consultant’s attention to detail during the reworking of many documents and the in-year assessment last month. He stood up and had his finger on the pulse and was a great help. He is liked by our team, and we look forward to a long working relationship with him.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.