DORA

Frequently Asked Questions

What Is DORA?

The Digital Operations Resilience Act (DORA) is a piece of EU legislation relating to the cyber security and digital of financial institutions...

Read more

Which Organisations Does DORA Apply to?

DORA is applicable to a wide range of organisations in the financial sector, including banks, insurance companies...

Read more

‍How does DORA differ from ISO 27001?

If your organisation is already certified to ISO 27001, this will provide a strong starting point for compliance with DORA, as the two cover...

Read more

How is DORA structured?

DORA is structured around five core ‘pillars’ that relate to ICT and cyber security, which aim to provide a comprehensive digital resiliency framework for financial organisations...

Read more

What are the regulatory technical standards (RTS) and implementing technical standards (ITS)?

In addition to DORA itself, the European Supervisory Authorities (ESAs) have produced a number of regulatory technical standards (RTS)...

Read more

How is DORA enforced?

DORA is enforced by designated regulators in each EU member state, known as competent authorities.  These competent authorities can request that financial organisations implement...

Read more

DORA - The Digital Operations Resilience Act

Published on
5 Jun
2025

URM’s blog discusses the EU’s Digital Operation’s Resilience Act (DORA), explaining who it will apply to, its requirements, how it will be enforced, and more.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
15/4/2026
ISO 27001 – Clause 6.3: The Importance of Planned ISMS Change Management

URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
2/4/2026
Transitioning to ISO 27001:2022

If your organisation is looking to transition to ISO 27001:2022, URM’s blog provides practical and invaluable guidance on meeting the new requirements.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
2/4/2026
What is the CIA Security Triad? Confidentiality, Integrity and Availability Explained

URM’s blog explains how the principles of confidentiality, integrity and availability (CIA) can help align your information security controls with best practice

Read more
"
Without URM we would not have achieved our certification goals.
Director, Havas People
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.