
How to Adopt DORA’s Threat Led Penetration Testing Requirements
The new Digital Operational Resilience Act (DORA) requires significant financial entities in the EU to carry out Threat-Led Penetration Testing on a regular basis. However, the skills required along with the planning for these types of exercises can prove difficult and time consuming.
In this webinar, Kroll brings together their red teaming, threat intelligence and DORA regulatory compliance experts, to provide practical guidance on how security, risk and business resiliency leaders can adopt a sustainable threat-led penetration testing (TLPT) program as required by DORA, the new regulation impacting financial institutions in Europe.
What You’ll Learn from This Session
- Understanding the scope and requirements of TLPT
- The difference between TLPT and traditional penetration testing
- How to overcome common challenges of adopting TLPT processes
- The roles of key stakeholders including the threat intelligence team, red team, blue team and white team
- Key lessons learned from a real-life case study
Dive Deeper into Kroll’s Cyber Risk Solutions
Get a better understanding of the breadth of Kroll’s cyber risk services. Download below for more information:
Grab a copy of the latest reports and insights below and stop by to discuss with our experts. Click to download:
Stay Ahead With Kroll
Threat-Led Penetration Testing
Simulate real-world attacks, uncover vulnerabilities, and strengthen your defenses in line with DORA requirements with guidance from Kroll's offensive security experts.
24x7 Incident Response
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
Cyber Risk Retainer
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Malware Analysis and Reverse Engineering
Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.
Ransomware Preparedness Assessment
Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.
Office 365 Security, Forensics and Incident Response
Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.