{"id":45338,"date":"2025-05-26T13:30:45","date_gmt":"2025-05-26T13:30:45","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=45338"},"modified":"2025-06-27T12:30:37","modified_gmt":"2025-06-27T12:30:37","slug":"board-training-dora-level-1","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/","title":{"rendered":"Board Training DORA Level 1"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp&#8221; custom_margin=&#8221;0px||0px||true|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; bottom_divider_color=&#8221;#0C71C3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;24vh||10vh|10%|false|false&#8221; custom_padding_tablet=&#8221;|||10%|false|false&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;42px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Board Training DORA<br \/>Level 1<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Board Training DORA \/ <span style=\"color: #f18a00;\">Level 1<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_margin_tablet=&#8221;|||0px|false|false&#8221; custom_margin_phone=&#8221;|0px|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||8px|0px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_margin_tablet=&#8221;|||0px|false|false&#8221; custom_margin_phone=&#8221;|||0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|10%||0px|false|false&#8221; custom_padding_tablet=&#8221;|5%||5%|false|true&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;align-self:center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/06\/Lesson_DORA_EN_2x-3-scaled.webp&#8221; alt=&#8221;Lesson_DORA_EN&#8221; title_text=&#8221;Lesson_DORA_EN&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||120px|true|false&#8221; custom_padding_tablet=&#8221;50px|||0px|false|false&#8221; custom_padding_phone=&#8221;|10px||10px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;align-self:center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Cyber Guru DORA&#8221; alt=&#8221;Awareness&#8221; image_icon_width=&#8221;100%&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;60px&#8221; image_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h2&#8243; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=&#8221;48px&#8221; module_alignment=&#8221;left&#8221; min_height=&#8221;11.4px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_margin_tablet=&#8221;||0px||false|false&#8221; custom_margin_phone=&#8221;25px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;48px&#8221; header_font_size_phone=&#8221;36px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; custom_css_blurb_image=&#8221;width:15%;||&#8221; custom_css_blurb_content=&#8221;max-width: none !important;||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22%93}&#8221;][\/et_pb_blurb][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;10px||20px||false|false&#8221; custom_css_main_element=&#8221;font-weight:400;&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<p><span><span style=\"color: #000000;\">The training course on the EU DORA regulation is designed to provide knowledge and managerial skills aimed at ICT (Information and Communication Technologies) risk management, operational continuity, and regulatory compliance, with particular attention to incident prevention and response, supervision of third-party ICT service providers, and the \u201cimpact of emerging technologies such as Cloud and Artificial Intelligence. The course is aimed at entities obligated by the DORA regulation, such as financial institutions, critical ICT providers, and other actors in the\u201d financial ecosystem.<\/span><br \/><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION I&#8221; button_url=&#8221;#section-1&#8243; button_text=&#8221;Discover more&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h5><strong>REGULATORY FRAMEWORK<\/strong><\/h5>\n<h5><strong>9 Lessons<\/strong><\/h5>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION II&#8221; button_url=&#8221;#section-2&#8243; button_text=&#8221;Discover more&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h5><strong>CYBER RISKS<\/strong><\/h5>\n<p><strong><\/strong><\/p>\n<p><strong>5 Lessons<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION III&#8221; button_url=&#8221;#section-3&#8243; button_text=&#8221;Discover more&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h5><strong>CYBER ATTACKS<\/strong><\/h5>\n<p><strong><\/strong><\/p>\n<p><strong>4 Lessons<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION IV&#8221; button_url=&#8221;#section-4&#8243; button_text=&#8221;Discover more&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h5><strong>CYBER CASES<\/strong><\/h5>\n<p><strong><\/strong><\/p>\n<p><strong>4 Lessons<\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <span>THE REGULATORY CONTEXT<\/span><\/span><br \/>\n<span>This lesson explains how the regulatory framework that led to the \u201cintroduction of the DORA Regulation has evolved. It illustrates the concept of digital operational resilience applied to the financial sector, focusing on the\u201d importance of the security of technological infrastructures (ICT) and the need to harmonize regulations among EU member states.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; OBJECTIVES AND SCOPE OF APPLICATION<\/span><br \/>\nThis lesson explains how the DORA Regulation aims to ensure continuity and security of European financial services by defining common rules for managing digital risks. It illustrates the entities involved, the measures envisaged, and the principle of proportionality that governs the application to different financial entities. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; ICT RISK MANAGEMENT<\/span><br \/>\nThis lesson explains how the DORA Regulation requires financial entities to integrate ICT risk management into corporate governance. It describes the tasks of top management, strategic and operational requirements to ensure digital resilience, including incident response and operational continuity. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 4 &#8211; MANAGEMENT, CLASSIFICATION AND REPORTING OF ICT RISKS<\/span><br \/>\nThis lesson explains how financial entities should behave in the face of ICT incidents. It starts from detection, moves on to classification based on severity and impact, up to mandatory notification according to European regulatory thresholds. It also clarifies the management of cases where DORA and NIS2 obligations overlap.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 5 &#8211; <\/span><span style=\"color: #f18a00;\">DIGITAL OPERATIONAL RESILIENCE TESTING<\/span><br \/>\nThis lesson explains how financial entities must organize periodic digital resilience tests to assess their ability to respond to cyber attacks. The tests include technical analyses and realistic simulations, managed by independent entities, and serve to identify vulnerabilities and implement corrective measures. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 6 &#8211;<\/span><span style=\"color: #f18a00;\">MANAGEMENT OF ICT THIRD-PARTY RISKS<\/span><br \/>\nThis lesson explains how financial entities must manage ICT risks associated with third-party providers. The DORA regulation imposes high standards for selection, monitoring, and contracting, as well as establishing obligations for transparency and collaboration with European supervisory authorities. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 7 &#8211; SANCTIONS<\/span><br \/>\nThis lesson explains how authorities, in case of DORA violations, can apply economic and operational sanctions. These range from fines and remediation plans to suspension of activities or personal liability of managers. The sanctions system also has reputational effects.\n<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 8 &#8211; <\/span><span style=\"color: #f18a00;\">DELEGATED REGULATIONS<\/span><br \/>\nThis lesson explains how the EU delegated regulations define the fundamental technical and procedural aspects for implementing DORA. It addresses criteria for classifying incidents, guidelines on contracts with ICT providers, and standards for risk management and \u201cidentification of critical providers.\u201d <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; REGULATORY FRAMEWORK<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 9 &#8211;<\/span><span style=\"color: #f18a00;\">IMPLEMENTING RULES<\/span><br \/>\nThis lesson explains how the implementation of DORA is supported by European and national regulations, including Directive 2022\/2556 and Legislative Decree. 23\/2025. It defines the powers of Italian authorities, the criteria for sanctioning violations, and the responsibilities of administrators and managers in case of non-compliance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>CYBER RISKS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; CYBER RISK<\/span><br \/>Cyber risk management, an integral part of business activities, requires assessing and mitigating risks arising from digital vulnerabilities intentionally exploited by malicious actors. Risk reduction is based on two dimensions: lowering the probability of an attack through prevention and awareness, and limiting the impact through resilient assets and technological best practices. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>CYBER RISKS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; CYBER RISK ANALYSIS<\/span><br \/>Risk analysis is fundamental for understanding threats, probabilities, and impacts, and defining countermeasures. Following standards like ISO or NIST, it is articulated in six phases: identifying the context and risks, analyzing them, defining priorities, preparing responses, and continuously monitoring. The main output is the Risk Register, which maps cyber and non-cyber risks, essential for multi-risk security strategies as required by DORA.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>CYBER RISKS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <\/span><span style=\"color: #f18a00;\">RISK MEASUREMENT<\/span><br \/>Risk assessment involves \u201canalyzing the probability and impact of an adverse event to make informed decisions. Analyses can be qualitative, simpler but subjective, or quantitative, more complex but precise and useful for justifying mitigation investments. Measuring risk helps choose the best treatment strategies, reducing\u201d uncertainty and overcoming biases related to personal perception.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>CYBER RISKS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 4 &#8211; SECURITY CONTROLS<\/span><br \/>Security incident management is based on analyzing logs generated by digital infrastructures to identify and prevent critical situations. The Security Operations Center (SOC) processes alerts through a structured operational flow articulated in three phases: preliminary analysis, detailed analysis, and definition of containment and remedy actions. The use of Artificial Intelligence (AI) helps reduce false positives, improving operational efficiency.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>CYBER RISKS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 5 &#8211; THE DAMAGE<\/span><br \/><span>The \u201cimpact represents the damage caused by an adverse event, classifiable as direct, civil liability, indirect, and consequential. In cyber risk, damages are distinguished between own (business interruption, system restoration, incident management) and third-party (litigation, data breaches). While material damages are more easily estimable, immaterial ones require complex assessments.\u201d  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER ATTACKS<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <span>THE DYNAMICS OF AN ATTACK<\/span><\/span><br \/><span>The dynamics of cyber risk follow a model where a threat exploits a vector and a technique to target a vulnerability, generating damage. Understanding threats, vectors, and techniques is crucial: threats range from individuals to complex organizations; vectors include email, malicious apps, or botnets; techniques vary from phishing to malware. Email is the most common vector, while botnets, composed of compromised devices, are used for attacks like DDoS.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER ATTACKS<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; <span>MAIN ATTACK TECHNIQUES<\/span><\/span><br \/><span>Cyber attack techniques include malware, vulnerability exploitation, and Distributed Denial of Service (DDoS) attacks. Malware, including zero-days, exploits unknown vulnerabilities, while vulnerabilities exposed on the Internet allow data theft and privileged access, often through social engineering. DDoS attacks overload infrastructures or applications, rendering them unusable.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER ATTACKS<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <span>VULNERABILITIES<\/span><\/span><br \/><span>Vulnerabilities represent a risk only if they are not mitigated by technical or procedural controls. Their lifecycle goes through four phases: discovery, disclosure, countermeasure identification, and application, with the first two being particularly critical. Effective vulnerability management requires an industrialized process, based on constant updates, complete asset inventories, and a priority-based strategy.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER ATTACKS<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 4 &#8211; <span>SECURITY INCIDENTS<\/span><\/span><br \/><span>Security incident management is based on \u201canalyzing logs produced by digital infrastructures, used to identify and prevent critical situations. The Security Operation Center (SOC) processes alerts through an operational flow articulated in three phases: preliminary analysis, detailed analysis, and definition of containment and remedy actions. The\u201d use of \u201cArtificial Intelligence reduces false positives, improving\u201d efficiency.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <span>CEO FRAUD<\/span><\/span><br \/><span>A cybercriminal compromises or falsifies the CEO&#8217;s or another Board member&#8217;s email and sends an urgent email to the CFO or a financial executive, ordering a wire transfer of millions of euros to a foreign account.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; <span>RANSOMWARE ATTACK WITH EXTORTION<\/span><\/span><br \/><span>A leading company in the energy sector suffers a ransomware attack that blocks IT systems and paralyzes operations. The criminals threaten to publish sensitive Board data if the ransom is not paid. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <span>SUPPLY CHAIN ATTACK<\/span><\/span><br \/><span>A cloud service provider used by the company suffers an attack. Hackers use its credentials to access confidential data of the Board and strategic clients. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\"><span>LESSON 4 &#8211; DATA BREACH<\/span> <\/span><br \/><span>A targeted attack steals financial and personal data of Board members. The press becomes aware of it, and the company suffers reputational damage, in addition to risks for non-compliance with DORA and GDPR. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8221; alt=&#8221;More&#8221; title_text=&#8221;More&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-200px&#8221; horizontal_offset=&#8221;85px&#8221; vertical_offset_tablet=&#8221;-55px&#8221; vertical_offset_phone=&#8221;-90px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-55px&#8221; horizontal_offset_phone=&#8221;-50px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; position_origin_a_tablet=&#8221;top_left&#8221; position_origin_a_phone=&#8221;top_left&#8221; position_origin_a_last_edited=&#8221;on|phone&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|phone&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|phone&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; positioning_tablet=&#8221;absolute&#8221; positioning_phone=&#8221;absolute&#8221; positioning_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;70px|170px|0px|170px|false|true&#8221; custom_padding_tablet=&#8221;|100px||100px|false|true&#8221; custom_padding_phone=&#8221;70px|20px|0px|20px|false|true&#8221; border_radii=&#8221;off|10px|10px||&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik|300|||||||&#8221; text_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Inter|700|||||||&#8221; header_2_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;58px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||25px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;48px&#8221; header_2_font_size_phone=&#8221;32px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_line_height_tablet=&#8221;58px&#8221; header_2_line_height_phone=&#8221;35px&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Want to Know more?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_tablet=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|70px|0px|false|true&#8221; border_radii=&#8221;off|||15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;1px&#8221; box_shadow_vertical=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ3MTAxIn19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;DATA SHEET&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ1MzgwIn19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;REQUEST DEMO&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;off|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8221; alt=&#8221;Do You Want to Know More&#8221; title_text=&#8221;Do You Want to Know More&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-20px&#8221; horizontal_offset=&#8221;-100px&#8221; vertical_offset_tablet=&#8221;-20px&#8221; vertical_offset_phone=&#8221;-80px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-100px&#8221; horizontal_offset_phone=&#8221;-130px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;25%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Board Training DORALevel 1Board Training DORA \/ Level 1The training course on the EU DORA regulation is designed to provide knowledge and managerial skills aimed at ICT (Information and Communication Technologies) risk management, operational continuity, and regulatory compliance, with particular attention to incident prevention and response, supervision of third-party ICT service providers, and the \u201cimpact [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-45338","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS2 Training for Cyber Risk Management - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Discover how DORA training improves operational resilience in the financial sector and manages ICT risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Board Training DORA Level 1\" \/>\n<meta property=\"og:description\" content=\"Discover how DORA training improves operational resilience in the financial sector and manages ICT risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T12:30:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-dora-level-1\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-dora-level-1\\\/\",\"name\":\"NIS2 Training for Cyber Risk Management - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"datePublished\":\"2025-05-26T13:30:45+00:00\",\"dateModified\":\"2025-06-27T12:30:37+00:00\",\"description\":\"Discover how DORA training improves operational resilience in the financial sector and manages ICT risk.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-dora-level-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-dora-level-1\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-dora-level-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Board Training DORA Level 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS2 Training for Cyber Risk Management - Cyber Guru","description":"Discover how DORA training improves operational resilience in the financial sector and manages ICT risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/","og_locale":"en_US","og_type":"article","og_title":"Board Training DORA Level 1","og_description":"Discover how DORA training improves operational resilience in the financial sector and manages ICT risk.","og_url":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-06-27T12:30:37+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/","url":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/","name":"NIS2 Training for Cyber Risk Management - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"datePublished":"2025-05-26T13:30:45+00:00","dateModified":"2025-06-27T12:30:37+00:00","description":"Discover how DORA training improves operational resilience in the financial sector and manages ICT risk.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/board-training-dora-level-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Board Training DORA Level 1"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/45338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=45338"}],"version-history":[{"count":12,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/45338\/revisions"}],"predecessor-version":[{"id":47136,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/45338\/revisions\/47136"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=45338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}