{"id":11261,"date":"2025-05-16T12:15:02","date_gmt":"2025-05-16T10:15:02","guid":{"rendered":"https:\/\/netsystem.fr\/dora-audit-and-compliance-quote\/"},"modified":"2025-07-07T10:29:11","modified_gmt":"2025-07-07T08:29:11","slug":"dora-audit-and-compliance-quote","status":"publish","type":"page","link":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/","title":{"rendered":"DORA audit and compliance quote"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"11261\" class=\"elementor elementor-11261 elementor-10070\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-overlay-color=\"#16293699\" class=\"elementor-element elementor-element-a351b3c e-flex e-con-boxed e-con e-parent\" data-id=\"a351b3c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;wave-brush&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 283.5 27.8\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M283.5,9.7c0,0-7.3,4.3-14,4.6c-6.8,0.3-12.6,0-20.9-1.5c-11.3-2-33.1-10.1-44.7-5.7\ts-12.1,4.6-18,7.4c-6.6,3.2-20,9.6-36.6,9.3C131.6,23.5,99.5,7.2,86.3,8c-1.4,0.1-6.6,0.8-10.5,2c-3.8,1.2-9.4,3.8-17,4.7\tc-3.2,0.4-8.3,1.1-14.2,0.9c-1.5-0.1-6.3-0.4-12-1.6c-5.7-1.2-11-3.1-15.8-3.7C6.5,9.2,0,10.8,0,10.8V0h283.5V9.7z M260.8,11.3\tc-0.7-1-2-0.4-4.3-0.4c-2.3,0-6.1-1.2-5.8-1.1c0.3,0.1,3.1,1.5,6,1.9C259.7,12.2,261.4,12.3,260.8,11.3z M242.4,8.6\tc0,0-2.4-0.2-5.6-0.9c-3.2-0.8-10.3-2.8-15.1-3.5c-8.2-1.1-15.8,0-15.1,0.1c0.8,0.1,9.6-0.6,17.6,1.1c3.3,0.7,9.3,2.2,12.4,2.7\tC239.9,8.7,242.4,8.6,242.4,8.6z M185.2,8.5c1.7-0.7-13.3,4.7-18.5,6.1c-2.1,0.6-6.2,1.6-10,2c-3.9,0.4-8.9,0.4-8.8,0.5\tc0,0.2,5.8,0.8,11.2,0c5.4-0.8,5.2-1.1,7.6-1.6C170.5,14.7,183.5,9.2,185.2,8.5z M199.1,6.9c0.2,0-0.8-0.4-4.8,1.1\tc-4,1.5-6.7,3.5-6.9,3.7c-0.2,0.1,3.5-1.8,6.6-3C197,7.5,199,6.9,199.1,6.9z M283,6c-0.1,0.1-1.9,1.1-4.8,2.5s-6.9,2.8-6.7,2.7\tc0.2,0,3.5-0.6,7.4-2.5C282.8,6.8,283.1,5.9,283,6z M31.3,11.6c0.1-0.2-1.9-0.2-4.5-1.2s-5.4-1.6-7.8-2C15,7.6,7.3,8.5,7.7,8.6\tC8,8.7,15.9,8.3,20.2,9.3c2.2,0.5,2.4,0.5,5.7,1.6S31.2,11.9,31.3,11.6z M73,9.2c0.4-0.1,3.5-1.6,8.4-2.6c4.9-1.1,8.9-0.5,8.9-0.8\tc0-0.3-1-0.9-6.2-0.3S72.6,9.3,73,9.2z M71.6,6.7C71.8,6.8,75,5.4,77.3,5c2.3-0.3,1.9-0.5,1.9-0.6c0-0.1-1.1-0.2-2.7,0.2\tC74.8,5.1,71.4,6.6,71.6,6.7z M93.6,4.4c0.1,0.2,3.5,0.8,5.6,1.8c2.1,1,1.8,0.6,1.9,0.5c0.1-0.1-0.8-0.8-2.4-1.3\tC97.1,4.8,93.5,4.2,93.6,4.4z M65.4,11.1c-0.1,0.3,0.3,0.5,1.9-0.2s2.6-1.3,2.2-1.2s-0.9,0.4-2.5,0.8C65.3,10.9,65.5,10.8,65.4,11.1\tz M34.5,12.4c-0.2,0,2.1,0.8,3.3,0.9c1.2,0.1,2,0.1,2-0.2c0-0.3-0.1-0.5-1.6-0.4C36.6,12.8,34.7,12.4,34.5,12.4z M152.2,21.1\tc-0.1,0.1-2.4-0.3-7.5-0.3c-5,0-13.6-2.4-17.2-3.5c-3.6-1.1,10,3.9,16.5,4.1C150.5,21.6,152.3,21,152.2,21.1z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M269.6,18c-0.1-0.1-4.6,0.3-7.2,0c-7.3-0.7-17-3.2-16.6-2.9c0.4,0.3,13.7,3.1,17,3.3\tC267.7,18.8,269.7,18,269.6,18z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M227.4,9.8c-0.2-0.1-4.5-1-9.5-1.2c-5-0.2-12.7,0.6-12.3,0.5c0.3-0.1,5.9-1.8,13.3-1.2\tS227.6,9.9,227.4,9.8z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M204.5,13.4c-0.1-0.1,2-1,3.2-1.1c1.2-0.1,2,0,2,0.3c0,0.3-0.1,0.5-1.6,0.4\tC206.4,12.9,204.6,13.5,204.5,13.4z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M201,10.6c0-0.1-4.4,1.2-6.3,2.2c-1.9,0.9-6.2,3.1-6.1,3.1c0.1,0.1,4.2-1.6,6.3-2.6\tS201,10.7,201,10.6z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M154.5,26.7c-0.1-0.1-4.6,0.3-7.2,0c-7.3-0.7-17-3.2-16.6-2.9c0.4,0.3,13.7,3.1,17,3.3\tC152.6,27.5,154.6,26.8,154.5,26.7z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M41.9,19.3c0,0,1.2-0.3,2.9-0.1c1.7,0.2,5.8,0.9,8.2,0.7c4.2-0.4,7.4-2.7,7-2.6\tc-0.4,0-4.3,2.2-8.6,1.9c-1.8-0.1-5.1-0.5-6.7-0.4S41.9,19.3,41.9,19.3z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M75.5,12.6c0.2,0.1,2-0.8,4.3-1.1c2.3-0.2,2.1-0.3,2.1-0.5c0-0.1-1.8-0.4-3.4,0\tC76.9,11.5,75.3,12.5,75.5,12.6z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M15.6,13.2c0-0.1,4.3,0,6.7,0.5c2.4,0.5,5,1.9,5,2c0,0.1-2.7-0.8-5.1-1.4\tC19.9,13.7,15.7,13.3,15.6,13.2z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae55a78 e-flex e-con-boxed e-con e-parent\" data-id=\"ae55a78\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da23e65 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"da23e65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Are you a financial institution that needs to comply with DORA?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-033ad67 e-flex e-con-boxed e-con e-parent\" data-id=\"033ad67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ae62b34 e-con-full e-flex e-con e-child\" data-id=\"ae62b34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6360d9 elementor-widget elementor-widget-heading\" data-id=\"a6360d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Let us manage your compliance at DORA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd7b0f8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cd7b0f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm113.9 231L234.4 103.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L285.1 256 183.5 357.6c-9.4 9.4-9.4 24.6 0 33.9l17 17c9.4 9.4 24.6 9.4 33.9 0L369.9 273c9.4-9.4 9.4-24.6 0-34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Our teams <b>get to grips with DORA quickly<\/b> thanks to our experience<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm113.9 231L234.4 103.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L285.1 256 183.5 357.6c-9.4 9.4-9.4 24.6 0 33.9l17 17c9.4 9.4 24.6 9.4 33.9 0L369.9 273c9.4-9.4 9.4-24.6 0-34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">We can support you <b>every step of the way<\/b> (audit, compliance action plan, roadmap management, raising awareness among management and staff, etc.).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm113.9 231L234.4 103.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L285.1 256 183.5 357.6c-9.4 9.4-9.4 24.6 0 33.9l17 17c9.4 9.4 24.6 9.4 33.9 0L369.9 273c9.4-9.4 9.4-24.6 0-34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Our knowledge of cyber standards [NIS2, ISO27001, PASSI, TISAX, etc.] enables us to <b>quickly identify key points<\/b>.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm113.9 231L234.4 103.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L285.1 256 183.5 357.6c-9.4 9.4-9.4 24.6 0 33.9l17 17c9.4 9.4 24.6 9.4 33.9 0L369.9 273c9.4-9.4 9.4-24.6 0-34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Our certified consultants can provide you with strategic and operational support<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0174daa elementor-widget elementor-widget-text-editor\" data-id=\"0174daa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NETSYSTEM will support you step by step through the DORA audit and your compliance, with a tailor-made approach combining cybersecurity, IT risk management, governance and audit.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-827dc1d e-con-full e-flex e-con e-child\" data-id=\"827dc1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2407193 elementor-widget elementor-widget-heading\" data-id=\"2407193\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Your personalised DORA quote<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d09055 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9d09055\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-alt\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288 248v28c0 6.6-5.4 12-12 12H108c-6.6 0-12-5.4-12-12v-28c0-6.6 5.4-12 12-12h168c6.6 0 12 5.4 12 12zm-12 72H108c-6.6 0-12 5.4-12 12v28c0 6.6 5.4 12 12 12h168c6.6 0 12-5.4 12-12v-28c0-6.6-5.4-12-12-12zm108-188.1V464c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V48C0 21.5 21.5 0 48 0h204.1C264.8 0 277 5.1 286 14.1L369.9 98c9 8.9 14.1 21.2 14.1 33.9zm-128-80V128h76.1L256 51.9zM336 464V176H232c-13.3 0-24-10.7-24-24V48H48v416h288z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e67114 elementor-widget elementor-widget-text-editor\" data-id=\"3e67114\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>\n<form id=\"plz-form-fd36f393-306b-4362-88a3-9813713889c8\"><\/form>\n<p><script async src=\"https:\/\/brain.plezi.co\/api\/v1\/web_forms\/scripts?content_web_form_id=fd36f393-306b-4362-88a3-9813713889c8\"><\/script><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4446aa0 e-flex e-con-boxed e-con e-parent\" data-id=\"4446aa0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-dce-background-color=\"#F9F9F9\" class=\"elementor-element elementor-element-e33f48e e-con-full e-flex e-con e-child\" data-id=\"e33f48e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cca5dd elementor-widget elementor-widget-heading\" data-id=\"4cca5dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The 5 pillars of DORA<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f810b4a elementor-widget elementor-widget-text-editor\" data-id=\"f810b4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Since January 2025, the DORA regulation has required financial entities to strengthen their digital operational resilience across 5 pillars.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-769a758 e-con-full e-flex e-con e-child\" data-id=\"769a758\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5a224f elementor-widget elementor-widget-eael-interactive-circle\" data-id=\"f5a224f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-interactive-circle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div id=\"eael-interactive-circle-f5a224f\" class=\"eael-interactive-circle\" data-tabid=\"f5a224f\">\n\t\t\t                <div class=\"eael-circle-wrapper eael-interactive-circle-preset-1 eael-interactive-circle-event-hover eael-circle-responsive-view\" data-appearance=\"eael-interactive-circle-animation-0\" data-autoplay=\"0\" data-autoplay-interval=\"2000\">\n                    <div class=\"eael-circle-info\" data-items=\"5\">\n                        <div class=\"eael-circle-inner\">\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-6d004d8\">\n                                    <div aria-controls=\"eael-interactive-1\" tabindex=\"0\" class=\"eael-circle-btn active\" id=\"eael-circle-item-1\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-far-compass\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M347.94 129.86L203.6 195.83a31.938 31.938 0 0 0-15.77 15.77l-65.97 144.34c-7.61 16.65 9.54 33.81 26.2 26.2l144.34-65.97a31.938 31.938 0 0 0 15.77-15.77l65.97-144.34c7.61-16.66-9.54-33.81-26.2-26.2zm-77.36 148.72c-12.47 12.47-32.69 12.47-45.16 0-12.47-12.47-12.47-32.69 0-45.16 12.47-12.47 32.69-12.47 45.16 0 12.47 12.47 12.47 32.69 0 45.16zM248 8C111.03 8 0 119.03 0 256s111.03 248 248 248 248-111.03 248-248S384.97 8 248 8zm0 448c-110.28 0-200-89.72-200-200S137.72 56 248 56s200 89.72 200 200-89.72 200-200 200z\"><\/path><\/svg><span class=\"eael-circle-btn-txt\">ICT governance and risk management<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-1\" aria-labelledby=\"eael-circle-item-1\" class=\"eael-circle-btn-content eael-circle-item-1 active\">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left\">Managers must demonstrate a strong commitment to managing ICT-related risks.<\/li><li style=\"text-align: left\">Mandatory implementation of a risk management framework: policies, procedures, mapping, indicators, control processes.<\/li><li style=\"text-align: left\">Integration into the company&#8217;s global strategy.<\/li><\/ul>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-56aa123\">\n                                    <div aria-controls=\"eael-interactive-2\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-2\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-far-chart-bar\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\"><\/path><\/svg><span class=\"eael-circle-btn-txt\">Incident management<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-2\" aria-labelledby=\"eael-circle-item-2\" class=\"eael-circle-btn-content eael-circle-item-2 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left\">Implementation of a formalised process for detecting, classifying, managing and communicating incidents.<\/li><li style=\"text-align: left\">Obligation to notify major incidents to the competent authorities within a short timeframe (NIS2 type).<\/li><li style=\"text-align: left\">Keeping an incident register.<\/li><\/ul>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-08ba3c6\">\n                                    <div aria-controls=\"eael-interactive-3\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-3\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-far-keyboard\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M528 64H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h480c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm8 336c0 4.411-3.589 8-8 8H48c-4.411 0-8-3.589-8-8V112c0-4.411 3.589-8 8-8h480c4.411 0 8 3.589 8 8v288zM170 270v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm-336 82v-28c0-6.627-5.373-12-12-12H82c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm384 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zM122 188v-28c0-6.627-5.373-12-12-12H82c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm96 0v-28c0-6.627-5.373-12-12-12h-28c-6.627 0-12 5.373-12 12v28c0 6.627 5.373 12 12 12h28c6.627 0 12-5.373 12-12zm-98 158v-16c0-6.627-5.373-12-12-12H180c-6.627 0-12 5.373-12 12v16c0 6.627 5.373 12 12 12h216c6.627 0 12-5.373 12-12z\"><\/path><\/svg><span class=\"eael-circle-btn-txt\">Operational resilience tests<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-3\" aria-labelledby=\"eael-circle-item-3\" class=\"eael-circle-btn-content eael-circle-item-3 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left\">Obligation to carry out regular vulnerability, intrusion and continuity tests.<\/li><li style=\"text-align: left\">For certain entities, advanced \u2018TLPT\u2019 (Threat-Led Penetration Testing) tests are required.<\/li><li style=\"text-align: left\">Objective: to ensure that systems and continuity plans really work.<\/li><\/ul>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-b985a3c\">\n                                    <div aria-controls=\"eael-interactive-4\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-4\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fas-people-arrows\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M96,128A64,64,0,1,0,32,64,64,64,0,0,0,96,128Zm0,176.08a44.11,44.11,0,0,1,13.64-32L181.77,204c1.65-1.55,3.77-2.31,5.61-3.57A63.91,63.91,0,0,0,128,160H64A64,64,0,0,0,0,224v96a32,32,0,0,0,32,32V480a32,32,0,0,0,32,32h64a32,32,0,0,0,32-32V383.61l-50.36-47.53A44.08,44.08,0,0,1,96,304.08ZM480,128a64,64,0,1,0-64-64A64,64,0,0,0,480,128Zm32,32H448a63.91,63.91,0,0,0-59.38,40.42c1.84,1.27,4,2,5.62,3.59l72.12,68.06a44.37,44.37,0,0,1,0,64L416,383.62V480a32,32,0,0,0,32,32h64a32,32,0,0,0,32-32V352a32,32,0,0,0,32-32V224A64,64,0,0,0,512,160ZM444.4,295.34l-72.12-68.06A12,12,0,0,0,352,236v36H224V236a12,12,0,0,0-20.28-8.73L131.6,295.34a12.4,12.4,0,0,0,0,17.47l72.12,68.07A12,12,0,0,0,224,372.14V336H352v36.14a12,12,0,0,0,20.28,8.74l72.12-68.07A12.4,12.4,0,0,0,444.4,295.34Z\"><\/path><\/svg><span class=\"eael-circle-btn-txt\">Expertise in ICT service providers<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-4\" aria-labelledby=\"eael-circle-item-4\" class=\"eael-circle-btn-content eael-circle-item-4 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left\">DORA requires mapping of ICT service providers and rigorous governance of critical contracts.<\/li><li style=\"text-align: left\">The company remains responsible for its service providers.<\/li><li style=\"text-align: left\">Obligation to include clauses on security, reversibility, auditing, etc. in contracts.<\/li><\/ul>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-578869c\">\n                                    <div aria-controls=\"eael-interactive-5\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-5\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-far-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M532 386.2c27.5-27.1 44-61.1 44-98.2 0-80-76.5-146.1-176.2-157.9C368.3 72.5 294.3 32 208 32 93.1 32 0 103.6 0 192c0 37 16.5 71 44 98.2-15.3 30.7-37.3 54.5-37.7 54.9-6.3 6.7-8.1 16.5-4.4 25 3.6 8.5 12 14 21.2 14 53.5 0 96.7-20.2 125.2-38.8 9.2 2.1 18.7 3.7 28.4 4.9C208.1 407.6 281.8 448 368 448c20.8 0 40.8-2.4 59.8-6.8C456.3 459.7 499.4 480 553 480c9.2 0 17.5-5.5 21.2-14 3.6-8.5 1.9-18.3-4.4-25-.4-.3-22.5-24.1-37.8-54.8zm-392.8-92.3L122.1 305c-14.1 9.1-28.5 16.3-43.1 21.4 2.7-4.7 5.4-9.7 8-14.8l15.5-31.1L77.7 256C64.2 242.6 48 220.7 48 192c0-60.7 73.3-112 160-112s160 51.3 160 112-73.3 112-160 112c-16.5 0-33-1.9-49-5.6l-19.8-4.5zM498.3 352l-24.7 24.4 15.5 31.1c2.6 5.1 5.3 10.1 8 14.8-14.6-5.1-29-12.3-43.1-21.4l-17.1-11.1-19.9 4.6c-16 3.7-32.5 5.6-49 5.6-54 0-102.2-20.1-131.3-49.7C338 339.5 416 272.9 416 192c0-3.4-.4-6.7-.7-10C479.7 196.5 528 238.8 528 288c0 28.7-16.2 50.6-29.7 64z\"><\/path><\/svg><span class=\"eael-circle-btn-txt\">Sharing information<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-5\" aria-labelledby=\"eael-circle-item-5\" class=\"eael-circle-btn-content eael-circle-item-5 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left\">Encouragement (not compulsory) to share information on threats between entities in the sector in order to strengthen the collective posture.<\/li><li style=\"text-align: left\">Regulated framework to avoid abuse or legal risk.<\/li><\/ul>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\n        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-157e56f e-flex e-con-boxed e-con e-parent\" data-id=\"157e56f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e27222 elementor-widget elementor-widget-heading\" data-id=\"7e27222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why comply with DORA?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6eb0be0 e-con-full e-flex e-con e-child\" data-id=\"6eb0be0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-82fe1b2 e-grid e-con-full e-con e-child\" data-id=\"82fe1b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9ab6a4 elementor-widget-laptop__width-initial elementor-widget__width-auto elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"c9ab6a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-c9ab6a4\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"c9ab6a4\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-is-dora\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2111\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">What is DORA?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2111\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"what-is-dora\"><p>DORA (Digital Operational Resilience Act) is a detailed and comprehensive regulatory framework on digital operational resilience for financial entities.<\/p>\n<p>Its aim is to <strong>ensure business continuity in the event of a major digital incident<\/strong>, through improved IT risk management, robust governance and clear requirements for third-party service providers.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"who-is-dora-for\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2112\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Who is DORA for?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2112\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"who-is-dora-for\"><p>The DORA regulations apply to all regulated financial entities: banks, insurers, fintechs, asset management companies, investment firms, information service providers (ISPs), etc.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-are-doras-main-challenges\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2113\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">What are DORA's main challenges?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2113\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"what-are-doras-main-challenges\"><p>The main objective is to professionalise IT security for financial entities in order to limit risks and guarantee service continuity.<\/p>\n<p>Main issues :<\/p>\n<p><strong>ICT risk management<\/strong><\/p>\n<ul>\n<li>Digital operational resilience strategy<\/li>\n<li>ICT risk management policy<\/li>\n<li>Information systems security policy (including physical security, logical security, access management, data and network security &#8230;. )<\/li>\n<li>ICT asset management policy and asset inventory<\/li>\n<li>ICT operations management policies and procedures<\/li>\n<li>ICT business continuity and disaster recovery policy and plans<\/li>\n<li>Awareness and security and operational resilience training<\/li>\n<\/ul>\n<p><strong>Management and reporting of ICT incidents and cyber threats<\/strong><\/p>\n<ul>\n<li>Classification procedure for ICT incidents and cyber threats<\/li>\n<li>Detection procedure, prevention and response to ICT incidents<\/li>\n<li>Procedure for reporting major ICT incidents and voluntary notification of significant cyber threats<\/li>\n<li>Procedure for reporting aggregated annual costs and losses caused by major ICT incidents<\/li>\n<li>Communication plan in the event of an ICT incident<\/li>\n<\/ul>\n<p><strong>Digital operational resilience testing<\/strong><\/p>\n<ul>\n<li>Digital operational resilience testing programme<\/li>\n<li>Operational procedures for conducting tests<\/li>\n<li>Procedure for resolving issues highlighted during testing and validating implementation of remediation plans<\/li>\n<\/ul>\n<p><strong>ICT provider risk management<\/strong><\/p>\n<ul>\n<li>Mapping of ICT services and functions, identification of ICT service providers<\/li>\n<li>Policy relating to the use of ICT services supporting critical or important functions (provided by ICT service providers)<\/li>\n<li>Register of information on contractual agreements relating to the use of ICT services provided by ICT service providers<\/li>\n<li>Exit strategies and plans<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-are-the-risks\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-2114\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">What are the risks?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2114\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"what-are-the-risks\"><p>Non-compliance can result in financial penalties, withdrawal of approval or major reputational damage.<\/p>\n<p>But over and above these penalties, the major risk is obviously that the entity&#8217;s business will be jeopardised in the event of a cyber attack.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"how-long-does-it-take-to-become-dora-compliant\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-2115\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">How long does it take to become DORA-compliant?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2115\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"how-long-does-it-take-to-become-dora-compliant\"><p>This depends on your initial level of maturity. On average, it takes between 6 and 12 months to achieve full compliance.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"whats-the-difference-between-dora-and-nis2\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-2116\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">What's the difference between DORA and NIS2?<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2116\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"whats-the-difference-between-dora-and-nis2\"><p>NIS2 is aimed at broader critical sectors. DORA is specifically designed for the financial sector, with a stronger operational and regulatory focus.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737df27 elementor-widget elementor-widget-image\" data-id=\"737df27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1196\" height=\"1196\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png\" class=\"attachment-full size-full wp-image-10200\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png 1196w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU-300x300.png 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU-1024x1024.png 1024w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU-150x150.png 150w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU-768x768.png 768w\" sizes=\"(max-width: 1196px) 100vw, 1196px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a56a5c2 e-flex e-con-boxed e-con e-parent\" data-id=\"a56a5c2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e743af elementor-widget elementor-widget-heading\" data-id=\"8e743af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Netsystem supported KERIALIS in its DORA compliance project<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bb4ca2 elementor-widget elementor-widget-image\" data-id=\"3bb4ca2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateX_effect&quot;:&quot;yes&quot;,&quot;motion_fx_devices&quot;:[&quot;widescreen&quot;,&quot;desktop&quot;],&quot;motion_fx_translateX_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;motion_fx_translateX_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"851\" height=\"315\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg\" class=\"attachment-full size-full wp-image-14183\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI.jpg 851w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI-300x111.jpg 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/12\/Kerialis_RSSI-768x284.jpg 768w\" sizes=\"(max-width: 851px) 100vw, 851px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4acc69f e-con-full e-flex e-con e-child\" data-id=\"4acc69f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2bce70b e-con-full e-flex e-con e-child\" data-id=\"2bce70b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99393ff elementor-widget elementor-widget-text-editor\" data-id=\"99393ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>KERIALIS, a social protection institution dedicated to the legal and accountancy professions, offers supplementary health, provident, long-term care, end-of-career and retirement benefits, as well as a range of services to support its policyholders on a day-to-day basis.<\/p>\n<p>The organisation wanted to improve its operational resilience by complying with the DORA regulations specific to its business sector and, more generally, to financial services companies.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a6258c e-con-full e-flex e-con e-child\" data-id=\"5a6258c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97d0b2d elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"97d0b2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\"KERIALIS was looking for a service provider to help us comply with the requirements of the DORA regulation.<br>We chose Netsystem because of the speed with which they contacted us, the quality of their discussions and the speed of their response.<br>NETSYSTEM is an agile organisation with a strong capacity to adapt and experienced CISOs, particularly in the cybersecurity aspects of DORA.\"\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Marie LEAO, Fonction cl\u00e9 conformit\u00e9 et Responsable du contr\u00f4le permanent chez KERIALIS<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4c7a13 e-flex e-con-boxed e-con e-parent\" data-id=\"c4c7a13\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9bace7c e-con-full e-flex e-con e-child\" data-id=\"9bace7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e375577 e-con-full e-flex e-con e-child\" data-id=\"e375577\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3dcbf9 elementor-widget elementor-widget-heading\" data-id=\"b3dcbf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why choose Netsystem?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94d2ff8 elementor-widget elementor-widget-text-editor\" data-id=\"94d2ff8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Proven regulatory expertise (DORA, NIS2, RGPD, ISO 27001)<\/li>\n<li>Experience of the financial sector and its constraints<\/li>\n<li>Operational and strategic support<\/li>\n<li>Certified consultants, proven methodologies<\/li>\n<li>Continuous regulatory monitoring and adaptation to changes<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae596f1 elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"ae596f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tDORA is a tremendous opportunity for financial entities to upgrade their cybersecurity and ensure the resilience of their organization.<br><br>This text is not limited to a simple compliance framework: it imposes a real transformation in IT governance, critical service provider management, incident preparedness and business continuity.<br><br>At NETSYSTEM, we support our customers not only in meeting the requirements of the regulation, but above all in deriving structural benefit from it. Our approach is based on a strategic vision, tried and tested methods, and an ability to make technical issues tangible for business and regulatory departments.<br><br>For us, DORA is an opportunity to reinforce digital confidence throughout the financial ecosystem. And that's precisely our role: to build more robust, more transparent and more resilient organizations.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Vincent FERRARA, Head of Digital Trust practice<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68fddea e-con-full e-flex e-con e-child\" data-id=\"68fddea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e2f395 elementor-widget elementor-widget-image\" data-id=\"6e2f395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"855\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-768x855.png\" class=\"attachment-medium_large size-medium_large wp-image-9495\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-768x855.png 768w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-270x300.png 270w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-920x1024.png 920w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25.png 1000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab43475 e-flex e-con-boxed e-con e-parent\" data-id=\"ab43475\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0cd9d0a e-con-full e-flex e-con e-child\" data-id=\"0cd9d0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e08058f elementor-widget elementor-widget-heading\" data-id=\"e08058f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Examples of cyber missions carried out<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f6533a elementor-widget elementor-widget-eael-post-carousel\" data-id=\"3f6533a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;items&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:3,&quot;sizes&quot;:[]},&quot;items_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;items_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"eael-post-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"swiper-container-wrap eael-post-grid-container eael-post-carousel-wrap eael-post-carousel-style-one swiper-container-wrap-dots-outside\" id=\"eael-post-grid-3f6533a\">\n\t\t\t            <div class=\"swiper swiper-8 eael-post-carousel eael-post-grid swiper-container-3f6533a eael-post-appender-3f6533a\" data-pagination=\".swiper-pagination-3f6533a\" data-arrow-next=\".swiper-button-next-3f6533a\" data-arrow-prev=\".swiper-button-prev-3f6533a\" data-items-mobile=\"1\" data-items-tablet=\"2\" data-items=\"3\" data-margin=\"10\" data-effect=\"slide\" data-speed=\"400\" data-autoplay=\"3000\" data-pause-on-hover=\"true\" data-loop=\"1\" data-dots=\"1\">\n                <div class=\"swiper-wrapper\">\n\t\t\t\t\t<div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/solimut-ebcp-update-and-crisis-exercise\/\" title=\"Solimut: EBCP update and crisis exercise\" target=\"_blank\"><h4 class=\"eael-entry-title\">Solimut: EBCP update and crisis exercise<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/delfingen-tisax-certification-rssi-as-a-service\/\" title=\"Delfingen: TISAX certification &#038; RSSI as a service\" target=\"_blank\"><h4 class=\"eael-entry-title\">Delfingen: TISAX certification &#038; RSSI as a service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/sepur-gap-analysis-and-nis2-compliance\/\" title=\"SEPUR: Gap analysis and NIS2 compliance\" target=\"_blank\"><h4 class=\"eael-entry-title\">SEPUR: Gap analysis and NIS2 compliance<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/irts-passi-audit-cybersecurity-diagnosis\/\" title=\"IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis\" target=\"_blank\"><h4 class=\"eael-entry-title\">IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/emera-group-nis2-compliance-ciso-as-a-service\/\" title=\"EMERA Group: NIS2 compliance &#038; CISO as a Service\" target=\"_blank\"><h4 class=\"eael-entry-title\">EMERA Group: NIS2 compliance &#038; CISO as a Service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/carambar-ciso-as-a-service-and-global-cybersecurity-programme\/\" title=\"Carambar: CISO as a Service and global cybersecurity programme\" target=\"_blank\"><h4 class=\"eael-entry-title\">Carambar: CISO as a Service and global cybersecurity programme<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\" title=\"Kerialis: RSSI as a service &#038; DORA Gap analysis\" target=\"_blank\"><h4 class=\"eael-entry-title\">Kerialis: RSSI as a service &#038; DORA Gap analysis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/neovacom\/\" title=\"Docoon.immo (formerly Neovacom) : ISO 27001 certification\" target=\"_blank\"><h4 class=\"eael-entry-title\">Docoon.immo (formerly Neovacom) : ISO 27001 certification<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/valorem\/\" title=\"Valorem : IT risk management\" target=\"_blank\"><h4 class=\"eael-entry-title\">Valorem : IT risk management<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/grand-narbonne\/\" title=\"Grand Narbonne: Data Security Enhancement\" target=\"_blank\"><h4 class=\"eael-entry-title\">Grand Narbonne: Data Security Enhancement<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div>                <\/div>\n            <\/div>\n            <div class=\"clearfix\"><\/div>\n\t\t\t            <!-- Add Pagination -->\n            <div class=\"swiper-pagination swiper-pagination-3f6533a\"><\/div>\n\t\t        <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caa8ad3 elementor-widget elementor-widget-heading\" data-id=\"caa8ad3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90ede3e elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-loop-carousel\" data-id=\"90ede3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:4681,&quot;slides_to_show&quot;:&quot;6&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_widescreen&quot;:&quot;3&quot;,&quot;slides_to_show_laptop&quot;:&quot;3&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Are you a financial institution that needs to comply with DORA? Let us manage your compliance at DORA Our teams get to grips with DORA quickly thanks to our experience We can support you every step of the way (audit, compliance action plan, roadmap management, raising awareness among management and staff, etc.). Our knowledge of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-11261","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA audit and compliance quotation | Cabinet expert cyber<\/title>\n<meta name=\"description\" content=\"Need a quote for an audit and compliance with DORA regulations? Netsystem, experts in cybersecurity, can help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA audit and compliance quotation | Cabinet expert cyber\" \/>\n<meta property=\"og:description\" content=\"Need a quote for an audit and compliance with DORA regulations? Netsystem, experts in cybersecurity, can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/\" \/>\n<meta property=\"og:site_name\" content=\"Netsystem\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-07T08:29:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1196\" \/>\n\t<meta property=\"og:image:height\" content=\"1196\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/\",\"name\":\"DORA audit and compliance quotation | Cabinet expert cyber\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/DoraEU.png\",\"datePublished\":\"2025-05-16T10:15:02+00:00\",\"dateModified\":\"2025-07-07T08:29:11+00:00\",\"description\":\"Need a quote for an audit and compliance with DORA regulations? Netsystem, experts in cybersecurity, can help.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/DoraEU.png\",\"contentUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/DoraEU.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/dora-audit-and-compliance-quote\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA audit and compliance quote\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\",\"name\":\"Netsystem\",\"description\":\"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.\",\"publisher\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#organization\",\"name\":\"Netsystem\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/netsystem-logo-v3.png\",\"contentUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/netsystem-logo-v3.png\",\"width\":600,\"height\":186,\"caption\":\"Netsystem\"},\"image\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA audit and compliance quotation | Cabinet expert cyber","description":"Need a quote for an audit and compliance with DORA regulations? Netsystem, experts in cybersecurity, can help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/","og_locale":"en_US","og_type":"article","og_title":"DORA audit and compliance quotation | Cabinet expert cyber","og_description":"Need a quote for an audit and compliance with DORA regulations? Netsystem, experts in cybersecurity, can help.","og_url":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/","og_site_name":"Netsystem","article_modified_time":"2025-07-07T08:29:11+00:00","og_image":[{"width":1196,"height":1196,"url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/","url":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/","name":"DORA audit and compliance quotation | Cabinet expert cyber","isPartOf":{"@id":"https:\/\/netsystem.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/#primaryimage"},"image":{"@id":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/#primaryimage"},"thumbnailUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png","datePublished":"2025-05-16T10:15:02+00:00","dateModified":"2025-07-07T08:29:11+00:00","description":"Need a quote for an audit and compliance with DORA regulations? Netsystem, experts in cybersecurity, can help.","breadcrumb":{"@id":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/#primaryimage","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/DoraEU.png"},{"@type":"BreadcrumbList","@id":"https:\/\/netsystem.fr\/en\/dora-audit-and-compliance-quote\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netsystem.fr\/en\/"},{"@type":"ListItem","position":2,"name":"DORA audit and compliance quote"}]},{"@type":"WebSite","@id":"https:\/\/netsystem.fr\/en\/#website","url":"https:\/\/netsystem.fr\/en\/","name":"Netsystem","description":"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.","publisher":{"@id":"https:\/\/netsystem.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netsystem.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netsystem.fr\/en\/#organization","name":"Netsystem","url":"https:\/\/netsystem.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","width":600,"height":186,"caption":"Netsystem"},"image":{"@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/11261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/comments?post=11261"}],"version-history":[{"count":1,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/11261\/revisions"}],"predecessor-version":[{"id":11262,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/11261\/revisions\/11262"}],"wp:attachment":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/media?parent=11261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}