
Contents
ICT Security Awareness Trainings
Mandatory Training Under Article 13(6) DORA
Strengthen your organisation’s digital operational resilience with fully compliant ICT Security Awareness Training aligned with Article 13(6) DORA in conjunction with Article 5(2)(g) DORA.
Our programmes ensure all staff – from operational employees to senior management and ICT third-party providers – have the competence and behavioural security readiness required under the Digital Operational Resilience Act.
We offer four dedicated training tracks, each available as:
- Open Seminar (premium hotel venue)
- In-House Training (on your premises)
- Live Webinar
- SCORM-compliant E-Learning (LMS-ready)
Purpose of ICT Security Awareness Training
Under DORA, financial entities must ensure that human-factor risk is systematically reduced across the entire organisation. ICT security awareness is not optional: it is a mandatory component of the ICT risk management framework, directly supporting:
- prevention and detection of ICT incidents (Articles 9 and 10)
- response and recovery procedures (Article 11)
- incident reporting (Article 17)
- oversight duties of the management body (Article 5(2)(g))
- resilience of critical and important functions
- behavioural risk reduction against phishing, impersonation, social engineering and insider threats
Our training programmes are structured, role-specific, audit-ready and fully aligned with regulatory expectations.
Basic Security Awareness Training
For all employees across the organisation
Available as: Open Seminar • In-House • Webinar • SCORM E-Learning
This foundational training covers essential ICT security principles for daily work and remote environments.
Core topics include:
- secure handling of information and ICT assets
- password hygiene and multi-factor authentication
- phishing, social-engineering and impersonation detection
- safe email, internet and collaboration-tool usage
- confidentiality, integrity, availability and authenticity
- secure behaviour in hybrid and remote workplaces
- internal reporting channels for suspicious activity and ICT anomalies
The programme fulfils all baseline DORA requirements for broad workforce training under Article 13(6).
Advanced Security Awareness Training
For privileged users, ICT staff and high-risk functions
Available as: Open Seminar • In-House • Webinar • SCORM E-Learning
Designed for staff with elevated access rights or technical responsibilities.
Content includes:
- secure identity and privileged-access management
- endpoint hardening, configuration security and secure coding principles
- change-management awareness and operational risk implications
- incident detection, log awareness and escalation obligations
- cloud, SaaS and third-party security contexts
- threat intelligence awareness and vulnerability handling
This training supports high-risk functional roles as required under Articles 9, 10 and 13 DORA.
Security Awareness for Senior Management
For management body and senior leadership
Available as: Open Seminar • In-House • Webinar • SCORM E-Learning
Specifically tailored to fulfil the Article 5(2)(g) DORA competence requirement for the management body.
Topics include:
- strategic ICT risk governance responsibilities
- oversight of incident management, BCP/DR and ICT third-party arrangements
- decision-making during ICT disruptions
- understanding RTO/RPO, BIA outcomes and resilience metrics
- resource-allocation duties, including budgeting for training
- regulatory accountability for ICT risk and digital resilience
This programme ensures that senior management possesses the required ICT security competence and oversight capability.
Security Awareness for ICT Third-Party Service Providers
For vendors with logical or physical access to ICT assets
Available as: Open Seminar • In-House • Webinar • SCORM E-Learning
Under Article 13(6) DORA and Article 30(2)(i) DORA, financial entities must train relevant ICT third-party service providers.
Core topics include:
- entity-specific ICT security rules and secure-access expectations
- confidentiality and data-handling obligations
- incident notification requirements and escalation routes
- alignment with contractual clauses under Article 28 DORA
- secure behaviour for remote operations and privileged access
This programme ensures third-party alignment with your internal ICT risk management framework.
Options
All four tracks can be delivered as:
Open Seminar
Professional, interactive sessions ideal for individual bookings or small teams.
In-House Training
Tailored delivery on your premises, aligned with your ICT environment, policies and threat landscape.
Live Webinar
Flexible, instructor-led virtual training for distributed or international teams.
SCORM-Compliant E-Learning
Fully digital, LMS-ready modules with assessments, tracking, certification and version control.
All formats meet DORA’s documentation and auditability requirements.
Documentation and Certification
Each training provides:
- attendance and completion records
- assessment results and remediation actions
- versioned training materials
- compliance documentation for supervisory inspections and internal audit
- evidence for DORA Article 13(6) proof of competence