Building Resilience with DORA: Strengthening Compliance and Operational Risk Management
Free the CISO, a podcast series that attempts to free CISOs from their shackles so they can focus on securing their organization, is produced by CIO.com in partnership with DataBee®, from Comcast Technology Solutions.
In each episode, Robin Das, Executive Director at Comcast under the DataBee team, explores the CISO’s role through the position’s relationship with other security stakeholders, from regulators and the Board of Directors to internal personnel and outside vendors.
Navigating new compliance frameworks can be daunting. In this webinar, Tom Scheider and Annick O’Brien discuss the EU’s Digital Operations Resilience Act (DORA) – a regulation designed to strengthen operational risk management. Discover how DORA’s principal-based approach helps organizations to prepare for incidents, manage 3rd party risks, and build resilience.
Topics include:
- Why DORA is important and who it applies to
- 3rd Party Risk
- The 5 Pillars of DORA
- Principal-based legislation
- The influence of NIST CSF on DORA’s framework
Learn about how your organization can build resilience while navigating DORA.
Presented by:
- Tom Schneider, GRC Consultant, DataBee, A Comcast Company
- Annick O’Brien, General Counsel, CybSafe
Navigating new compliance frameworks can be daunting. In this webinar, Tom Scheider and Annick O’Brien discuss the EU’s Digital Operations Resilience Act (DORA) – a regulation designed to strengthen operational risk management. Discover how DORA’s principal-based approach helps organizations to prepare for incidents, manage 3rd party risks, and build resilience.
Topics include:
- Why DORA is important and who it applies to
- 3rd Party Risk
- The 5 Pillars of DORA
- Principal-based legislation
- The influence of NIST CSF on DORA’s framework
Learn about how your organization can build resilience while navigating DORA.
Presented by:
- Tom Schneider, GRC Consultant, DataBee, A Comcast Company
- Annick O’Brien, General Counsel, CybSafe
More posts


3 key components to Continuous Compliance and Risk Management
Discover how continuous controls monitoring, vulnerability and asset exposure management, and a unified data foundation enable automation, visibility, and strategic alignment for CISOs and cybersecurity leaders.







.jpg)


