{"id":131,"date":"2026-04-08T19:28:45","date_gmt":"2026-04-08T19:28:45","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=131"},"modified":"2026-04-16T17:04:31","modified_gmt":"2026-04-16T15:04:31","slug":"nis-2-and-dora-training-schedule","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/en\/nis-2-and-dora-training-schedule\/","title":{"rendered":"NIS-2 and DORA Training Schedule"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill-element is-style-ext-preset--media-text--natural-1--card-1 ext-animate--on has-tertiary-background-color has-background is-style-ext-preset--media-text--natural-1--card-1--2\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg\" alt=\"\" class=\"wp-image-162 size-full\" style=\"object-position:50% 50%\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82-768x512.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group alignwide ext-animate--on is-vertical is-layout-flex wp-container-core-group-is-layout-53474e87 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-812d5580 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h2 class=\"wp-block-heading ext-animate--on\">NIS-2 and DORA Training Schedule \u2013 The Key to Compliance and Security<\/h2>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-6fee25ed wp-block-group-is-layout-flex\" style=\"margin-top:24px;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-2ca071df wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-container-content-c42f3963 wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on wp-container-content-9cfa9a5a\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">NIS-2 and DORA Training Schedule &#8211; Date: Every first Friday of the month 09:00 am CET<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-2ca071df wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on wp-container-content-9cfa9a5a\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">Location: MS Teams<\/p>\n<\/div>\n<\/div>\n\n\n\n<p class=\"ext-animate--on\"> We invite you to attend a specialized training session on NIS-2 and DORA regulations, organized by JDA Advisory. Learn about the practical aspects of implementing these regulatory requirements to ensure your organization\u2019s full compliance. Once we receive your electronic registration request for the training, we will send you a pro forma invoice for payment. After the payment is processed electronically, we will send you a confirmation of your participation in the training and a link to the MS Teams platform for this session. The training will be conducted in English <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/en\/contact\/\">Sign up now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--4\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">NIS-2 Training Plan \u2013 Comprehensive Program (1 day \/ 2 days \/ modular)<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">Below is a comprehensive, professional NIS-2 training plan, developed in the JDA Advisory style: practical, operational, with an emphasis on real-world implementations, organizational maturity, and regulatory compliance.<\/p>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\"><strong>Training objectives:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Laying the groundwork for auditing, reporting, and oversight.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Understanding the requirements of the NIS-2 Directive and related implementing acts.<\/li>\n\n\n\n<li class=\"ext-animate--on\">The ability to translate requirements into processes, roles, and controls within the organization.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Preparing for the practical implementation of NIS-2 (ICT, cybersecurity, governance, risk, compliance).<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--5\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">NIS-2 and DORA Training Schedule \u2013 Module 1. Introduction to NIS-2<\/h3>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Scope of the directive and covered entities (essential\/important entities).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Differences between NIS-2 and NIS (NIS 2016).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Links to DORA, GDPR, KSC, ISO 27001, ENISA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Key definitions: critical service, incident, risk, supply chain.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 4. Incident Management<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Definitions of incidents according to NIS-2.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Reporting thresholds and deadlines.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident response process (SOC\/CSIRT\/management).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements for communication with supervisory authorities.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Examples of incident scenarios and exercises.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 7. Risk Analysis in Accordance with NIS-2<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Methodology for ICT and cyber risk assessment.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Integration with ISO 27005, ENISA, and DORA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk registers, KRIs, and mapping risks to controls.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Workshop: Risk assessment for a selected process.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--6\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center ext-animate--on\">NIS-2 and DORA Training Schedule \u2013 Module 2. Organizational obligations under NIS-2<\/h3>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Governance and management responsibility.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements for policies, procedures, and documentation.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements for ICT security and cybersecurity.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements for incident management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements for business continuity and operational resilience.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements for the ICT supply chain and suppliers.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 5. Business Continuity Management and Operational Resilience<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">NIS-2 requirements regarding BCM and DRP.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Links to ISO 22301 and DORA Operational Resilience.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Business Impact Analysis (BIA), scenarios, tests, and exercises.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Minimum resilience requirements for critical entities.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 8. Documentation and Evidence of Compliance<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">How to prepare documentation compliant with NIS-2.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Required policies, procedures, logs, and reports.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How to build audit trails.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sample templates and checklists.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 3. Technical and Organizational Measures (MTO)<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Security controls required by NIS-2.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Minimum security measures according to ENISA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Integration with ISO 27001 Annexes A and DORA ICT Risk Management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Examples of practical implementations in organizations of various sizes.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 6. Supplier and Supply Chain Management<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">NIS-2 requirements regarding third-party risk management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Criteria for evaluating ICT and critical service providers.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contracts, SLAs, OLAs, and security clauses.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Examples of controls and checklists.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 9. NIS-2 Audit and Preparation for an Inspection<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Scope of the audit and regulatory requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">A step-by-step guide to the NIS-2 audit.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How to prepare your organization for the audit.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Common non-compliances and errors.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/en\/contact\/\">Please feel free to contact us\u2014we\u2019ll be happy to provide you with a quote for this training.<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--8\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">DORA Training Plan \u2013 Comprehensive Program (1-day \/ 2-day \/ modular)<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">Below is a comprehensive, professional DORA training plan, developed in the JDA Advisory style: practical, operational, with an emphasis on real-world implementation, organizational maturity, operational resilience, and regulatory compliance.<\/p>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\"><strong>Training objectives:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Understanding the requirements of the DORA Regulation and delegated\/implementing acts (RTS\/ITS).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Ability to translate these requirements into ICT, cybersecurity, BCM, risk, and governance processes.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Preparing the organization for DORA implementation and supervisory audits.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Developing a practical plan for implementing operational resilience.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--9\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 1. Introduction to DORA<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Scope of the Regulation and covered entities (FI, ICT providers, critical suppliers).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Relationship between DORA and NIS-2, GDPR, PSD2, EBA\/ESMA\/EIOPA Guidelines, ISO 27001, ISO 22301.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Key definitions: ICT risk, operational resilience, critical functions, ICT services.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Structure of RTS\/ITS and their impact on implementation.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 4. ICT Incident Management<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Definitions of incidents according to DORA and classification thresholds.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident handling process (SOC, CSIRT, management).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Reporting requirements to supervisory authorities (24-hour, 72-hour, final report).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Integration with NIS-2 and national requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Workshop: Incident classification and report preparation.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 7. Business Continuity Management (BCM) and DRP<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">DORA Requirements for BCM and Disaster Recovery.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Integration with ISO 22301 and BIA\/RA.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Scenarios, tests, exercises, minimum resilience levels.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Documentation and evidence of compliance.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--10\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 2. Governance and Board Accountability<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">The role of the board in overseeing ICT risk management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Requirements regarding policies, strategies, and reporting.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Responsibility for operational resilience and ICT outsourcing.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Oversight mechanisms and accountability.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 5. Operational Resilience Testing<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Testing requirements: basic, advanced, TLPT (Threat-Led Penetration Testing).<\/li>\n\n\n\n<li class=\"ext-animate--on\">Scope, frequency, documentation, and evidence.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How to prepare an organization for TLPT.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Examples of test scenarios.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 8. Advanced Stress Testing (TLPT)<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Requirements for significant entities.<\/li>\n\n\n\n<li class=\"ext-animate--on\">The roles of the Red Team, Blue Team, and Purple Team.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Scope, methodology, and reporting.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How to prepare an organization for TLPT, step by step.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--11\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Modu\u0142 3. ICT Risk Management Framework<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">DORA requirements for ICT risk management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Integration with ISO 27005, ENISA, and NIST CSF.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identification, assessment, monitoring, and reporting of ICT risks.<\/li>\n\n\n\n<li class=\"ext-animate--on\">KRI, KPI, risk registers, and mapping risks to controls.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Examples of practical implementations.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 6. ICT Supplier and Supply Chain Management<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">DORA requirements for ICT outsourcing and third-party risk management.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Critical ICT suppliers \u2013 responsibilities, oversight, registries, risk assessments.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Contracts, SLAs, OLAs, DORA-ready clauses.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier monitoring and audits.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Workshop: Assessing ICT suppliers according to DORA.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Module 9. Documentation, Evidence, and the DORA Audit<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Required policies, procedures, records, and reports.<\/li>\n\n\n\n<li class=\"ext-animate--on\">How to build evidence of compliance.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Preparing for a surveillance audit.<\/li>\n\n\n\n<li class=\"ext-animate--on\">The most common nonconformities and errors.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/en\/contact\/\">Please feel free to contact us\u2014we\u2019ll be happy to provide you with a quote for this training.<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--12\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<figure class=\"wp-block-table ext-animate--on\"><table class=\"has-fixed-layout\"><tbody><tr><td><span style=\"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-family: -webkit-standard; font-size: medium; white-space: normal;\">Net price of the DORA training course in euros<\/span>&nbsp;<\/td><td>Note<\/td><td><span style=\"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-family: -webkit-standard; font-size: medium; white-space: normal;\">Net price of the NIS-2 training course in euros<\/span><\/td><td>Note<\/td><\/tr><tr><td>500,00<\/td><td><\/td><td>500,00<\/td><td>Price per person<\/td><\/tr><tr><td><\/td><td>Price per person<\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--13\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-20186816 wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Testimonials and Participant Feedback<\/h4>\n\n\n\n<p class=\"ext-animate--on\">Discover the success stories of our participants and their positive feedback on the NIS-2 and DORA training programs conducted by JDA Advisory.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-47c06fe3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--14\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:24px;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">The training provided me with practical knowledge and confidence regarding compliance with NIS-2 and DORA.<\/p>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-e504371c wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-8d3fcc49 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image aligncenter is-style-rounded ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c972b533584bb5f528690a71c4e98cb9d6ac3c0c.jpg\" alt=\"\" class=\"wp-image-52\" style=\"object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-639b5052 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on has-small-font-size\" style=\"font-style:normal;font-weight:600\">Anna Kowalska<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\" style=\"margin-top:4px;margin-bottom:0\">IT Security Specialist<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--15\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMTE2IiBoZWlnaHQ9IjE5IiB2aWV3Qm94PSIwIDAgMTE2IDE5IiBmaWxsPSJub25lIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPgo8ZyBjbGlwLXBhdGg9InVybCgjY2xpcDBfMzAyXzE5MTQpIj4KPHBhdGggZD0iTTkuMDcwODggMC42MTIzNDNDOS40MTQ2MiAtMC4yMDQxMTUgMTAuNTg1NCAtMC4yMDQxMTQgMTAuOTI5MSAwLjYxMjM0NkwxMi45NTc5IDUuNDMxMjNDMTMuMTAyOSA1Ljc3NTQzIDEzLjQzMDYgNi4wMTA2MSAxMy44MDY3IDYuMDQwNEwxOS4wNzI3IDYuNDU3NDhDMTkuOTY0OSA2LjUyODE0IDIwLjMyNjcgNy42MjgxMyAxOS42NDY5IDguMjAzNEwxNS42MzQ4IDExLjU5ODdDMTUuMzQ4MiAxMS44NDEyIDE1LjIyMyAxMi4yMjE4IDE1LjMxMDYgMTIuNTg0M0wxNi41MzYzIDE3LjY2MUMxNi43NDQgMTguNTIxMSAxNS43OTY5IDE5LjIwMSAxNS4wMzMgMTguNzQwMUwxMC41MjQ1IDE2LjAxOTZDMTAuMjAyNSAxNS44MjUyIDkuNzk3NSAxNS44MjUyIDkuNDc1NDggMTYuMDE5Nkw0Ljk2Njk5IDE4Ljc0MDFDNC4yMDMxMSAxOS4yMDEgMy4yNTU5NiAxOC41MjExIDMuNDYzNjMgMTcuNjYxTDQuNjg5NDIgMTIuNTg0M0M0Ljc3Njk4IDEyLjIyMTggNC42NTE4MiAxMS44NDEyIDQuMzY1MjYgMTEuNTk4N0wwLjM1MzA2MiA4LjIwMzRDLTAuMzI2NzE4IDcuNjI4MTMgMC4wMzUwNjc5IDYuNTI4MTQgMC45MjcyOTEgNi40NTc0OEw2LjE5MzM2IDYuMDQwNEM2LjU2OTUgNi4wMTA2MSA2Ljg5NzE2IDUuNzc1NDMgNy4wNDIwNyA1LjQzMTIzTDkuMDcwODggMC42MTIzNDNaIiBmaWxsPSIjMjIyMjIyIi8+CjxwYXRoIGQ9Ik0zMy4wNzA5IDAuNjEyMzQzQzMzLjQxNDYgLTAuMjA0MTE1IDM0LjU4NTQgLTAuMjA0MTE0IDM0LjkyOTEgMC42MTIzNDZMMzYuOTU3OSA1LjQzMTIzQzM3LjEwMjkgNS43NzU0MyAzNy40MzA2IDYuMDEwNjEgMzcuODA2NyA2LjA0MDRMNDMuMDcyNyA2LjQ1NzQ4QzQzLjk2NDkgNi41MjgxNCA0NC4zMjY3IDcuNjI4MTMgNDMuNjQ2OSA4LjIwMzRMMzkuNjM0OCAxMS41OTg3QzM5LjM0ODIgMTEuODQxMiAzOS4yMjMgMTIuMjIxOCAzOS4zMTA2IDEyLjU4NDNMNDAuNTM2MyAxNy42NjFDNDAuNzQ0IDE4LjUyMTEgMzkuNzk2OSAxOS4yMDEgMzkuMDMzIDE4Ljc0MDFMMzQuNTI0NSAxNi4wMTk2QzM0LjIwMjUgMTUuODI1MiAzMy43OTc1IDE1LjgyNTIgMzMuNDc1NSAxNi4wMTk2TDI4Ljk2NyAxOC43NDAxQzI4LjIwMzEgMTkuMjAxIDI3LjI1NiAxOC41MjExIDI3LjQ2MzYgMTcuNjYxTDI4LjY4OTQgMTIuNTg0M0MyOC43NzcgMTIuMjIxOCAyOC42NTE4IDExLjg0MTIgMjguMzY1MyAxMS41OTg3TDI0LjM1MzEgOC4yMDM0QzIzLjY3MzMgNy42MjgxMyAyNC4wMzUxIDYuNTI4MTQgMjQuOTI3MyA2LjQ1NzQ4TDMwLjE5MzQgNi4wNDA0QzMwLjU2OTUgNi4wMTA2MSAzMC44OTcyIDUuNzc1NDMgMzEuMDQyMSA1LjQzMTIzTDMzLjA3MDkgMC42MTIzNDNaIiBmaWxsPSIjMjIyMjIyIi8+CjxwYXRoIGQ9Ik01Ny4wNzA5IDAuNjEyMzQzQzU3LjQxNDYgLTAuMjA0MTE1IDU4LjU4NTQgLTAuMjA0MTE0IDU4LjkyOTEgMC42MTIzNDZMNjAuOTU3OSA1LjQzMTIzQzYxLjEwMjkgNS43NzU0MyA2MS40MzA2IDYuMDEwNjEgNjEuODA2NyA2LjA0MDRMNjcuMDcyNyA2LjQ1NzQ4QzY3Ljk2NDkgNi41MjgxNCA2OC4zMjY3IDcuNjI4MTMgNjcuNjQ2OSA4LjIwMzRMNjMuNjM0OCAxMS41OTg3QzYzLjM0ODIgMTEuODQxMiA2My4yMjMgMTIuMjIxOCA2My4zMTA2IDEyLjU4NDNMNjQuNTM2MyAxNy42NjFDNjQuNzQ0IDE4LjUyMTEgNjMuNzk2OSAxOS4yMDEgNjMuMDMzIDE4Ljc0MDFMNTguNTI0NSAxNi4wMTk2QzU4LjIwMjUgMTUuODI1MiA1Ny43OTc1IDE1LjgyNTIgNTcuNDc1NSAxNi4wMTk2TDUyLjk2NyAxOC43NDAxQzUyLjIwMzEgMTkuMjAxIDUxLjI1NiAxOC41MjExIDUxLjQ2MzYgMTcuNjYxTDUyLjY4OTQgMTIuNTg0M0M1Mi43NzcgMTIuMjIxOCA1Mi42NTE4IDExLjg0MTIgNTIuMzY1MyAxMS41OTg3TDQ4LjM1MzEgOC4yMDM0QzQ3LjY3MzMgNy42MjgxMyA0OC4wMzUxIDYuNTI4MTQgNDguOTI3MyA2LjQ1NzQ4TDU0LjE5MzQgNi4wNDA0QzU0LjU2OTUgNi4wMTA2MSA1NC44OTcyIDUuNzc1NDMgNTUuMDQyMSA1LjQzMTIzTDU3LjA3MDkgMC42MTIzNDNaIiBmaWxsPSIjMjIyMjIyIi8+CjxwYXRoIGQ9Ik04MS4wNzA2IDAuNjEyMzQzQzgxLjQxNDQgLTAuMjA0MTE1IDgyLjU4NTEgLTAuMjA0MTE0IDgyLjkyODkgMC42MTIzNDZMODQuOTU3NiA1LjQzMTIzQzg1LjEwMjYgNS43NzU0MyA4NS40MzAzIDYuMDEwNjEgODUuODA2NCA2LjA0MDRMOTEuMDcyNCA2LjQ1NzQ4QzkxLjk2NDYgNi41MjgxNCA5Mi4zMjY0IDcuNjI4MTMgOTEuNjQ2NiA4LjIwMzRMODcuNjM0NSAxMS41OTg3Qzg3LjM0OCAxMS44NDEyIDg3LjIyMjggMTIuMjIxOCA4Ny4zMTAzIDEyLjU4NDNMODguNTM2MSAxNy42NjFDODguNzQzOCAxOC41MjExIDg3Ljc5NjYgMTkuMjAxIDg3LjAzMjggMTguNzQwMUw4Mi41MjQzIDE2LjAxOTZDODIuMjAyMyAxNS44MjUyIDgxLjc5NzMgMTUuODI1MiA4MS40NzUyIDE2LjAxOTZMNzYuOTY2NyAxOC43NDAxQzc2LjIwMjkgMTkuMjAxIDc1LjI1NTcgMTguNTIxMSA3NS40NjM0IDE3LjY2MUw3Ni42ODkyIDEyLjU4NDNDNzYuNzc2NyAxMi4yMjE4IDc2LjY1MTYgMTEuODQxMiA3Ni4zNjUgMTEuNTk4N0w3Mi4zNTI4IDguMjAzNEM3MS42NzMgNy42MjgxMyA3Mi4wMzQ4IDYuNTI4MTQgNzIuOTI3IDYuNDU3NDhMNzguMTkzMSA2LjA0MDRDNzguNTY5MyA2LjAxMDYxIDc4Ljg5NjkgNS43NzU0MyA3OS4wNDE4IDUuNDMxMjNMODEuMDcwNiAwLjYxMjM0M1oiIGZpbGw9IiMyMjIyMjIiLz4KPHBhdGggZD0iTTEwNS4wNzEgMC42MTIzNDNDMTA1LjQxNCAtMC4yMDQxMTUgMTA2LjU4NSAtMC4yMDQxMTQgMTA2LjkyOSAwLjYxMjM0NkwxMDguOTU4IDUuNDMxMjNDMTA5LjEwMyA1Ljc3NTQzIDEwOS40MyA2LjAxMDYxIDEwOS44MDYgNi4wNDA0TDExNS4wNzIgNi40NTc0OEMxMTUuOTY1IDYuNTI4MTQgMTE2LjMyNiA3LjYyODEzIDExNS42NDcgOC4yMDM0TDExMS42MzUgMTEuNTk4N0MxMTEuMzQ4IDExLjg0MTIgMTExLjIyMyAxMi4yMjE4IDExMS4zMSAxMi41ODQzTDExMi41MzYgMTcuNjYxQzExMi43NDQgMTguNTIxMSAxMTEuNzk3IDE5LjIwMSAxMTEuMDMzIDE4Ljc0MDFMMTA2LjUyNCAxNi4wMTk2QzEwNi4yMDIgMTUuODI1MiAxMDUuNzk3IDE1LjgyNTIgMTA1LjQ3NSAxNi4wMTk2TDEwMC45NjcgMTguNzQwMUMxMDAuMjAzIDE5LjIwMSA5OS4yNTU3IDE4LjUyMTEgOTkuNDYzNCAxNy42NjFMMTAwLjY4OSAxMi41ODQzQzEwMC43NzcgMTIuMjIxOCAxMDAuNjUyIDExLjg0MTIgMTAwLjM2NSAxMS41OTg3TDk2LjM1MjggOC4yMDM0Qzk1LjY3MyA3LjYyODEzIDk2LjAzNDggNi41MjgxNCA5Ni45MjcgNi40NTc0OEwxMDIuMTkzIDYuMDQwNEMxMDIuNTY5IDYuMDEwNjEgMTAyLjg5NyA1Ljc3NTQzIDEwMy4wNDIgNS40MzEyM0wxMDUuMDcxIDAuNjEyMzQzWiIgZmlsbD0iIzIyMjIyMiIvPgo8L2c+CjxkZWZzPgo8Y2xpcFBhdGggaWQ9ImNsaXAwXzMwMl8xOTE0Ij4KPHJlY3Qgd2lkdGg9IjExNiIgaGVpZ2h0PSIxOC44ODg5IiBmaWxsPSJ3aGl0ZSIvPgo8L2NsaXBQYXRoPgo8L2RlZnM+Cjwvc3ZnPgo=\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"ext-animate--on\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:24px;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.417), 18px);\">Thanks to the training provided by JDA Advisory, our procedures are now in compliance with the latest regulatory standards.<\/p>\n\n\n\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-e504371c wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-fe9d9fd4 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image aligncenter is-style-rounded ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/7eb4ef9a68feff39027046fe0fee04f45441286b.jpg\" alt=\"\" class=\"wp-image-53\" style=\"object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-639b5052 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on has-small-font-size\" style=\"font-style:normal;font-weight:600\">Micha\u0142 Nowak<\/h4>\n\n\n\n<p class=\"ext-animate--on has-small-font-size\" style=\"margin-top:4px;margin-bottom:0\">Risk Management Manager<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS-2 Act<\/a><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NIS-2 and DORA Training Schedule \u2013 The Key to Compliance and Security NIS-2 and DORA Training Schedule &#8211; Date: Every first Friday of the month 09:00 am CET Location: MS Teams We invite you to attend a specialized training session on NIS-2 and DORA regulations, organized by JDA Advisory. Learn about the practical aspects of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-131","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS-2 and DORA Training Schedule - JDA Advisory<\/title>\n<meta name=\"description\" content=\"NIS-2 and DORA Training Schedule. Hands-on training on NIS-2 and DORA requirements, audits, incidents, BCM, and suppliers. Competences in DORA\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/en\/nis-2-and-dora-training-schedule\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS-2 and DORA Training Schedule - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"NIS-2 and DORA Training Schedule. Hands-on training on NIS-2 and DORA requirements, audits, incidents, BCM, and suppliers. Competences in DORA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/en\/nis-2-and-dora-training-schedule\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T15:04:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/\",\"name\":\"NIS-2 and DORA Training Schedule - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg\",\"datePublished\":\"2026-04-08T19:28:45+00:00\",\"dateModified\":\"2026-04-16T15:04:31+00:00\",\"description\":\"NIS-2 and DORA Training Schedule. Hands-on training on NIS-2 and DORA requirements, audits, incidents, BCM, and suppliers. Competences in DORA\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-and-dora-training-schedule\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS-2 and DORA Training Schedule\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS-2 and DORA Training Schedule - JDA Advisory","description":"NIS-2 and DORA Training Schedule. Hands-on training on NIS-2 and DORA requirements, audits, incidents, BCM, and suppliers. Competences in DORA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/en\/nis-2-and-dora-training-schedule\/","og_locale":"en_GB","og_type":"article","og_title":"NIS-2 and DORA Training Schedule - JDA Advisory","og_description":"NIS-2 and DORA Training Schedule. Hands-on training on NIS-2 and DORA requirements, audits, incidents, BCM, and suppliers. Competences in DORA","og_url":"https:\/\/jdaadvisory.com\/en\/nis-2-and-dora-training-schedule\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-16T15:04:31+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/","url":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/","name":"NIS-2 and DORA Training Schedule - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg","datePublished":"2026-04-08T19:28:45+00:00","dateModified":"2026-04-16T15:04:31+00:00","description":"NIS-2 and DORA Training Schedule. Hands-on training on NIS-2 and DORA requirements, audits, incidents, BCM, and suppliers. Competences in DORA","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/cb949c42e9da6b686e50ec2b794421fa7df02e82.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/nis-2-and-dora-training-schedule\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"NIS-2 and DORA Training Schedule"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":19,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/131\/revisions"}],"predecessor-version":[{"id":587,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/131\/revisions\/587"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/media?parent=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}