Skip to content
ResourcesWEBINAR: A Practical Guide to DORA-Compliant Data Handling

WEBINAR: A Practical Guide to DORA-Compliant Data Handling

Cover image for webinar a practical guide to DORA-ready data handling

DORA Non-Compliance & Financial Consequences

The Digital Operational Resilience Act (DORA) is now in force across the EU. Financial institutions and ICT service providers are expected to demonstrate controlled, verifiable ICT risk management, including secure data handling practices.

Failure to comply with DORA requirements may lead to significant fines imposed by national authorities. ICT third-party service providers, for example, may be liable for penalties of up to 1% of their average daily worldwide turnover from the preceding year.

What Could That Mean in Practice?

Example: Mid-size ICT provider
Annual revenue: €150,000,000
Average daily turnover: €410,000

Daily fine (1%): €4.100,00
Maximum penalty over 180 days: €738.000,00

Operational gaps in data handling, such as uncontrolled retention, incomplete deletion, or insufficient evidence of erasure, can expose organizations to regulatory findings and financial risk.

The Key Challenges Under DORA

Understanding the risk is only the first step. The real challenge lies in operational implementation.

  • Limited Visibility Across the Data Lifecycle Most organizations focus on visible business data, while system-generated and residual data remain outside clear governance, creating blind spots and hidden risk.
  • Loss of Control Through Standard Deletion – Deleting files does not eliminate them. Without secure erasure, data becomes invisible but still recoverable, increasing compliance and security exposure.
  • Difficulty Demonstrating Compliance – Policies alone are not enough. Organizations must be able to prove data discovery, retention enforcement and secure removal in a clear and auditable way.

What You’ll Learn

In this session, we move beyond theory and focus on the operational side of DORA-compliant data handling. By the end of this session, you’ll have a clearer framework for improving visibility, control and demonstrability in your DORA data handling processes.

  • Translate relevant DORA articles into operational data handling requirements
  • Increase visibility across the full data lifecycle
  • Reduce residual data risk caused by standard deletion
  • Strengthen retention enforcement with secure erasure
  • Move from assumed control to demonstrable, audit-ready compliance

Who Should Watch

This webinar is designed for professionals responsible for operational resilience, data protection, and ICT risk management, including:

  • CISOs and IT security leaders
  • IT infrastructure and endpoint management teams
  • Compliance and risk officers
  • Data protection officers (DPOs)
  • ICT service providers supporting financial institutions

If you are responsible for demonstrating ICT risk control under DORA, this session is for you.

Watch Webinar: A Practical Guide to DORA-Compliant Data Handling

If your organization is reviewing DORA-related data handling practices, our team can help you assess visibility gaps, retention processes and erasure workflows.

Related Resources

For a deeper exploration of the topics discussed in the webinar:

Speaker

Portrait of Aleksei Boltunov, COO of Jetico and contributing writer for the Jetico blog

Alexey Boltunov

Alexey Boltunov is Chief Operating Officer at Jetico, with over a decade of hands-on experience in endpoint data protection and secure data handling. With a background in engineering, software testing and operations, Alexey has worked closely with organizations operating under strict security and compliance requirements – from government agencies to regulated commercial enterprises.

In recent years, his focus has shifted toward helping compliance-driven organizations translate regulatory requirements such as GDPR, NIS2 and DORA into practical, operational data handling processes. His approach combines technical depth with real-world implementation experience, bridging the gap between regulatory expectations and day-to-day data management.

Supporting DORA-Compliant Data Handling with BCWipe & Search

Turning principles into practice requires the right operational tools.
Under DORA, organizations must maintain control over data throughout its lifecycle and demonstrate that control when needed.

Jetico’s BCWipe and Search capabilities support this operational model by enabling organizations to:

Back to all Resources

Enhance Your Data Protection Now

Request a free consultation with our data protection specialist to learn how our solutions can help you secure your endpoints.