Round Table: Can your custom app deliver proof of operational effectiveness?

Wednesday
18.00
20.00
Register now

Not all digital assets demand the same level of cybersecurity scrutiny. 

Custom web-facing applications that handle critical content require the highest level of protection. And that bar has recently been raised by updated regulations such as DORA, BIO, NIS2, and DigiD. Audit requirements for critical components have evolved—from demonstrating design effectiveness to proving operational effectiveness. In practice, this means that a custom application deployed through continuous delivery pipelines needs far more than basic logging and a few sample checks. It must provide ongoing, verifiable evidence of secure and reliable operation.

Date

TIME

18.00
20.00

Costs

Free for ISACA en NOREA members

CPE Points

2 CPE

Location

Van der Valk Hotel Eindhoven
Aalsterweg 322, Eindhoven

Organiser

ISACA Netherlands Chapter
info@isaca.nl

Organiser

NOREA
norea@norea.nl
Please note: Registration is open until September 23, 2025 00:00

We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.

Accept All Accept Required Only