Webinar - How to Adopt DORA’s Threat Led Penetration Testing Requirements

April 22, 2025 | 2:00 p.m.–2:45 p.m. (BST) | (Online)
Register With Us

Register Now to Attend The Briefing

We will use this information to respond to your inquiry and process your data in accordance with our privacy policy.

The new Digital Operational Resilience Act (DORA) requires significant financial entities in the EU to carry out Threat-Led Penetration Testing on a regular basis. However, the skills required along with the planning for these types of exercises can prove difficult and time consuming.

In this webinar, Kroll brings together their red teaming, threat intelligence and DORA regulatory compliance experts, to provide practical guidance on how security, risk and business resiliency leaders can adopt a sustainable threat-led penetration testing (TLPT) program as required by DORA, the new regulation  impacting financial institutions in Europe.

What You’ll Learn from This Session

  • Understanding the scope and requirements of TLPT
  • The difference between TLPT and traditional penetration testing
  • How to overcome common challenges of adopting TLPT processes
  • The roles of key stakeholders including the threat intelligence team, red team, blue team and white team
  • Key lessons learned from a real-life case study

Dive Deeper into Kroll’s Cyber Risk Solutions

Get a better understanding of the breadth of Kroll’s cyber risk services. Download below for more information: 

Read the Latest Research from Kroll

Grab a copy of the latest reports and insights below and stop by to discuss with our experts. Click to download:


Threat-Led Penetration Testing

Simulate real-world attacks, uncover vulnerabilities, and strengthen your defenses in line with DORA requirements with guidance from Kroll's offensive security experts.

DORA Compliance Assessment

Are you ready for DORA compliance? Understand your gaps and build long-term digital and operational resilience.

NIS2 Compliance Assessment

Are you ready for NIS2 compliance? Understand your gaps and build long-term digital and operational resilience


Operational Technology Security

Safeguard your most critical systems against cyber threats with Kroll’s comprehensive OT security services, ensuring visibility, business continuity and resilience.

AI Risk Governance and Strategy Services

Get expert guidance on designing and executing an AI governance program focused on business outcomes and regulatory risk, ensuring your AI models are secure, compliant and trustworthy.

24x7 Incident Response

Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.


Cyber Risk Retainer

Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.

Malware Analysis and Reverse Engineering

Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.

Ransomware Preparedness Assessment

Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.


Office 365 Security, Forensics and Incident Response

Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.