Description
Episode 3: PanDORA’s box
Jimi Piggott-Bader, Bas Jennen and Leonard van den Ende summarise the DORA rules for reporting incidents and significant cyber threats.
Leonard van den Ende: “DORA now prescribes that you have specific processes for identifying, tracking and logging ICT-related incidents.”
To download a copy of the guide, visit our website.
Episode 10: CSDDD explained: Interaction with the German Supply Chain Act
In this episode, Partner Julia Grothaus and Managing Associate Kathrin Bauwens in our German team discuss the similarities and differences between the CSDDD and the German Supply Chain Act, as well as any lessons we can...
Published 10/10/24
Episode 9: CSDDD explained: enforcement and penalties
In this episode, Managing Associate James Marlow in the London ESG team speaks with Senior Associate Liz Raulston in the US team and Knowledge Lawyer & Head of ESG Regional Development for Asia, Gilly Hutchinson, about the EU CSDDD’s...
Published 10/10/24
Episode 18: The Linklaters Ideas Foundry
Speakers: Jane Booth, Alyssa Bonic and Ian Rodwell
In the dynamic and volatile world of organisational life, every leader needs to be nimble on their feet, be audience ready and demonstrate a performer mindset. And for Jane Booth (Head of Guildhall Ignite)...
Published 10/10/24