Excel-based templates and calculators built by a practicing CISO. Affordable, practical, and ready to use today.
Save big with our curated bundles -- everything you need in one purchase
Everything you need for full DORA compliance: 9 professional tools, 4 policy templates, and a readiness checklist. The most comprehensive toolkit available.
Get started with the essentials: incident classifier, ICT register, third-party risk assessment, plus bonus policy templates and readiness checklist.
Need just one tool? Each is available separately
Classify ICT incidents against all DORA Article 18 criteria. Dropdown-driven, auto-calculated, audit-ready.
Enhanced EBA template with all 15 RoI templates, validation, error checking, and summary dashboard.
Vendor risk questionnaire with scoring and risk matrix, pre-mapped to DORA Article 28 requirements.
Structured gap analysis mapping your current state against all key DORA requirements with prioritized remediation roadmap.
Identify critical functions, assess disruption impact, define RTOs/RPOs, and prioritize resilience investments.
Step-by-step response procedures, DORA notification timelines, escalation matrices, and communication templates.
Ongoing vendor risk monitoring with risk trending, concentration analysis, contract tracking, and SLA monitoring.
Evidence checklists, control documentation, audit response tracker, and findings remediation planner.
Ready-to-use DORA Article 30 contract addendum with 18 mandatory + 20 enhanced clauses, compliance checklist, and implementation guide.