DORA Fundamentals

Getting Started with DORApp: Quick Start Guide (2026)

M
ByMatevž RostaherLast updatedApril 27, 2026
dorapp-setup-quick-start-guide-workspace-with-laptop-planning-materials-and-stru.jpg

You finally have buy-in for your DORA program, your deadline pressure has turned into proof-of-compliance pressure, and now the practical question lands on your desk: how do you actually get your system up and running without losing weeks to cleanup, rework, and spreadsheet chaos? That is where most teams get stuck. The software decision feels done, but the real work starts with onboarding, data structure, responsibilities, and getting the first usable Register of Information in place.

DORApp was built to help EU financial institutions turn DORA obligations into structured, auditable workflows, especially where teams need a more focused path than generic GRC tooling. If you are still clarifying the bigger regulatory picture, it helps to start with what is dora before moving into setup. This guide focuses on the practical side of dorapp setup, what to prepare, how to sequence your onboarding, which module decisions matter first, and how to avoid the slowest mistakes. The goal is not perfect data on day one. The goal is a working, controlled starting point you can improve with confidence.

  • What to prepare before you log in
  • Understanding how DORApp is structured
  • What DORApp setup is (and is not)
  • A practical DORApp onboarding sequence
  • How to handle your first Register of Information
  • ROI data model essentials: contracts, concentration risk, and subcontractors
  • Setting up governance, not just data
  • Your first 30 days in practice
  • When to ask for help
  • Choosing and rolling out DORA tooling: when a specialized platform is worth it
  • Frequently Asked Questions
  • What to prepare before you log in

    The fastest implementations usually start before anyone imports a file. From a practical standpoint, you want a short preparation phase that answers three things: who owns the process, what data sources already exist, and what your first reporting goal is.

    If your team is treating onboarding as a pure technology task, progress may stall. DORA is operational, not just technical. That means your compliance, procurement, IT, security, risk, and legal inputs often matter from the start. If you need broader context on the operational side, Dorapp’s resources on dora implementation and digital operational resilience act dora can help frame expectations.

    Gather the data sources you already have

    Most institutions do not start from zero. You may already have vendor lists, contract inventories, outsourcing registers, procurement exports, entity lists, branch structures, or previous DORA workbooks. DORApp supports import from Microsoft Excel or CSV files, and its Help Center includes predefined import templates. That means the smartest first move is usually consolidation, not manual re-entry.

    Consider this working checklist before kickoff:

  • Current ICT third-party provider list
  • Legal entity and branch structure
  • Contract and service arrangement records
  • Criticality or business impact notes, if available
  • Known identifiers such as lei data for providers and entities
  • Internal owners for each data domain
  • Decide what “good enough” looks like for week one

    The reality is that first-time onboarding rarely produces a flawless dataset. A better target is a controlled baseline: imported core records, clear ownership, visible gaps, and a repeatable process for updates. DORApp’s model was designed around DORA-specific reporting logic, which helps teams move toward compliant structure without forcing them to wait for perfect source data.

    Understanding how DORApp is structured

    DORApp is a cloud-based, modular platform built for financial entities working on DORA compliance and ongoing digital operational resilience. Based on the verified product documentation, the platform includes five modules aligned to the five DORA pillars: ROI for Register of Information, TPRM for third-party risk management and questionnaire automation, IM for incident management and reporting, RMG for risk management and governance, and IIS for information and intelligence sharing.

    Now, when it comes to dorapp onboarding, this modular design matters. You do not need to operationalize everything at once. Many teams start where their biggest reporting pain sits, then expand as processes mature.

    Start with the module tied to your immediate obligation

    For many institutions, that first pain point is the Register of Information. DORApp documentation shows that ROI was developed first, with strong support for imports, data relationships, validation, enrichment, and DORA report export in XBRL format. If your immediate concern is understanding the rule set behind the platform, read dora regulation explained alongside the implementation work.

    Platforms like DORApp can simplify the Register of Information process through a practical sequence: importing existing records, managing them in a structured interface, enriching data from public sources, validating records, and generating DORA-ready outputs. That is very different from building a static annual spreadsheet.

    What DORAssistant changes

    DORApp also includes DORAssistant, a compliance AI service described in the product materials as supporting pre-analysis, contextual guidance, and faster data-driven decision-making. It may be useful when your team wants help accelerating review work, but it should still sit inside a controlled governance process, not replace human judgment.

    What DORApp setup is (and is not)

    One phrase comes up a lot in internal conversations, especially once audit season gets close: “Are we DORA certified yet?” Here’s the thing: in most cases, there is no official “DORA certification” that a financial entity, vendor, or professional can simply obtain as a stamp of approval. What teams usually mean is something more practical: are we ready to demonstrate that our controls operate, that our data is reliable, and that we can produce consistent evidence when asked by auditors or supervisors?

    Think of DORApp setup in that same evidence-ready way. The platform can support structured workflows, validation, audit logging, and repeatable exports, but it is not a magic badge. Your credibility typically comes from the operating process you run through the platform: who owns data, who reviews changes, what gets approved, and how you show that the register stays current over time.

    What “good evidence” often looks like in practice

    Most institutions end up being judged less on whether every field was perfect on day one and more on whether their process is controlled and improving. A setup that is usually easier to defend tends to have clear ownership per data domain, a visible trail of changes, and a repeatable update cadence.

    From a practical standpoint, evidence is often strongest when you can show:

  • Named owners for providers, services, and contract records, not a single shared mailbox
  • Documented review and approval steps for material changes
  • Audit logs that demonstrate when records were created, updated, and validated
  • Recurring updates, including reminders and a consistent monthly or quarterly refresh rhythm
  • Exports that are consistent over time, so you can explain differences between versions
  • A simple “how to answer auditors” checklist

    You are not trying to over-claim compliance. You are trying to show a reasonable, controlled operating model. When someone asks for proof of readiness, you can typically point to artifacts produced by your day-to-day process, for example:

  • A current Register of Information export and an earlier export, with a clear explanation of what changed and why
  • Validation results and how issues were assigned, resolved, and rechecked
  • Approval history for key records and changes
  • Evidence of recurring governance, such as update cycles and review gates
  • A list of open gaps with owners and target dates, showing controlled remediation rather than hidden uncertainty
  • If you keep that mindset throughout onboarding, your DORApp implementation becomes more than a reporting exercise. It becomes a way to run evidence-ready operations without relying on ad hoc email threads and one-off spreadsheet versions.

    dorapp-onboarding-preparation-scene-with-organized-documents-laptop-and-planning.jpg

    A practical DORApp onboarding sequence

    If you are looking for the simplest path, think in phases instead of one big launch. DORApp’s documentation recommends a defined onboarding agenda, with full-day onboarding often suited to larger or more complex organizations and a half-day option for smaller teams or institutions that already understand DORA Register of Information requirements.

    Phase 1: Access, roles, and kickoff

    Start by making sure the right users have access and the right users do not. What many people overlook is that early confusion over roles creates bad data later. Your administrator, business owners, data maintainers, reviewers, and approvers should be identified up front. DORApp supports permissions, user administration, and audit logging, which are especially useful if you need defensible change tracking.

    Phase 2: Import core records

    DORApp supports importing Excel and CSV data. The product documentation also notes that imports should follow a specific sequence so references between records connect properly. In practice, this means you should not start with contracts if your entities and providers are not loaded yet. The system’s predefined templates may reduce mapping errors because field names match the platform structure.

    Phase 3: Review validation results

    Once records are in, do not rush to export. Review completeness, duplicates, missing relationships, and identifier issues first. DORApp includes validation features and public-data enrichment, including automatic LEI validation and enrichment from public sources where relevant. That can save manual checking time, but you still need internal review for business context and contract interpretation.

    Phase 4: Produce a first test output

    Think of your first export as a systems check, not a final filing. DORApp’s reporting layer converts platform data into DORA-compliant XBRL output, which is one reason many compliance teams prefer specialized tooling over hand-built transformation work. If you want to understand the reporting history behind DORA implementation timing, this overview of the DORA European Commission Timeline and History (2026) adds useful context.

    For institutions that want a closer look at setup options, Dorapp offers a low-friction next step through its book a DORA compliance demo page.

    If you want to quantify expected time savings and reporting impact early, run a quick ROI health check before you commit to deeper cleanup work.

    How to handle your first Register of Information

    The Register of Information is where many teams feel the pressure most clearly. Under DORA, financial entities must maintain a register of all ICT third-party service arrangements, and EU-level submissions use XBRL based on the DORA XBRL Data Point Model. The first EU-wide submission deadline was 30 April 2025, and by 2026 the focus has shifted from initial filing to evidence that your process remains current, controlled, and reliable.

    Here’s the thing: your first usable register is more important than your first perfect register. DORApp’s relationship-based data model is designed specifically for this reporting logic, which helps records stay connected across entities, branches, services, providers, and contracts.

    Focus on data relationships, not just rows

    A spreadsheet often hides structural mistakes until export. DORApp is designed to make those relationships more explicit. That matters because DORA reporting is not only about listing vendors. It is about showing how services, providers, entities, and dependencies fit together.

    If you want to browse more topic-specific guidance as your register matures, the Register of Information category is a useful place to continue.

    Use your first output to find process gaps

    In practice, this means your first report may reveal ownership gaps, missing contracts, or unclear service criticality. That is normal. DORApp’s workflow and validation approach can help teams keep moving while still flagging what needs review. Product documentation also highlights one-click creation of DORA reports and conversion to XBRL-ready output, which may reduce the burden on teams without internal reporting engineers.

    If you are ready to move from evaluation into hands-on testing, you can create your DORApp account and use the 14-day free trial to assess fit with your institution’s process.

    ROI data model essentials: contracts, concentration risk, and subcontractors

    Most implementation pain does not come from the mechanics of import and export. It comes from three data areas that tend to be messy in real institutions: contract coverage, concentration risk inputs, and subcontractor visibility. If you address these early, your first baseline is typically easier to defend and easier to keep current.

    Contracts: aim for coverage and traceability first

    In most cases, the question is not “Do we have perfect contract metadata?” It is “Can we trace every relevant ICT service arrangement to a contract or contractual record, with a clear owner?” Teams often discover that procurement lists and operational reality do not line up, for example a single master agreement reused across entities, local addenda stored elsewhere, or services that exist in practice but are not labeled as ICT in the contract inventory.

    Consider this approach for your first pass:

  • Map each in-scope service arrangement to at least one contract record, even if details are refined later
  • Keep ownership explicit, so it is clear who can confirm contract scope and clauses
  • Capture “unknown” fields honestly and create follow-up actions, instead of forcing guesses to make validation look clean
  • Concentration risk: capture the inputs you can, early

    Concentration risk is one of those topics teams often postpone because it feels like a separate project. The reality is that you usually need at least basic concentration views early to support third-party oversight conversations. Even if your first baseline is imperfect, a structured way to see which providers support multiple critical services, or support multiple entities, can shape prioritization.

    What many people overlook is that concentration risk is not only about provider size. It can also relate to dependency patterns, such as single points of failure across entities or over-reliance on a specific provider for critical functions. You do not need to solve the entire model during onboarding, but you typically do want the core relationships in place so later oversight work has something reliable to build on.

    Subcontractors and fourth parties: avoid over-scoping the first baseline

    Supply chain depth can expand quickly, and it is easy to turn the first Register of Information into an endless discovery exercise. A practical approach is to capture what you can validate up front, then iterate.

    For a first baseline, many institutions focus on:

  • Known material subcontractors for critical or important services, where the provider relationship is already documented
  • Clear links between the primary provider and the subcontractor relationship, when it is relevant to the service arrangement
  • A process owner for subcontractor updates, because these details often change over time
  • Then, as your operating rhythm stabilizes, you can expand depth where risk justifies it. This avoids a common trap: trying to capture every possible fourth party on day one, which often delays getting to a usable, controlled register.

    dorapp-implementation-onboarding-sequence-with-modular-dashboard-visuals-and-str.jpg

    Setting up governance, not just data

    Software setup is only half the story. By 2026, supervisors are increasingly interested in proof of compliance, not just that a register exists. That means your onboarding should establish governance habits early: who reviews, who approves, how changes are evidenced, and how recurring updates happen.

    DORApp documentation describes an Execution Governance Engine that supports controlled workflows, review gates, role-based permissions, required field checks, approvals, reminders, and audit-ready records. That is helpful because many DORA failures do not come from missing software. They come from unclear operating models.

    Build a realistic ownership model

    One common mistake is assigning everything to compliance. In reality, procurement may own contracts, IT may own service classification, legal may interpret clauses, and risk may challenge criticality or concentration. A good setup reflects that reality rather than forcing one team to guess. If your team needs a refresher on the five-pillar structure around these obligations, DORA Pillars Explained: Complete Breakdown (2026) is worth reviewing.

    Plan for third-party oversight beyond the register

    DORA compliance does not stop at recordkeeping. With Critical Third-Party Provider designations issued by the ESAs in late 2025 and deeper subcontracting scrutiny under Delegated Regulation (EU) 2025/532, many institutions are expanding from a filing mindset to ongoing oversight. That is where DORApp’s TPRM module may become relevant after initial ROI stabilization.

    You can also explore the broader DORA Fundamentals category if your stakeholders need foundational reading before operating in the platform.

    Your first 30 days in practice

    A successful dorapp implementation usually feels steady, not dramatic. The best first month is one where the team establishes rhythm: import, review, correct, validate, export, assign actions, repeat.

    Week-by-week view

  • Week 1: Confirm scope, users, module access, and source files.
  • Week 2: Import core entity, provider, and service data in the correct sequence.
  • Week 3: Review validation outcomes, enrichment results, and ownership gaps.
  • Week 4: Generate a test report, document issues, and define your recurring update cycle.
  • From a practical standpoint, this is also when dashboards, reports, and audit logs start becoming useful for management visibility. DORApp documentation describes configurable reporting and analytics, which may help you move board updates away from manually stitched status decks.

    If your project is still anchored to timing concerns, the article on dora implementation deadline can help align expectations with where regulators now are: less focused on whether you started, more focused on whether your controls actually operate.

    When to ask for help

    Not every issue should be solved internally. The reality is that some onboarding problems are structural, not user errors. If your institution has group-level reporting, cross-border entities, fragmented source systems, or unclear contract ownership, asking for support early may save time.

    DORApp offers a Help Center, onboarding options, and consulting support based on the verified product documentation. That does not replace legal or regulatory advice, but it can help your team configure the operating model faster and avoid preventable import and workflow mistakes.

    DORApp was built with a modular, financial-sector-specific approach shaped by practitioners working in and around regulated institutions. That focus is part of why the platform may appeal to teams that want DORA-specific workflows rather than a generalized compliance setup. If that matches your needs, a practical next step is to book a DORA compliance demo or test the platform through the 14-day free trial.

    dorapp-setup-register-of-information-workflow-with-structured-documents-contract.jpg

    Choosing and rolling out DORA tooling: when a specialized platform is worth it

    If you are evaluating tooling, it helps to be honest about what you are trying to run: a one-time reporting project, or an ongoing operating model. Generic GRC systems can work well for broad control libraries and policy workflows, but DORA teams often struggle when they need purpose-built reporting structures and repeatable evidence for ICT third-party oversight.

    What “DORA compliance software” usually does in practice

    Most specialized tools are not just “a place to store the register.” They typically focus on a few operational outcomes:

  • Register of Information data capture with relationship logic, validations, and structured exports, often including XBRL support
  • Contract and service arrangement traceability, so records can be linked back to contractual coverage and ownership
  • Concentration oversight views, so teams can prioritize where risk may accumulate across providers, entities, or critical services
  • Third-party assessment workflows, which may include questionnaires, evidence collection, reviews, and follow-ups
  • Monitoring and recurring updates, so the register does not decay after the first submission cycle
  • The difference often comes down to workflow fit. If your team has to rebuild relationship structures and export logic outside the tool, you can end up with the same spreadsheet chaos, just with a different front end.

    A practical rollout sequence that reduces rework

    For most small business owners and entrepreneurs, the best advice is to avoid big-bang launches, but DORA programs have a similar lesson. A staged rollout often reduces friction and keeps ownership clear.

    A common sequencing approach is:

  • Start with ROI to establish your baseline register, relationships, and export discipline
  • Then add third-party questionnaires and oversight workflows once the baseline data is stable enough to drive recurring activity
  • Expand into incident management and risk governance as maturity grows and you want a more integrated resilience operating model
  • DORApp’s modular structure is designed for that kind of sequencing, so you can start with the immediate reporting obligation and extend later without pretending everything is mature from day one.

    Implementation pitfalls to watch for

    Most delays come from predictable patterns. If you want your onboarding to stay on track, watch for these common pitfalls:

  • Over-customizing on day one and delaying the first usable baseline
  • Unclear data ownership, which turns validation issues into political issues
  • Treating exports as the end goal, instead of using exports to drive a controlled update cycle
  • Skipping contract traceability, then scrambling later when you need to explain coverage and responsibilities
  • If you are unsure whether your current tool stack supports this operating model, it may help to map your process first, then compare it to what DORApp’s ROI and governance workflow can support. You are not aiming for a perfect architecture. You are aiming for a controlled process you can run consistently.

    Disclaimer: The information in this article is intended for general informational and educational purposes only. It does not constitute professional technical, legal, financial, or regulatory advice. Platform capabilities, implementation outcomes, and compliance results will vary depending on your institution’s structure, data quality, governance model, and regulatory context. This article is for informational purposes only and does not constitute financial, legal, or regulatory advice. DORA compliance requirements may vary based on your institution type, size, and national regulatory framework. If you operate in a regulated sector, consult qualified financial, legal, and compliance professionals for guidance specific to your situation.

    Frequently Asked Questions

    How long does dorapp setup usually take?

    It depends on your data quality, governance structure, and how many modules you plan to activate first. A smaller institution with a clean provider list and clear ownership may get a useful first Register of Information working quickly. A larger group with multiple entities, inconsistent contracts, and fragmented source systems will typically need more time. The main point is that setup is not only a software task. It includes roles, validation, review, and reporting logic. Many teams benefit from aiming for a functional first version, then improving data quality in controlled cycles.

    What should I prepare before starting DORApp onboarding?

    Prepare your current entity structure, branch data, third-party provider records, service and contract inventories, and any existing DORA or outsourcing spreadsheets. You should also identify who owns each part of that data internally. If possible, bring known identifiers such as LEIs, because they may support validation and enrichment workflows. Just as important, define your first objective. For example, are you trying to create a first Register of Information baseline, improve your export process, or prepare for recurring oversight? Clear goals help you avoid trying to solve every DORA issue in one project.

    Do I need all DORApp modules from the start?

    No, not necessarily. DORApp is modular, so institutions can start with the area causing the most immediate operational pain. For many teams, that is the Register of Information module because it supports data structuring and XBRL report preparation. Over time, you may decide to expand into third-party risk management, incident management, risk governance, or intelligence sharing. The practical benefit of a modular setup is that you can align implementation with maturity, resources, and existing internal systems rather than forcing a full-platform rollout before your team is ready.

    Can DORApp replace spreadsheets entirely?

    In many cases, it can significantly reduce your dependence on spreadsheets, especially for maintained records, validation, workflows, and reporting outputs. That said, some teams still use spreadsheets during the preparation and cleanup phase, particularly when consolidating source data from different owners. The better question is not whether spreadsheets disappear immediately, but whether they stop being the primary operating system for your DORA process. A specialized platform may give you more control, auditability, and repeatability than email-driven workbook exchanges, especially once recurring updates and approvals become part of the process.

    Does DORApp guarantee DORA compliance?

    No. A platform can support your compliance processes, but it does not replace institution-specific interpretation, governance, or legal responsibility. DORA compliance depends on your policies, controls, operating model, third-party oversight, reporting discipline, and the expectations of your competent authority. DORApp may help structure and evidence those activities through modules, validation, reporting, and workflows, but your institution still needs qualified internal decision-makers and, where appropriate, external legal and compliance advice. It is best to think of the platform as a support system for controlled execution, not as a substitute for accountability.

    What makes the first Register of Information so difficult?

    The challenge usually is not the export itself. It is the underlying data model. Teams often discover duplicates, missing ownership, inconsistent contract names, unclear service definitions, and gaps between procurement records and operational reality. DORA reporting expects relationships between entities, providers, services, and arrangements to make sense together. That is why first-time preparation often feels messy. A structured platform can help by making those relationships visible, validating records, and creating a repeatable operating process. The first register teaches you where your data governance weaknesses are, which is valuable if you act on it.

    Is DORApp suitable for smaller financial institutions too?

    Based on the verified product documentation, yes, DORApp is positioned for financial institutions of different sizes, including smaller organizations that want focused DORA automation without the complexity of broader generic GRC suites. The modular design may be especially helpful for lean teams because it allows them to start with one priority area and expand only if needed. Smaller institutions still need good governance and accurate source data, of course. The benefit is that they may not need to overbuild their operating model if the platform already supports a practical DORA-specific structure.

    How does XBRL fit into dorapp implementation?

    XBRL matters because DORA Register of Information submissions at the EU level use XBRL based on the DORA XBRL Data Point Model. For many compliance teams, that reporting format is unfamiliar and can become a bottleneck if handled manually. DORApp’s documentation states that the platform can generate DORA-compliant report exports in XBRL from its underlying data structure. That may reduce technical friction, especially if your team does not have in-house reporting engineers. Still, you should validate the underlying business data carefully, because a technically valid file is only as reliable as the information feeding it.

    When should we book a demo instead of starting a trial immediately?

    A demo often makes sense if your institution has more complexity than a simple single-entity setup. For example, groups with multiple legal entities, national reporting variations, cross-border structures, or unclear ownership models may benefit from first walking through the implementation logic with the vendor team. A trial may be more useful when you already understand your main use case and want hands-on testing with real sample data. Both paths can work. The practical choice depends on whether your biggest uncertainty is platform fit, process design, or data readiness.

    Is there an official DORA certification for companies or professionals?

    Typically, no. DORA is a regulatory framework, and most organizations are not “certified” under DORA in the same way they might be certified under a formal certification scheme. When stakeholders ask for “DORA certification,” they are usually asking whether your institution can demonstrate evidence-ready operations, for example controlled processes, clear ownership, reliable reporting, and auditable records. If you are unsure what your regulator or auditor expects in your jurisdiction, it is wise to confirm with qualified legal and compliance professionals.

    What does DORA compliance software actually do for an institution?

    In practice, specialized DORA tooling usually supports a few concrete outcomes: building and maintaining the Register of Information with relationship logic, validating and exporting reports (often in XBRL), supporting third-party oversight workflows such as questionnaires and evidence collection, and keeping an auditable trail of changes, reviews, and approvals. The value is often in making the operating process repeatable, not only in producing a one-time export.

    How should we handle subcontractors and fourth parties in the Register of Information?

    A practical approach is to start with what you can validate and what matters most for critical or important services. Many institutions capture known material subcontractors first, link them to the relevant primary provider and service arrangement, and assign an owner for ongoing updates. Then they expand depth over time where risk justifies it. This can help you avoid delaying your first baseline by trying to capture every possible fourth party before you have a stable operating rhythm.

    How do we show “proof” of DORA readiness to auditors without over-claiming compliance?

    Focus on evidence of controlled execution rather than statements of guaranteed compliance. In many cases, you can show current and prior register exports with explained changes, validation outcomes and how issues were resolved, approval history for key updates, audit logs, and recurring update cycles with named owners. This helps demonstrate that your process operates and improves over time. Your institution should still align its evidence approach with its internal policies and the expectations of its competent authority.

    Key Takeaways

  • DORApp setup works best when you treat onboarding as a governance and data project, not just a software login task.
  • Most institutions should start with a usable Register of Information baseline, then improve quality through structured review cycles.
  • DORApp’s modular design may let you start with ROI first and expand later into TPRM or other DORA pillars as needed.
  • Import order, ownership clarity, validation review, and test exports are the core steps that shape a smoother first month.
  • A specialized DORA platform can support reporting and workflow control, but it does not replace legal, regulatory, or compliance judgment.
  • Conclusion

    Getting started with DORApp is usually less about mastering software screens and more about setting up a reliable operating rhythm. If you prepare your data sources, define ownership early, start with the module tied to your immediate reporting need, and treat the first export as a learning checkpoint, your team can move forward without waiting for perfect conditions. That matters even more in 2026, as regulators increasingly expect institutions to show ongoing control, not one-off compliance activity.

    DORApp is one platform worth exploring if you want a DORA-focused, modular approach that supports structured workflows, XBRL-ready reporting, and more auditable operational processes for financial institutions. If you want to see how it fits your environment, you can start with a personalized demo or try it directly through the 14-day free trial. You can also keep learning through the Dorapp blog if you want more practical guidance before making your next move.

    M

    About the Author

    Matevž Rostaher is Co-Founder and Product Owner of DORApp. He brings deep experience in building secure and compliant ICT solutions for the financial sector and is positioned by DORApp as an expert trusted by financial institutions on complex regulatory and operational challenges. DORApp’s own webinar materials list him as CEO and Co-Founder of Skupina Novum d.o.o. and CEO and Co-Founder of FJA OdaTeam d.o.o. His articles should carry the voice of someone who understands not just compliance requirements, but the systems and delivery realities behind them.