FYI
--
CeDeROM, SQ7MHZ, http://www.tomek.cedro.info


---------- Forwarded message ---------
From: Embedded Webinar
Date: Thu, Feb 12, 2026 at 4:07 PM
Subject: NEXT WEEK'S LIVE Event: The EU Cyber Resilience Act Explained:
Scope, Standards, & What to Do Now



LIVE Event:
*The EU Cyber Resilience Act Explained: Scope, Standards, & What to Do Now*
<https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E>
*February 19th, 2026 12PM ET*
[image: Header]

Sponsored by:

[image: Sponsors]

REGISTER NOW
<https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E>


The EU Cyber Resilience Act (CRA) is the most significant product
cybersecurity regulation in history. Given the vast scope of this new law,
it will fundamentally change how hardware and software are sold in Europe.

Hundreds of thousands of companies will need to conform, and for many, this
will be the first time they are legally required to integrate cybersecurity
into their product lifecycle.

Does this apply to you? If you sell consumer, communications, industrial,
or semiconductor products, software or hardware, with a data connection in
the EU, the answer is yes.

Crucially, this applies to all connected products in your portfolio
regardless of when they were originally designed or introduced.

The stakes are high. Non-compliance carries penalties of up to €15 million
or 2.5% of global annual turnover, whichever is higher. Yet, a 2025 Linux
Foundation report revealed that 62% of respondents still have low
familiarity with the CRA’s technical demands.

Join us to close that gap. We will cut through the legal jargon and provide
a practical roadmap for conformity. In this webinar, we will cover:

   - The milestones and deadlines
   - Scope & Classification: How to determine if your product is Class I,
   Class II, Critical or Default.
   - The Standards: Which cybersecurity standards (like IEC 62443 or ETSI
   303 645) can help support compliance.
   - Steps an organization needs to take.
   - The To-Do List: Immediate steps for "Security-by-Design" and
   vulnerability handling.
   - The latest updates from the EU Commission.
   - Solutions: Tools and services for EU CRA conformity,
   security-by-design, and lifecycle management.

If unable to attend, please register to receive the post-event recording
link.

*Speakers:*
Colin Duggan, Founder and CEO of BG Networks
Eric Clauss, Chief Commercial Officer, ISS
Milton Yarberry, Director of Medical Programs for ICS
REGISTER NOW
<https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E>
Not able to attend? Register now
<https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E>
and after the event you will receive an e-mail to the recorded
presentation.

To ensure email delivery to your inbox, please add [email protected] to
your address book or your safe sender contacts list.

------------------------------

To view this email as a web page, click here
<https://go.opensysmedia.com/webmail/1039643/559390971/a477d1e17f11b089c094da97ec48910a22c53844428c3f1825f19ce9f9b5f6d0>
.

OpenSystems Media | 3120 W Carefree Hwy, Ste 1-640, Phoenix, AZ 85086

Reply via email to