ONEKEY invites you to their event

Integrating CRA Risk Management into Automated SecDevOps Workflows

About this event

In our upcoming webinar, we will demonstrate how manufacturers can efficiently implement CRA risk management requirements directly into their SecDevOps pipelines.

The upcoming Cyber Resilience Act (CRA) introduces new requirements for managing product security risks throughout the entire lifecycle — from design to deployment. Integrating these risk management and vulnerability handling obligations directly into SecDevOps processes helps manufacturers achieve continuous compliance and reduce manual effort while meeting CRA expectations for automation, traceability, and security by design.

Building on practical experience from real-world use cases, this session will explore how to:

  • Integrate CRA risk management requirements into your SecDevOps automation using an API-first approach
  • Incorporate threat modeling results directly into your vulnerability triage process for smarter prioritization
  • Apply the principle of “scan early & scan often” to ensure continuous security assurance across the development lifecycle
  • Strengthen documentation and traceability to support CRA audit readiness and long-term compliance

Participants will gain practical insights into how to automate and streamline compliance efforts while reducing manual overhead — ensuring that connected products remain secure and compliant throughout their lifecycle.

Don’t miss this opportunity to gain hands-on insights and best practices on integrating CRA requirements directly into your security and development workflows.

Hosted by

  • Team member
    T
    Maximilian Kleemann Sales Manager @ ONEKEY

    In his current role, Max helps enterprises automate and continuously monitor the security aspects of their embedded devices, using binary analysis, software bill of materials, and CI/CD pipeline integration.

  • Team member
    T
    Sebastian Schneider Sales Engineer @ ONEKEY

    Sebastian Schneider, has over a decade of experience as a Software Developer and Security Architect for embedded systems used in critical infrastructure. Now working as a Sales Engineer at ONEKEY; he uses his expertise to help clients find the best security solutions for their IACS.

ONEKEY

We automate software security & compliance of connected products at scale.

ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.