About this event
Complying with the EU Cyber Resilience Act: Automating Software Bill of Materials and Supply Chain Security
Join us for a comprehensive online seminar on the upcoming EU Cyber Resilience Act (CRA) and its impact on product security and incident reporting. In this webinar, we will discuss the mandatory requirements set forth by the CRA and how they will affect manufacturers, importers, and distributors in the European Union.
Our expert panel will delve into the creation of Software Bill of Materials (SBOMs) and the security analysis of the software supply chain, explaining how these efforts must cover a product's entire supply chain and why automation is crucial to meet the regulatory requirements. You will also learn about the importance of mature product security processes from design to end-of-life and how to mitigate the risks posed by the CRA.
This seminar is ideal for anyone involved in product security, including Product Security Teams, IT Security Specialists, Head of Product Security, IoT/OT Security Managers, CISOs, and related roles. Don't miss the opportunity to stay ahead of the regulatory requirements and learn about the latest developments in product security.
If you can't attend the live session, register anyway to receive the on-demand recording.
Jan is an experienced CEO. He worked for IBM, as COO for an international VC firm, founded cybersecurity companies, supported IPOs and served as officer of a NASDAQ-listed holding. Now at ONEKEY, as CEO, he focuses on international growth & to provide a world-class IoT/OT software security solution.
As a CREST-certified ethical hacker, Florian responsibly reported dozens of zero-day vulnerabilities to software vendors and gained expertise in pentesting and security assessments of IoT devices. Now, as CTO at ONEKEY, he aids organizations by automating IoT security.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.