Webinar

Webinar – From Compliance to Competitive Advantage: Strengthening Cyber Resilience

Wednesday, 13th November, 2024
10:00
1 hour

Building on the foundational insights from our previous Cyber Resilience Act (CRA) sessions earlier in the summer, this free webinar will update you on the next phase of cyber resilience by moving beyond mere compliance with the Cyber Resilience Act.

Join Julia Apostle (Orrick) and Steve Millidge (Payara) to learn actionable steps for aligning your cyber resilience initiatives with future regulations and innovations, ensuring your organization is prepared to not only meet legal requirements but also drive sustainable, long-term security.

Speaker – Julia Apostle

At Orrick, Julia counsels on compliance issues in relation to European and French tech and data regulations, including the GDPR, the Digital Services Act, the regulation of AI, the Data Act and other new and emerging legislation impacting online platforms, technology developers, and eCommerce businesses. She advises companies of all sizes on a wide range of compliance matters, ranging the drafting of internal policies, to assisting with regulatory investigations, and product counselling.

What is the Purpose of the EU Cyber Resilience Act?

A key objective of the CRA is to ensure a common and high level of cybersecurity for connected products (“products connected directly or indirectly to another device or 1network” as per the EU Cyber Resilience Act definition) made available on the European market. This will be achieved through the development and implementation of harmonized cybersecurity standards applicable to such products – throughout their lifecycle.

Are There Penalties for Non-Compliance?

Non-compliant companies can be fined $15 million or 2.5% of their global annual turnover – whichever is higher. Authorities may also intervene with orders to eliminate risk, restrict the product, or even issue a product recall.

Topics: ,

Articles You May Find Useful

Beyond Firewalls: Why Vulnerability Management is Key to Modern Application Security 7 minutes
Security

Beyond Firewalls: Why Vulnerability Management is Key to Modern Application Security

Much like corporate offices, applications are critical assets at the core of modern business operations. As they hold valuable […]