The Cyber Resilience Act (Cra): A Practical Guide
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 712.32 MB | Duration: 2h 4m
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 712.32 MB | Duration: 2h 4m
Understand and Comply with the EU's Cybersecurity Framework for Digital Products (CRA)
What you'll learn
Understand the scope and objectives of the European Cyber Resilience Act.
Identify the key requirements for cybersecurity in digital products.
Learn the steps for ensuring product compliance with CRA standards.
Develop practical skills for creating secure digital products and handling vulnerabilities.
Requirements
Basic understanding of cybersecurity concepts.
Description
This course introduces the European Cyber Resilience Act (CRA), providing a clear understanding of its provisions, compliance requirements, and practical steps for implementation. Perfect for cybersecurity professionals, business leaders, and anyone involved in the development or management of digital products, this course will guide you through the essential requirements, annexes, and hands-on processes to ensure your products meet EU cybersecurity standards under the CRA.The course is divided into two sections. In the first part, we will review the law from a theoretical perspective. For every chapter covered, we will identify and extract the actions necessary to ensure compliance in our products. Once these concepts are well understood, we will move to the practical section of the course, where we will develop processes and apply what we have learned to a real-world scenario.Participants will explore critical topics such as mandatory cybersecurity measures, post-market monitoring obligations, and the responsibilities of manufacturers and importers. Additionally, you'll gain valuable insights into navigating the annexes, understanding enforcement mechanisms, and implementing security processes to align with EU expectations. By the end of the course, you’ll be equipped with the knowledge and tools to ensure your organization's digital products are secure, resilient, and fully compliant with the CRA.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Course structure and supporting material
Section 2: The European Cyber Resilience Act
Lecture 3 Introduction to the EU Cyber Resilience Act
Lecture 4 Understanding Cybersecurity in the EU
Lecture 5 General Provisions - Chapter 1
Lecture 6 General Provisions - Chapter 1 - Actions
Lecture 7 ANNEX III and ANNEX IV
Lecture 8 Obligations of Economic Operators - Chapter 2
Lecture 9 Obligations of Economic Operators - Chapter 2 - Actions
Lecture 10 ANNEX I.1
Lecture 11 ANNEX I.2
Lecture 12 ANNEX II
Lecture 13 Conformity of the Product with Digital Elements - Chapter 3
Lecture 14 ANNEX V
Lecture 15 ANNEX VI
Lecture 16 ANNEX VII
Lecture 17 ANNEX VIII
Lecture 18 Notification of Conformity Assessment Bodies - Chapter 4
Lecture 19 Notification of Conformity Assessment Bodies - Chapter 4 - Actions
Lecture 20 Market Surveillance and Enforcement - Chapter 5
Lecture 21 Market Surveillance and Enforcement - Chapter 5 - Actions
Lecture 22 Delegated Powers and Committee Procedures - Chapter 6
Lecture 23 Delegated Powers and Committee Procedures - Chapter 6 - Actions
Lecture 24 Confidentiality and Penalties - Chapter 7
Lecture 25 Confidentiality and Penalties - Chapter 7 - Actions
Lecture 26 Transitional and Final Provisions - Chapter 8
Lecture 27 Transitional and Final Provisions - Chapter 8 - Actions
Section 3: Hands-On. A practical example
Lecture 28 Session Intro
Lecture 29 CRA - Practical overview
Lecture 30 IEC 62443 and CRA
Lecture 31 Process 1 - Decide product applicability
Lecture 32 Process 2 - Establish economic operator
Lecture 33 Process 3 - Define product criticality
Lecture 34 Outcome 1 - Product Registry entry
Lecture 35 Process 4 - Security By design
Lecture 36 Outcome 2 - Risk assessment - Threat Model
Lecture 37 Outcome 2 - Risk assessment - Security Analysis for Product Interfaces
Lecture 38 Outcome 3 - Security verification testing and SBOM
Lecture 39 Outcome 4 - User Documentation
Lecture 40 Outcome 5 - Risk Register
Lecture 41 Process 5 - Vulnerability Handling
Lecture 42 Process 6 - Conformity Assessment
Lecture 43 Outcome 6 - Conformity Assessment
Lecture 44 Process 7 - Incident Handling
Lecture 45 Process 8 - Security Updates
Lecture 46 Session Conclusion
Section 4: Recap
Lecture 47 Recap
Cybersecurity professionals seeking to understand EU regulations.,Product managers and developers responsible for digital product compliance.,Business leaders aiming to enhance product security and meet market requirements.,Anyone interested in cybersecurity laws and digital product safety.