FYI -- CeDeROM, SQ7MHZ, http://www.tomek.cedro.info
---------- Forwarded message --------- From: Embedded Webinar Date: Thu, Feb 12, 2026 at 4:07 PM Subject: NEXT WEEK'S LIVE Event: The EU Cyber Resilience Act Explained: Scope, Standards, & What to Do Now LIVE Event: *The EU Cyber Resilience Act Explained: Scope, Standards, & What to Do Now* <https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E> *February 19th, 2026 12PM ET* [image: Header] Sponsored by: [image: Sponsors] REGISTER NOW <https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E> The EU Cyber Resilience Act (CRA) is the most significant product cybersecurity regulation in history. Given the vast scope of this new law, it will fundamentally change how hardware and software are sold in Europe. Hundreds of thousands of companies will need to conform, and for many, this will be the first time they are legally required to integrate cybersecurity into their product lifecycle. Does this apply to you? If you sell consumer, communications, industrial, or semiconductor products, software or hardware, with a data connection in the EU, the answer is yes. Crucially, this applies to all connected products in your portfolio regardless of when they were originally designed or introduced. The stakes are high. Non-compliance carries penalties of up to €15 million or 2.5% of global annual turnover, whichever is higher. Yet, a 2025 Linux Foundation report revealed that 62% of respondents still have low familiarity with the CRA’s technical demands. Join us to close that gap. We will cut through the legal jargon and provide a practical roadmap for conformity. In this webinar, we will cover: - The milestones and deadlines - Scope & Classification: How to determine if your product is Class I, Class II, Critical or Default. - The Standards: Which cybersecurity standards (like IEC 62443 or ETSI 303 645) can help support compliance. - Steps an organization needs to take. - The To-Do List: Immediate steps for "Security-by-Design" and vulnerability handling. - The latest updates from the EU Commission. - Solutions: Tools and services for EU CRA conformity, security-by-design, and lifecycle management. If unable to attend, please register to receive the post-event recording link. *Speakers:* Colin Duggan, Founder and CEO of BG Networks Eric Clauss, Chief Commercial Officer, ISS Milton Yarberry, Director of Medical Programs for ICS REGISTER NOW <https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E> Not able to attend? Register now <https://go.embeddedcomputing.com/e/1039643/ience-utm-bmcr-source-OSMemail/4cj6j/559390971/h/rGSGl2DhBTDuMMoW1aJFL3-SKAR6TkRmm6m72xDnN5E> and after the event you will receive an e-mail to the recorded presentation. To ensure email delivery to your inbox, please add [email protected] to your address book or your safe sender contacts list. ------------------------------ To view this email as a web page, click here <https://go.opensysmedia.com/webmail/1039643/559390971/a477d1e17f11b089c094da97ec48910a22c53844428c3f1825f19ce9f9b5f6d0> . OpenSystems Media | 3120 W Carefree Hwy, Ste 1-640, Phoenix, AZ 85086
