Training

3rd Party Risk Management , Governance & Risk Management , IT Risk Management

Live Webinar | Strategies for Compliance, Vulnerability Management, and Third-Party Security under the CRA

Live Webinar | Strategies for Compliance, Vulnerability Management, and Third-Party Security under the CRA

There will be 30.2 billion IoT devices by 2030, a sharp 108% increase from today's 14.5 billion devices. European organizations are the most targeted in the world by cyber attacks - and hence, The Cyber Resilience Act was introduced alongside other parallel regulations such as NIS2.

This session will explore essential strategies for navigating these regulatory landscapes, focusing on key areas such as :

  • Vulnerability management & effective risk mitigation techniques;
  • Actionable steps for continuous monitoring of supply chain vulnerabilities;
  • Everything you need to know about The Cyber Resilience Act & NIS2.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.