Training

3rd Party Risk Management , Governance & Risk Management , IT Risk Management

OnDemand | Strategies for Compliance, Vulnerability Management, and Third-Party Security under the CRA

OnDemand | Strategies for Compliance, Vulnerability Management, and Third-Party Security under the CRA

There will be 30.2 billion IoT devices by 2030, a sharp 108% increase from today's 14.5 billion devices. European organizations are the most targeted in the world by cyber attacks - and hence, The Cyber Resilience Act was introduced alongside other parallel regulations such as NIS2.

This session explores essential strategies for navigating these regulatory landscapes, focusing on key areas such as :

  • Vulnerability management & effective risk mitigation techniques;
  • Actionable steps for continuous monitoring of supply chain vulnerabilities;
  • Everything you need to know about The Cyber Resilience Act & NIS2.

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.