Skip to main content
Insights

The countdown is on: These EU requirements are changing the market for manufacturers of products, solutions and machines.

By 25. April 2025No Comments

Today, cybersecurity is no longer an option – it is a necessity.

Especially for manufacturers of machines, products and solutions, , it even will become obligatory in order to continue to be able to sell goods in the European market. Development takes time, and the clock has already started ticking on several regulations that require cybersecurity.

Regulations set binding minimum standards. They ensure that security is not left to chance, but is structured and integrated throughout a product’s lifecycle. A strategic approach is essential, including

  • Building resilient software and hardware architectures
  • Establishing structured processes for risk assessment, vulnerability monitoring and handling as well as patch management
  • Providing and sharing information on intended use, expected mitigating measures in the environment and security capabilities of the goods and how to use them

The question is not whether security measures are necessary, but how they can be implemented efficiently.

For manufacturers, this means that they need to know which of these regulations are relevant for their products, systems and machines, which requirements apply in terms of IT and product safety – and how development processes can be strategically adapted to create legally compliant and future-proof solutions.

You can find out all about this in our webinar recording. The focus is on four key regulations:

✔ NIS2 Directive
✔ Machinery Regulation
✔ RED (Radio Equipment Directive)
✔ CRA (Cyber Resilience Act)

You are currently viewing a placeholder content from Default. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

“I will be happy to provide you with further information, offer workshops on threat modeling and assist you with the conception and evaluation of security architectures.”

Florian GerstmayerHead of Product and Solution Security Consulting
Contact me