Security

CRA Compliance: What Manufacturers Must Do Before December 2027 | TFiR

0

The Big Picture: The EU Cyber Resilience Act (CRA) is no longer pending — vulnerability reporting obligations are live, and manufacturers worldwide face five-year support mandates, mandatory SBOM documentation, and billion-euro fines for non-compliance. Most software-producing organizations still lack basic visibility into their own dependency stacks.

The Guest: Brian Fox, Co-founder & CTO at Sonatype

The Guest: Christopher “CRob” Robinson, CTO at OpenSSF 

Key Takeaways:
• The September 2026 vulnerability reporting deadline is already in effect — manufacturers selling into the EU must have processes in place now, not by 2027
• An SBOM covering all transitive dependencies is the non-negotiable first step — if you can’t answer “where are we exposed to this CVE?” within hours, you are not compliant
• AI is accelerating both vulnerability discovery and maintainer overload — open source projects face a flood of LLM-generated reports with no corresponding resources to address them
• The Product Liability Directive runs parallel to the CRA — it removes software’s historical exemption from product liability, creating direct consumer lawsuit exposure on top of regulatory fines
• Open source is not categorically exempt — commercially entangled open source falls within scope, and downstream manufacturers will be pressing upstream maintainers for compliance documentation

Read Full Transcript & Technical Deep Dive

What Is MITRE ATT&CK and How Should CISOs Actually Use It? | Steve Winterfeld, Akamai | TFiR

Previous article