Do you know your CRA Compliance level for your machine tools?
Let’s review it together on March 5th at BIEMH33:
On Thursday we’ll be waiting for you at a very special event. If you want to secure your spot, book now — places are limited!
Do you know your CRA Compliance level for your machine tools?
Let’s review it together on March 5th at BIEMH33:
On Thursday we’ll be waiting for you at a very special event. If you want to secure your spot, book now — places are limited!
11:00 Welcome and Introduction
11:10 Product Cybersecurity in Machine Tools: Turning Awareness into Action
Cybersecurity Manager at AFM
General Director of ZIUR Foundation
Head of Smart & Cyber Department at SPRI
Data Analysis and Cyber Research Group at Mondragon Unibertsitatea
11:40 Experiences and Challenges in Product Cybersecurity
Product Cybersecurity Manager at SORALUCE
Innovation Director at Fagor Automation
12:00 Cyber Resilience Act: Implications and Challenges for Machine Tools
12:20 Cyber Resilience Act: Lessons Learned in the Machine Tool Sector
12:30 Bridging Theory and Practice: The Compliance Roadmap
12:40 Presentation of a new Solution for Industrial Cybersecurity
12:50 Networking
The EU Cyber Resilience Act sets new cybersecurity requirements for products with digital elements, including connected machine tools.
From 11 September 2026, manufacturers must have vulnerability management reporting in place across the whole product lifecycle.
Focused on your machine tool portfolio and product lifecycle.
Certified methodology to deliver accredited test reports and in-depth analysis to meet your product’s cybersecurity compliance.
Monitor, report and comply with regulations and directives like CRA, IEC 62443, RED-DA, NIS2 and more.
Security testing of devices and embedded systems to validate secure design and implementation
Evidence and reports to support product cybersecurity compliance (IEC 62443, CRA)
Expert guidance to address findings before launch or certification.
Continuous monitoring and management of vulnerabilities affecting firmware and third-party components
Centralized view of product cybersecurity posture across versions and deployments
Documentation and dashboards that make it easier to demonstrate ongoing compliance to customers and authorities