broken image
broken image
GET IN TOUCH
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
broken image
broken image
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
GET IN TOUCH
broken image

Live from RSA Conference 2025

Cybersecurity Gets Real for Connected Devices

· Company News and Press Releases

The message from RSA Conference 2025 in San Francisco couldn’t be clearer: cybersecurity compliance is no longer a nice-to-have — it’s a must-have. For manufacturers of connected devices, this shift is happening fast, and the companies that adapt early will be the ones that thrive.

Why This Matters Now More Than Ever

If you're a device manufacturer, you already know the landscape is shifting. Regulatory frameworks are tightening, technical requirements are getting more complex, and customer expectations are evolving.

Now, imagine cutting through that complexity with a platform that streamlines the entire cybersecurity compliance journey — turning regulatory chaos into clarity. That’s exactly the momentum we’re seeing with CyberPass at RSA.

RSA Conference 2025: Key Takeaways

RSA 2025 was a melting pot of insights, and here are the top trends shaping the future of cybersecurity for connected products:

  • Compliance is top of mind. From OEMs to service providers, everyone is talking about cybersecurity mandates.
  • Complexity is real — but so is the drive to overcome it. There’s a growing sense of urgency and collaboration to streamline compliance.
  • CyberPass is gaining serious traction. Industry leaders are paying attention to automated platforms that simplify assessments and documentation.
  • We’re bringing the momentum home. Our team is heading back to Paris with fresh insights and new opportunities to help our clients move faster and smarter.

Why You Should Care

If your business touches connected devices in any way — from design to delivery — the regulatory bar is rising:

  • New rules under the RED Directive, EN 18031, and the Cyber Resilience Act (CRA) are already impacting timelines and product strategies.
  • Your competitors are acting now to stay compliant — and to turn that compliance into a market advantage.
  • Delays in adapting can mean product hold-ups, financial penalties, or even market exclusion.

In short: compliance is no longer just about risk — it's about relevance.

What You Can Do Today

Whether you’re just starting your cybersecurity compliance journey or looking to refine it, here are some practical steps to take now:

  1. Audit your connected products against cybersecurity requirements.
  2. Prioritize alignment with key EU regulations like the RED Directive and EN 18031.
  3. Leverage platforms like CyberPass to streamline assessments, documentation, and reporting.
  4. Engage with experts early — it’s much easier (and cheaper) to prevent issues than to fix them later.

Key Regulations to Watch

Here’s a quick breakdown of the standards and regulations shaping the compliance landscape:

  • RED Directive (Radio Equipment Directive)
    Sets baseline cybersecurity requirements for connected devices in the EU.
  • EN 18031
    A new harmonized standard aligning with the RED Directive — critical for simplifying technical assessments.
  • Cyber Resilience Act (CRA)
    Introduces broad product security rules with mandatory vulnerability handling and post-market surveillance.

  • NIS2 Directive
    Expands security obligations across critical sectors — cybersecurity is no longer just an IT concern.

Final Thought: Security as a Business Enabler

Cybersecurity doesn't have to be a blocker. Done right, it becomes a competitive differentiator — speeding up market entry, building customer trust, and unlocking long-term value.

We’ll continue to share updates and insights as the landscape evolves. In the meantime, if your team isn’t already preparing for these changes, now is the time to start.

📩 Have questions? Want to know how CyberPass can support your product security journey? Contact our team.

♻️ Share this article with your compliance, product, and engineering teams — because cybersecurity is a team sport.

Subscribe
Previous
Navigating IoT Cyber Regulations in 2025 & Beyond
Next
We’ll be at the RSA Conference
 Return to site
Profile picture
Cancel
Cookie Use
We use cookies to improve browsing experience, security, and data collection. By accepting, you agree to the use of cookies for advertising and analytics. You can change your cookie settings at any time. Learn More
Accept all
Settings
Decline All
Cookie Settings
Necessary Cookies
These cookies enable core functionality such as security, network management, and accessibility. These cookies can’t be switched off.
Analytics Cookies
These cookies help us better understand how visitors interact with our website and help us discover errors.
Preferences Cookies
These cookies allow the website to remember choices you've made to provide enhanced functionality and personalization.
Save