{"id":7503,"date":"2024-11-15T16:23:53","date_gmt":"2024-11-15T14:23:53","guid":{"rendered":"https:\/\/heliview.com\/cyber-security-experience\/?p=7503"},"modified":"2024-11-15T16:23:53","modified_gmt":"2024-11-15T14:23:53","slug":"whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/","title":{"rendered":"Whitepaper: Understanding the Cyber Resilience Act\u2019s Security Requirements for Digital Products"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Met de recente goedkeuring van de Cyber Resilience Act door de Europese Raad begint een nieuw hoofdstuk in de cybersecurity-regelgeving, met als doel de ontwikkeling en het onderhoud van digitale producten in de hele EU te hervormen. De wetgeving beoogt horizontale cybersecurity-eisen te stellen aan digitale producten en verbonden apparaten, zodat deze veiliger zijn wanneer ze op de markt komen en gedurende hun hele levenscyclus.<\/p>\n<p>De verordening is bedoeld om de toenemende cybersecurity-bedreigingen van verbonden apparaten aan te pakken, met het oog op de bescherming van zowel bedrijven als consumenten. Ze wil de kwetsbaarheden in hard- en software verminderen door beveiligingsnormen in te voeren waaraan fabrikanten moeten voldoen. Dit moet aanvallen voorkomen, zorgen voor tijdige beveiligingsupdates en consumenten duidelijke informatie geven over cybersecurity.<\/p>\n<p>De Cyber Resilience Act werd voor het eerst aangekondigd door Commissievoorzitter Von der Leyen in september 2021 en werd vervolgens benadrukt in de conclusies van de Raad over de versterking van de cyberpositie van de EU. Het voorstel bouwt voort op bestaande kaders, zoals de NIS-richtlijn en de EU Cybersecurity Act, en zorgt voor een consistente aanpak over verschillende sectoren heen. Deze wet weerspiegelt de bredere cybersecurity-strategie van de EU, inclusief de ambitie om de Unie te positioneren als een wereldleider in veilige digitale producten.<\/p>\n<p>Onderwerpen die in het witboek worden besproken, zijn onder andere:<\/p>\n<ul>\n<li>Doelen van de wet<\/li>\n<li>Belangrijkste bepalingen van de wet<\/li>\n<li>Vijf manieren waarop Armis helpt<\/li>\n<li>Vervolgstappen na adoptie<\/li>\n<\/ul>\n[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download de whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    E\u00e9n of meerdere velden zijn niet of incorrect ingevuld.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Voornaam*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Achternaam*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Bedrijfsnaam*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Functie*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Zakelijk E-mailadres*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>Door op aanmelden te klikken geeft u toestemming om gemaild te worden, u ontvangt de whitepaper in uw mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '73640bae-4336-423d-919a-f896c0439a2f')\" type=\"button\" class=\"lgx-btn\" value=\"Aanmelden\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Bedankt, je ontvangt binnen een paar minuten een e-mail om de whitepaper te downloaden.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Er is helaas iets mis gegaan; uw aanvraag is niet gelukt. Probeer het later nog eens.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Met de recente goedkeuring van de Cyber Resilience Act door de Europese Raad begint een nieuw hoofdstuk in de cybersecurity-regelgeving, met als doel de ontwikkeling en het onderhoud van digitale producten in de hele EU te hervormen. De wetgeving beoogt horizontale cybersecurity-eisen te stellen aan digitale producten en verbonden apparaten, zodat deze veiliger zijn wanneer [...]","protected":false},"author":16,"featured_media":7504,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,1,16],"tags":[],"class_list":["post-7503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-geen-categorie","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Bestuurders, kom in actie! NIS2 vraagt om een cultuurverandering<\/title>\r\n<meta name=\"description\" content=\"NIS2 vraagt om serieus werk te maken van cyberbeveiliging die in alle lagen is verankerd: een cultuurverandering dus. Dit biedt kansen! Hoe leest u in ons artikel met bijbehorend stappenplan.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Bestuurders, kom in actie! NIS2 vraagt om een cultuurverandering\" \/>\r\n<meta property=\"og:description\" content=\"NIS2 vraagt om serieus werk te maken van cyberbeveiliging die in alle lagen is verankerd: een cultuurverandering dus. Dit biedt kansen! Hoe leest u in ons artikel met bijbehorend stappenplan.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Security Experience\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-11-15T14:23:53+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuten\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/\",\"name\":\"Whitepaper: Bestuurders, kom in actie! NIS2 vraagt om een cultuurverandering\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png\",\"datePublished\":\"2024-11-15T14:23:53+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"description\":\"NIS2 vraagt om serieus werk te maken van cyberbeveiliging die in alle lagen is verankerd: een cultuurverandering dus. Dit biedt kansen! Hoe leest u in ons artikel met bijbehorend stappenplan.\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-security-experience\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Understanding the Cyber Resilience Act\u2019s Security Requirements for Digital Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/\",\"name\":\"Cyber Security Experience\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Bestuurders, kom in actie! NIS2 vraagt om een cultuurverandering","description":"NIS2 vraagt om serieus werk te maken van cyberbeveiliging die in alle lagen is verankerd: een cultuurverandering dus. Dit biedt kansen! Hoe leest u in ons artikel met bijbehorend stappenplan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/","og_locale":"nl_NL","og_type":"article","og_title":"Whitepaper: Bestuurders, kom in actie! NIS2 vraagt om een cultuurverandering","og_description":"NIS2 vraagt om serieus werk te maken van cyberbeveiliging die in alle lagen is verankerd: een cultuurverandering dus. Dit biedt kansen! Hoe leest u in ons artikel met bijbehorend stappenplan.","og_url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/","og_site_name":"Cyber Security Experience","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2024-11-15T14:23:53+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Geschreven door":"miki","Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/","url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/","name":"Whitepaper: Bestuurders, kom in actie! NIS2 vraagt om een cultuurverandering","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png","datePublished":"2024-11-15T14:23:53+00:00","author":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"description":"NIS2 vraagt om serieus werk te maken van cyberbeveiliging die in alle lagen is verankerd: een cultuurverandering dus. Dit biedt kansen! Hoe leest u in ons artikel met bijbehorend stappenplan.","breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#primaryimage","url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png","contentUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2024\/11\/Whitepaper-Header-Website-1-1.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-understanding-the-cyber-resilience-acts-security-requirements-for-digital-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-security-experience\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Understanding the Cyber Resilience Act\u2019s Security Requirements for Digital Products"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-security-experience\/#website","url":"https:\/\/heliview.com\/cyber-security-experience\/","name":"Cyber Security Experience","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/comments?post=7503"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7503\/revisions"}],"predecessor-version":[{"id":7505,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/7503\/revisions\/7505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media\/7504"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media?parent=7503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/categories?post=7503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/tags?post=7503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}