SecAppDev 2026 lecture details
EU CRA: Survival Workshop for Enterprise & Open Source
A practical deep-dive into the EU CRA for Enterprise and Open Source. Features interactive "In Scope?", "Who Am I?" and a “Live Gap-Analysis” exercises to help navigating your compliance confidently.
Schedule TBD
Abstract
The EU Cyber Resilience Act (CRA) reshapes security for the global supply chains, but what does it mean for you? This interactive session clarifies requirements for Enterprise Manufacturers, Open Source Contributors and Stewards. We’ll go beyond theory using three practical exercises: an "In Scope or Out of Scope?" task, a "Who Am I?" exercise, and a “Live Gap Analysis” for project of your choice. You'll leave with a developer-friendly toolkit, clear liability answers, and actionable frameworks to navigate compliance without slowing innovation.
Key takeaway
Transform CRA rules from a legal burden into an engineering advantage using open standards, clear role mapping, and practical guidelines.
Content level
Deep-dive
Target audience
Anyone building SW in or for the EU: from engineers to security managers to open-source supporters.
Prerequisites
Basic understanding of software supply chains and SW development, leveraging open-source. No prior legal or deep regulatory knowledge is required.
Join us for SecAppDev. You will not regret it!
Grab your seat now
Roman Zhukov
Principal Architect - Security Communities Lead, Red Hat
Expertise: Open Source & Supply Chain Security, AI Trust & Safety, Cybersecurity Standards & Regulations, SW Security Architecture & DevSecOps practices
Join us for SecAppDev. You will not regret it!
Grab your seat nowRelated lectures
Security by default - A European perspective on cyber resilience
Deep-dive lecture by Freddy Dezeure in room Lemaire
A technical deep dive into how Microsoft implements security, resilience, and regulatory compliance at scale—mapping NIS2, DORA, and Secure‑by‑Default principles to concrete controls, engineering processes, and tenant‑level protections
Key takeaway: Learn how regulatory requirements become enforceable controls, measurable metrics, and practical Secure‑by‑Default engineering across cloud systems
Demystifying CSP for Modern Applications
Deep-dive lecture by Philippe De Ryck
CSP is often seen as complex and frustrating. This session explains why most policies fail, how to fix them, and how to apply CSP effectively in modern applications, including single page apps.
Key takeaway: Understand why CSP often fails and learn how to implement it correctly with practical, actionable guidance.
How to (still) trick AI: Adversarial ML for Today
Introductory lecture by Katharine Jarmul
There's many known (and still being discovered) attack vectors against deep learning models. In this session, we'll walk through some of the history of adversarial ML and deep learning and find what's changed and what's stayed the same.
Key takeaway: AI/DL models are inherently nondeterministic and have other properties that allow for old, new and interesting attacks.