We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Counting down for CRA - updates and expectations

00:00

Formal Metadata

Title
Counting down for CRA - updates and expectations
Title of Series
Number of Parts
131
Author
Contributors
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
The EU Commission is likely to vote on the Cyber Resilience Act (CRA) later this year. The CRA is an ambitious step towards protecting consumers from software security issues by creating a new list of responsibilities for software developers and providers. The Act also creates a new category of actor known as an “Open Source Steward” which we think makes important allowances for public open source repositories like CPython and Python Package Index (PyPI.) Once the dust settles, everyone who makes software will need to consider the CRA’s mandates in their security roadmaps. In this talk we will look at the timeline for the new legislation, any critical discussions happening around implementation and most importantly, the new responsibilities outlined by the CRA. We’ll also discuss what the PSF is doing for CPython and for PyPI and what each of us in the Python ecosystem might want to do to get ready for a new era of increased certainty – and liability – around security. ## Target audience Developers and maintainers whose project or product may be affected by the CRA. European legislation won’t just affect the European market, it will affect the software industry and the open source community globally as it is very hard to segregate one project or product from the EU market. So, this is for everyone in the Python community who shares their code with the world. ## Goal To educate the general public about CRA - how it can affect us and how to get ready for it. We also want to provide more information for the Python community about what has been done by the PSF regarding the CRA to reassure them that the Python community is aware and getting prepared for the CRA.
Green's functionExact sequenceIndian Remote SensingBoss CorporationTexture mappingDecision tree learningView (database)Proper mapPoint (geometry)Computer animationLecture/ConferenceMeeting/Interview
CybersexTime zoneTexture mappingCybersexRevision controlMultiplication signComputer animation
Open sourceSoftwareOpen setComputer animation
Open sourceCodeCombinational logicSound effectGoodness of fitRevision controlSoftwareSoftware maintenanceSelf-organizationRight angleMathematicsComputer animation
SoftwareOpen sourceFreewareTerm (mathematics)Design by contractCodeComputer animation
Latent heatElement (mathematics)Product (business)Digital signalBasis <Mathematik>SoftwareOpen sourceOpen sourceWeb pageSoftwareTerm (mathematics)Self-organizationComputer animation
Element (mathematics)SoftwareOpen sourceProduct (business)Operator (mathematics)Phase transitionFinitary relationSoftware developerDesign by contractService (economics)Open sourceMereologyWeb pageSelf-organizationRepository (publishing)SoftwareCodeOpen setComputer animation
RankingOpen sourceTouchscreenMultiplication signPresentation of a groupFlowchartSoftwareOpen setMereologyOpen sourceBitDataflowComputer animation
Open sourceRight angleTouch typingSoftwareCategory of being1 (number)MathematicsBitComputer animation
Open sourceTime zoneVulnerability (computing)AuthorizationTraffic reportingBitIncidence algebraTouch typingInformation securityCyberneticsComputer animation
SoftwareCyberneticsElectronic mailing listInformation securityComputer animation
Time zoneSinc functionOpen setInformation securityCyberneticsOpen sourceLoginComputer animation
Type theory1 (number)Information securityCodeComputer virusDegree (graph theory)Software developerCyberneticsComputer animation
Vulnerability (computing)Subject indexingLibrary (computing)MultiplicationTraffic reportingDecision theoryWhiteboardInformationstheorieShooting methodPatch (Unix)Instance (computer science)AuthorizationMultiplication signComputer animation
Radical (chemistry)BitTraffic reportingArithmetic meanVulnerability (computing)Computer virusComputer animation
Successive over-relaxationTime zoneProcess (computing)Traffic reportingVulnerability (computing)Open sourceLibrary (computing)Level (video gaming)CodeComputer animation
outputProcedural programmingTraffic reportingPatch (Unix)Different (Kate Ryan album)Information securityInterface (computing)Vulnerability (computing)Computer animation
Open sourceCyberneticsInformation securityGroup actionFunctional (mathematics)Latent heatCollaborationismVulnerability (computing)DatabaseQuicksortSpeech synthesisSoftwareMereologyComputer animation
Open setOpen sourceStandard deviationIncidence algebraProcess (computing)Formal languageComputer-assisted translationSound effectMereologyData conversionNational Institute of Standards and TechnologyComputer animation
Projective planeIncidence algebraOpen sourceCyberneticsSoftwareOpen setoutputComputer animation
Operations support systemDesign of experimentsMathematicsComputer animation
Time zoneInformation securityExpert systemConfiguration spaceSoftware developerCodeSelf-organizationComputer animation
Time zoneSoftware maintenanceLibrary (computing)Expert systemDrop (liquid)PlanningGoodness of fitBootingEmailData conversionType theoryInformation securityInheritance (object-oriented programming)SoftwareComputer animation
Time zoneInformation securityMeasurementEmailTraffic reportingMoment (mathematics)Content (media)Vulnerability (computing)Projective planeInformation securityComputing platformSoftwareBitBuildingState of matterBlock (periodic table)Computer animation
Open sourceRevision controlVulnerability (computing)Virtual machineInformationstheorieDatabaseLoginFile formatComputer animation
Time zoneInformation securityDifferent (Kate Ryan album)Expert systemOpen setSoftware developerComputer configurationMultiplication signGoodness of fitMereologyLevel (video gaming)Right angleTouch typingShared memoryBlogComputer animation
Connected spaceDesign of experimentsObject-oriented analysis and designLength of stayBlogRight angleComputer animation
Personal area networkVariancePerfect groupGroup actionTouch typingInformation securityMeeting/InterviewLecture/ConferencePanel painting
Single sign-onECosRouter (computing)Design of experimentsFinite-state machineSoftware developerDesign by contractMathematicsOpen sourceService (economics)Independence (probability theory)Library (computing)Level (video gaming)Operator (mathematics)Different (Kate Ryan album)Template (C++)Instance (computer science)Information securityBitSoftware maintenanceProjective planeAuthorizationDependent and independent variablesEmailPosition operatorData conversionType theoryContent (media)Multiplication signProduct (business)FreewareWritingLengthRegulator geneLecture/ConferenceMeeting/InterviewComputer animation
Transcript: English(auto-generated)