High importance
Regulatory
Item 03
CRA reporting obligations become binding on September 11, 2026
The EU Cyber Resilience Act will impose its first binding reporting obligations starting September 11, 2026. Manufacturers of software and hardware products with digital elements will need to report both security incidents and actively discovered vulnerabilities within 24 hours.
For third-party risk teams, this is not just a compliance issue for vendors — it is a supply continuity issue. Vendors unable to operate under CRA expectations may face disruptions in EU market access, delayed remediation processes, or increased scrutiny around secure development and post-market surveillance.
Affected third-party types
Suppliers of software, hardware, IoT, embedded systems, cloud products, and SaaS products with digital elements.
Risk implication
Products that fail to meet CRA expectations may lose CE marking and EU market access, creating vendor continuity and replacement risk.
Sources
Reed Smith — April 14, 2026; Schellman / CSA — 2025
Recommended action
- Identify all third-party products with digital elements in your environment.
- Engage vendors on CRA readiness, especially their vulnerability reporting and management processes.
- Build CRA readiness and SBOM capability into vendor assessment questionnaires now.
High importance
Regulatory
Item 04
NIS2 transposition remains incomplete across the EU
Despite the October 2024 deadline, only roughly 14 of 27 EU Member States are reported as fully compliant with NIS2 transposition. Infringement proceedings remain active against multiple Member States, including Germany, France, Spain, and Poland.
The third-party risk challenge here is fragmentation: suppliers operating cross-border may be subject to different maturity expectations, registration obligations, or enforcement timelines depending on jurisdiction. That makes standardized assurance harder, not easier.
Affected third-party types
Medium-sized and larger entities across 18 sectors including energy, food, digital infrastructure, chemicals, space, and machinery.
Geography
EU-wide, with particular attention to Germany, France, Spain, and Poland.
Risk implication
Vendors in incomplete-transposition states may not yet be fully aware of their obligations or may be working against moving national baselines.
Sources
Reed Smith — April 14, 2026; Schellman — July 2025
Recommended action
- Adopt a “strictest common denominator” approach across jurisdictions.
- Survey critical third parties in NIS2-affected sectors on registration and compliance status.
- Flag vendors in incomplete-transposition jurisdictions as elevated risk until their posture is confirmed.
High importance
Regulatory
Item 05
Cybersecurity Act 2.0 plans signal further change ahead
The European Commission has presented reform plans under the “Cybersecurity Act 2.0” label, including adjustments to NIS2, certification framework updates, and changes to ENISA’s role.
For teams that have only recently stabilized NIS2 workstreams, this is an early signal that the regulatory baseline will continue to evolve. The lesson is not to pause — it is to design programs with enough flexibility to absorb the next layer of change.
Affected third-party types
NIS2-scoped entities, especially across energy, chemicals, hydrogen, and dual-use infrastructure supply chains.
Risk implication
Certification expectations and reporting roles may shift again, affecting how vendors and products are assessed.
Source
Reed Smith — April 14, 2026
Recommended action
- Monitor Cybersecurity Act 2.0 legislative progress.
- Ensure NIS2 compliance programs are designed to absorb future changes without major redesign.
- Assess exposure to chemicals, hydrogen, and dual-use infrastructure supply chains.