{"id":7416,"date":"2026-02-04T11:47:20","date_gmt":"2026-02-04T10:47:20","guid":{"rendered":"https:\/\/www.bayoomed.com\/news\/cybersecurity-2026-requirements-from-the-cybersecurity-resilience-act-and-iec-81001-5-1\/"},"modified":"2026-02-12T15:45:51","modified_gmt":"2026-02-12T14:45:51","slug":"cybersecurity-2026-cra-iec-81001-5-1-overview","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/","title":{"rendered":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h2><strong>Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-2\"><p><strong>Authors:<\/strong><\/p>\n<p><strong>Sebastian Wittor <\/strong>Project Manager<\/p>\n<p><strong>Julia Schliesch <\/strong>Marketing Generalist at BAYOOMED<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><p>By 2026 at the latest, cybersecurity will be a central component of regulatory compliance and corporate strategy. New legal requirements, stricter conformity assessments and growing demands along the entire product life cycle are forcing companies to critically review and further develop their cybersecurity structures. <\/p>\n<p>The focus is on two regulations in particular: the <strong>Cybersecurity Resilience Act<\/strong> and <strong>IEC 81001-5-1<\/strong>. The latter is given much greater consideration in audits and places stricter requirements on processes, organization and technical implementation. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h2><strong>Cybersecurity Resilience Act: New standards for product cybersecurity<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-5\"><p>The <strong>Cybersecurity Resilience Act (CRA)<\/strong> will become even more relevant in 2026 as additional stages of the regulation come into force. In medical technology, cybersecurity requirements have long been established in the development of medical devices. The Cybersecurity Resilience Act now transfers similar basic requirements to other areas, in particular to software and digital products in the healthcare sector that are not classified as medical devices.  <\/p>\n<p>The Cybersecurity Resilience Act requires that cybersecurity is systematically considered throughout the entire product life cycle. This includes, among other things: <\/p>\n<\/div><ul style=\"--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:var(--awb-color4);--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Structured vulnerability management<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Transparency of software components used through SBOM<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Secure software development processes<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Comprehensible response mechanisms to security incidents<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h2><strong>IEC 81001-5-1: Anchoring cybersecurity in the development life cycle<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-7\"><p>The <strong>IEC 81001-5-1<\/strong> standard has been published for several years, but is becoming increasingly important. Conformity assessment procedures are examining cybersecurity aspects in increasing detail, and many companies are finding that existing development processes do not fully meet these requirements. <\/p>\n<p>IEC 81001-5-1 supports companies in establishing a <strong>secure development life cycle<\/strong> in which cybersecurity is taken into account from the outset. This includes risk analyses, security requirements, design decisions, tests and documentation. <\/p>\n<p>Practical experience clearly shows that implementing cybersecurity directly in line with IEC 81001-5-1 is much more efficient than implementing security measures later. If cybersecurity is only addressed shortly before an audit, there is an increased risk that the measures will not be sufficient and rework will be necessary. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><h2><strong>Cybersecurity in the post-market phase: duty and risk at the same time<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-9\"><p>One area that is often underestimated is the <strong>post-market phase<\/strong>. Cybersecurity activities are mandatory here under the MDR, among other things. Companies must establish processes to assess vulnerabilities, monitor security reports and implement suitable measures.  <\/p>\n<p>Missing or inadequate post-market cybersecurity processes can lead to exploitable vulnerabilities at any time. In addition to regulatory consequences, there is also the threat of reputational damage and negative public perception. At the same time, it has been shown that a clearly defined process is usually easier to implement than expected if responsibilities and procedures are clearly defined.  <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><h2><strong>Software supply chain security: targeted risk management<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-11\"><p>Software supply chain security describes measures that companies use to ensure that software remains secure and traceable throughout its entire life cycle. The focus here is on external components, processes and dependencies. <\/p>\n<p>Third-party libraries and dependencies can speed up development processes, but they can also entail risks. Unknown or outdated components can introduce vulnerabilities that compromise the security of the entire product. <\/p>\n<p>Another factor is build, CI\/CD and release processes. Insecure or insufficiently controlled processes can lead to manipulated software being delivered. Subsystems and integrations also increase the attack surface if security requirements and interfaces are not clearly defined.  <\/p>\n<p>It is crucial to keep an eye on risks throughout the entire life cycle. Software supply chain security does not end with the release, but requires continuous monitoring, vulnerability management and clear processes in the post-market phase. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12\"><h2><strong>Audits 2026: Why preparation is crucial<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-13\"><p><strong>IEC 81001-5-1<\/strong>, <strong>post-market cybersecurity<\/strong> and <strong>supply chain security<\/strong> in particular will be subject to stricter audits in 2026 and can lead to unexpected deviations if insufficient preparation is made. Companies that take a strategic approach to cybersecurity at an early stage not only reduce audit risks, but also create long-term security and transparency. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14\"><h2><strong>Conclusion: Tackle cybersecurity strategically and early on<\/strong><\/h2>\n<\/div><div class=\"fusion-text fusion-text-15\"><p>Cybersecurity will become a decisive success and risk factor for many companies in 2026. The Cybersecurity Resilience Act and IEC 81001-5-1 make it clear that cybersecurity can no longer be viewed in isolation. It must be firmly integrated into development processes, organizational structures and the entire product life cycle.  <\/p>\n<p>It is worth considering the implementation of cybersecurity at an early stage, as this is significantly more cost-efficient for the overall project in the medium term. The subsequent effort for cybersecurity documentation alone can reach a factor of 1.5 to 2, not including additional effort in requirements engineering and in architecture and development adaptation. Companies that systematically implement cybersecurity at an early stage not only reduce audit and liability risks, but also create long-term transparency and security.  <\/p>\n<p>It is particularly important not to see cybersecurity as a one-off measure or a mere documentation requirement. Sustainable processes, clear responsibilities and continuous monitoring in the post-market phase and along the supply chain are crucial in order to meet regulatory requirements and effectively manage security risks. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-margin-top:0px;--awb-margin-top-medium:40px;--awb-margin-top-small:40px;--awb-flex-wrap:wrap;\" id=\"contact\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center contact-box\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-small:30px;--awb-padding-right-small:30px;--awb-padding-bottom-small:30px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-size:cover;--awb-border-radius:60px 60px 60px 60px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" id=\"contact\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>If you have any questions about cybersecurity, please get in touch with us:<\/h3><\/h3><\/div><div class=\"fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-1694 contact-form\" style=\"--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:0px;--awb-margin-left:0px;--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;--awb-form-input-height:50px;--awb-form-font-size:16px;--awb-form-placeholder-color:#a8a8a8;--awb-form-label-color:var(--awb-color1);--awb-form-border-color:var(--awb-color5);--awb-form-border-radius:8px;\" data-form-id=\"1694\" data-config=\"{&quot;form_id&quot;:1694,&quot;form_post_id&quot;:1694,&quot;post_id&quot;:7416,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;vorname&quot;:&quot;First name&quot;,&quot;nachname&quot;:&quot;Name&quot;,&quot;unternehmen&quot;:&quot;Company&quot;,&quot;position&quot;:&quot;Position&quot;,&quot;e-mail-adresse&quot;:&quot;E-mail&quot;,&quot;telefonnummer&quot;:&quot;Phone&quot;,&quot;bevorzugte_kontaktmethode&quot;:&quot;Preferred contact method&quot;,&quot;fragen_oder_projektvorhaben&quot;:&quot;Your questions or comments&quot;,&quot;datenschutzhinweis&quot;:&quot;Data protection notice&quot;},&quot;field_logics&quot;:{&quot;vorname&quot;:&quot;&quot;,&quot;nachname&quot;:&quot;&quot;,&quot;unternehmen&quot;:&quot;&quot;,&quot;position&quot;:&quot;&quot;,&quot;e-mail-adresse&quot;:&quot;&quot;,&quot;telefonnummer&quot;:&quot;&quot;,&quot;bevorzugte_kontaktmethode&quot;:&quot;&quot;,&quot;fragen_oder_projektvorhaben&quot;:&quot;&quot;,&quot;datenschutzhinweis&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;vorname&quot;:&quot;text&quot;,&quot;nachname&quot;:&quot;text&quot;,&quot;unternehmen&quot;:&quot;text&quot;,&quot;position&quot;:&quot;text&quot;,&quot;e-mail-adresse&quot;:&quot;email&quot;,&quot;telefonnummer&quot;:&quot;phone_number&quot;,&quot;bevorzugte_kontaktmethode&quot;:&quot;radio&quot;,&quot;fragen_oder_projektvorhaben&quot;:&quot;textarea&quot;,&quot;datenschutzhinweis&quot;:&quot;checkbox&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;notice_1&quot;:&quot;notice&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}\"><form action=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/\" method=\"post\" class=\"fusion-form fusion-form-1694\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:calc( 100% + ) !important;max-width:calc( 100% + ) !important;margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div class=\"fusion-form-label-wrapper\"><label for=\"vorname\">First name <abbr class=\"fusion-form-element-required\" title=\"required\">*<\/abbr><\/label><\/div><input type=\"text\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"vorname\" id=\"vorname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div class=\"fusion-form-label-wrapper\"><label for=\"nachname\">Name <abbr class=\"fusion-form-element-required\" title=\"required\">*<\/abbr><\/label><\/div><input type=\"text\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"nachname\" id=\"nachname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:calc( 100% + ) !important;max-width:calc( 100% + ) !important;margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div class=\"fusion-form-label-wrapper\"><label for=\"unternehmen\">Company <abbr class=\"fusion-form-element-required\" title=\"required\">*<\/abbr><\/label><\/div><input type=\"text\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"unternehmen\" id=\"unternehmen\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div class=\"fusion-form-label-wrapper\"><label for=\"position\">Position<\/label><\/div><input type=\"text\" autocomplete=\"off\" name=\"position\" id=\"position\" value=\"\"  class=\"fusion-form-input\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:calc( 100% + ) !important;max-width:calc( 100% + ) !important;margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-email-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div class=\"fusion-form-label-wrapper\"><label for=\"e-mail-adresse\">E-mail <abbr class=\"fusion-form-element-required\" title=\"required\">*<\/abbr><\/label><\/div><div class=\"fusion-form-input-with-icon\"><i class=\"awb-form-icon fa-envelope fas\"><\/i><input type=\"email\" autocomplete=\"off\"  data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\" name=\"e-mail-adresse\" id=\"e-mail-adresse\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" data-holds-private-data=\"false\"\/><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-phone-number-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div class=\"fusion-form-label-wrapper\"><label for=\"telefonnummer\">Phone<\/label><\/div><div class=\"fusion-form-input-with-icon\"><i class=\"awb-form-icon fa-phone-alt fas\"><\/i><input type=\"tel\" autocomplete=\"off\" name=\"telefonnummer\" id=\"telefonnummer\" value=\"\"  class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-radio-field fusion-form-label-above radio-buttons\" style=\"\" data-form-id=\"1694\"><fieldset><legend class=\"fusion-form-label-wrapper\"><span class=\"label\">Preferred contact method<\/span><\/legend><div class=\"fusion-form-radio\"><input tabindex=\"\" id=\"radio-bevorzugte_kontaktmethode-1-0\" type=\"radio\" value=\"E-Mail\" name=\"bevorzugte_kontaktmethode\" class=\"fusion-form-input\" checked  data-holds-private-data=\"false\"\/><label for=\"radio-bevorzugte_kontaktmethode-1-0\">E-Mail<\/label><\/div><div class=\"fusion-form-radio\"><input tabindex=\"\" id=\"radio-bevorzugte_kontaktmethode-1-1\" type=\"radio\" value=\"Telefon\" name=\"bevorzugte_kontaktmethode\" class=\"fusion-form-input\" data-holds-private-data=\"false\"\/><label for=\"radio-bevorzugte_kontaktmethode-1-1\">Telefon<\/label><\/div><\/fieldset><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-textarea-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><label for=\"fragen_oder_projektvorhaben\">Your questions or comments <abbr class=\"fusion-form-element-required\" title=\"required\">*<\/abbr><\/label><textarea cols=\"40\" autocomplete=\"off\" data-empty-notice=\"Bitte f\u00fclle alle erforderlichen Felder aus.\"  minlength=\"0\"  rows=\"4\" tabindex=\"\" id=\"fragen_oder_projektvorhaben\" name=\"fragen_oder_projektvorhaben\" class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" data-holds-private-data=\"false\"><\/textarea><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-checkbox-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><fieldset><legend class=\"fusion-form-label-wrapper\"><span class=\"label\">Data protection notice <abbr class=\"fusion-form-element-required\" title=\"required\">*<\/abbr><\/span><\/legend><div class=\"fusion-form-checkbox\"><input tabindex=\"\" id=\"checkbox-datenschutzhinweis-1-0\" type=\"checkbox\" value=\"Hiermit best\u00e4tige ich, dass ich mit der Verarbeitung meiner Daten gem\u00e4\u00df der Datenschutzerkl\u00e4rung einverstanden bin.\" name=\"datenschutzhinweis[]\" class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" data-holds-private-data=\"false\"\/><label for=\"checkbox-datenschutzhinweis-1-0\">Hiermit best\u00e4tige ich, dass ich mit der Verarbeitung meiner Daten gem\u00e4\u00df der Datenschutzerkl\u00e4rung einverstanden bin.<\/label><\/div><\/fieldset><\/div><div class=\"fusion-form-field fusion-form-submit-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\"><div ><button type=\"submit\" class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span  button-default form-form-submit\" style=\"--awb-margin-top:20px;--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;\" data-form-number=\"1694\" tabindex=\"\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Send<\/span><\/button><\/div><\/div><div class=\"form-submission-notices data-notice_1\" id=\"fusion-notices-1\" data-instance=\"1\"><div class=\"fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-check-circle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Vielen Dank f\u00fcr Deine Nachricht. Sie wurde abgeschickt.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><div class=\"fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-exclamation-triangle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Beim Senden Deiner Nachricht ist ein Fehler aufgetreten. Bitte versuche es sp\u00e4ter noch einmal.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><\/div><div class=\"fusion-form-field fusion-form-recaptcha-field fusion-form-label-above\" style=\"\" data-form-id=\"1694\">\t\t\t\t<div class=\"form-creator-recaptcha\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-form-recaptcha-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tid=\"g-recaptcha-id-form-1694\"\n\t\t\t\t\t\t\tclass=\"fusion-form-recaptcha-v3 recaptcha-container \"\n\t\t\t\t\t\t\tdata-sitekey=\"6LeyJTQnAAAAALYh3T82YoR-6m5Hb3lodPc4-KZv\"\n\t\t\t\t\t\t\tdata-badge=\"inline\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"hidden\"\n\t\t\t\t\t\t\tname=\"fusion-form-recaptcha-response\"\n\t\t\t\t\t\t\tclass=\"g-recaptcha-response\"\n\t\t\t\t\t\t\tid=\"fusion-form-recaptcha-response-1694\"\n\t\t\t\t\t\t\tvalue=\"\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"fusion_privacy_expiration_interval\" value=\"48\"><input type=\"hidden\" name=\"privacy_expiration_action\" value=\"anonymize\"><\/form><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"author":51,"featured_media":7418,"template":"","categories":[82,45],"class_list":["post-7416","news","type-news","status-publish","has-post-thumbnail","hentry","category-cybersecurity-en","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 - BAYOOMED<\/title>\n<meta name=\"description\" content=\"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 for compliance and secure products.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 for compliance and secure products.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T14:45:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2026\/02\/shutterstock_746652751-bearbeitet-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/\",\"name\":\"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 - BAYOOMED\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/02\\\/shutterstock_746652751-bearbeitet-scaled.jpg\",\"datePublished\":\"2026-02-04T10:47:20+00:00\",\"dateModified\":\"2026-02-12T14:45:51+00:00\",\"description\":\"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 for compliance and secure products.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/02\\\/shutterstock_746652751-bearbeitet-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/02\\\/shutterstock_746652751-bearbeitet-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-2026-cra-iec-81001-5-1-overview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 - BAYOOMED","description":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 for compliance and secure products.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1","og_description":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 for compliance and secure products.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/","og_site_name":"BAYOOMED","article_modified_time":"2026-02-12T14:45:51+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2026\/02\/shutterstock_746652751-bearbeitet-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/","url":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/","name":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 - BAYOOMED","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2026\/02\/shutterstock_746652751-bearbeitet-scaled.jpg","datePublished":"2026-02-04T10:47:20+00:00","dateModified":"2026-02-12T14:45:51+00:00","description":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1 for compliance and secure products.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2026\/02\/shutterstock_746652751-bearbeitet-scaled.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2026\/02\/shutterstock_746652751-bearbeitet-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-2026-cra-iec-81001-5-1-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity 2026: Requirements from the Cybersecurity Resilience Act and IEC 81001-5-1"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/7416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/51"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/7418"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=7416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=7416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}