The AI Governance Brief

While your competitors build compliance roadmaps around December 2027, a hidden deadline eighteen months earlier will determine who maintains European market access—and who loses it. September 11, 2026 activates mandatory twenty-four-hour vulnerability reporting to ENISA. Most mid-size organizations cannot meet that timeline because they lack the Software Bill of Materials infrastructure required to identify affected products. That infrastructure takes twelve to eighteen months to build. Do the math.

In This Episode:
  • The September 2026 Compliance Cliff
    • Why vulnerability reporting obligations activate sixteen months before full CRA compliance
    • Twenty-four-hour ENISA notification requirements for actively exploited vulnerabilities
    • The Log4Shell lesson: organizations with SBOM infrastructure responded in hours; those without took months
  • The Four Gaps Destroying Compliance Timelines
    • Product inventory failures: most organizations cannot answer "how many products with digital elements do you sell in EU markets"
    • Classification confusion across Default, Important Class I, Important Class II, and Critical tiers
    • SBOM systems capturing two of seven required data elements
    • Documentation infrastructure that cannot survive regulatory examination
  • Personal Liability Exposure
    • EU Product Liability Directive 2024/2853: presumption of defectiveness for non-CRA-compliant products
    • Discovery scenarios: every security investment decision becomes evidence in litigation
    • Healthcare MDR intersection: connected ecosystems surrounding exempt medical devices may still be in scope
    • Finance DORA overlap: dual compliance requirements most organizations haven't integrated
  • The Six-Element Governance Framework
    • Product inventory and classification processes
    • Documented ownership from design through end-of-life
    • Automated SBOM generation as a build gate
    • CRA-compliant documentation systems
    • Twenty-four-hour vulnerability management workflow
    • Cross-departmental steering committee with executive sponsorship
Your Fourteen-Day Action Plan:
Days 1-3: Conduct complete product inventory across all EU market offerings Days 4-7: Preliminary classification against four-tier CRA framework Days 8-10: Map current ownership and identify accountability gaps Days 11-14: Assess SBOM generation capability against seven required data elements

The Stakes:
€15 million or 2.5% of global annual turnover for non-compliance. No CE marking means no European market. The organizations that dominate EU markets in 2028 are the ones that started preparing in 2025.

Ready to assess your CRA exposure?
The First Witness Stress Test delivers a comprehensive gap analysis of your current readiness against September 2026 vulnerability reporting requirements and December 2027 full compliance obligations. Stop guessing. Start preparing. 
 SCHEDULE AN APPOTINMENT: https://calendly.com/verbalalchemist/discovery-call


EU Cyber Resilience Act, CRA compliance, September 2026 deadline, SBOM Software Bill of Materials, CE marking requirements, vulnerability reporting, ENISA notification, product liability directive, digital product compliance, European market access, cybersecurity regulation, mid-size company compliance 

What is The AI Governance Brief?

Daily analysis of AI liability, regulatory enforcement, and governance strategy for the C-Suite. Hosted by Shelton Hill, AI Governance & Litigation Preparedness Consultant. We bridge the gap between technical models and legal defense.

innovation moves at the speed of code

liability moves at the speed of law

welcome to the AI Governance Brief

we bridge the gap between technical models

and legal defense here is your host

litigation preparedness consultant Keith Hill

September 11th, 2026 write that date down

because while your competitors are building compliance

roadmaps around December 20

the organizations that will dominate European markets

are racing towards a deadline 18 months earlier

a deadline that requires infrastructure

most midsize companies simply don't have

a deadline that if you miss it

triggers the same enforcement mechanism

as missing the final deadline

but catches you completely off guard

hi it's Keith

back with the AI Governance brief

and for those of you that are curious

this is not 11 Labs this is actually me

so give me a call so we can talk

about getting your company ready for EU compliance

this week's episodes we're calling the CRA countdown

and this is episode one

I'm going to tell you about

something that your legal team

may not fully understand yet

your it security function hasn't operationalized

and your board almost certainly hasn't discussed

the EU's Cyber Resilience Act isn't a 2027 problem

it's a 2026 problem disguised as a 2027 problem

and that distinction will separate the companies

that maintain EU market access

from the companies that watch their European revenue

evaporate this is episode 1 of a 7 part series

designed for one purpose giving you the strategic

intelligence

and implementation framework to achieve CRA compliance

before your competitors by the end of this

this episode you'll understand

exactly why the September 2026 deadline

matters more than the December 2027

what infrastructure you need

that you probably don't have

and a 14 day action plan to begin closing the gap

let's start with the uncomfortable truth

The EU Cyber Resilience Act creates a simple equation

no compliance no CE marking

no CE marking no European market

full stop here's what the regulation actually says

beginning December 11th, 2027

every product with digital elements

sold in the European Union

must demonstrate conformity with the C R

a essential requirements

products that fail to demonstrate conformity

cannot carry the C E marking

products without CE

marking cannot legally be placed in the EU market

the penalties are GDP R scale up to €15 million

or two and a half % of your total worldwide

annual turnover whichever is higher

providing incorrect or misleading information to market

surveillance authorities

carries penalties up to €5 million

or 1% of turnover but here's where most organizations

make a catastrophic planning error

they're building compliance programs around December

2027 and they're wrong

Article 14 of the CRA

mandates vulnerability reporting obligations

that take effect September 11th, 2026

16 months before the full compliance deadline

when an actively exploited vulnerability

affecting your product is discovered

you have 24 hours to submit an early warning

to the European Union

Agency for Cybersecurity

ENISA 24 hours

not 24 business days

not 24 hours after your next security review meeting

24 hours from discovery within 72 hours

you must submit a detailed vulnerability notification

within 14 days

a final report

and here's the critical infrastructure question

can you identify within 24 hours

every product in your portfolio

affected by a newly disclosed vulnerability

for most midsize healthcare or finance organizations

the honest answer is no

because answering that question requires something

most companies don't have

a complete accurate

continuous updated

software Bill of materials

for every product with digital elements

when log4shell was discovered in December 2021

organization

organizations with mature SBO m infrastructure

identified effective systems within hours

organizations without it spent weeks

in some cases months conducting manual inventories

while the vulnerability was actively exploited

under CRA vulnerability reporting requirements

that response timeline

isn't just operationally inadequate

it's regulatory non compliance

you cannot report what you cannot see

and you cannot see what you have in inventory

the organizations starting CRA preparation

now have 20 months to build SBO m infrastructure

establish vulnerability management workflows

and operationalize 24 hour reporting capability

the organizations that wait until 2026 to begin

will discover that building this infrastructure

typically requires 12 to 18 months

and they'll have less than 12 months remaining

let me describe what I consistently observe

when conducting CRA readiness assessments

for midsize healthcare and finance companies

the first gap is product inventory

I ask a straightforward question

how many products with digital elements

does your organization sell into EU markets

the typical response involves

three people looking at each other

followed by someone suggesting

they could probably pull that information together

in a few weeks a few weeks for a question

that forms the foundation of every

CRA compliance activity

the CRA defines products with digital elements

as any software or hardware product

and its remote data processing solutions

that includes embedded firmware in medical devices

connected monitoring equipment

client facing applications with cloud back ends

APIs that customers integrate into their own systems

most organizations

have never conducted a comprehensive inventory

through this regulatory lens

the second gap is classification understanding

the CRA establishes four product tiers

default category important class 1

important class 2 and critical

each tier

carries different conformity assessment requirements

default category products

can use internal self assessment procedures

important

class 1 products require either harmonized standards

with international assessment

or third party evaluation

important class 2 and critical products

mandate third party conformity assessment

by a notified body

according to European Commission estimates

approximately 90% of products

will fall into default category

but here's what the statistic obscures

you don't know which of your products fall into the 10%

requiring third party assessment

until you completed the classification exercise

and third party conformity

assessment

bodies are already signaling capacity constraints

the organizations that wait until 2026

to begin classification

will find themselves competing for limited assessment

slots

the third gap in SBOM readiness

the CRA requires

manufacturers to identify and document components

contained in products

including by drawing up a software Bill of materials

the technical specifications

BSI TR dash 0 3

1 8 3 dash 2

which national market surveillance

authorities will reference

mandate specific data elements

component name version string

supplier identification

unique identifier using package URL

or common platform enumeration

cryptographic hash values

license information and dependency relationships

if you were to routinely ask engineer leaders

for your highest revenue product

can you produce an

SPOM containing all seven required data elements

the typical answer is that they can produce something

usually component

names and version numbers

from their dependency management tools

that's two of seven required elements

perhaps three if they configured license scanning

where are the cryptographic hashes

that verify component integrity

where are the package

URLs that enable automated vulnerability correlation

where's the dependency graph

showing how a vulnerability

in a transitive dependency propagates

through your software supply chain

these aren't nice to have elements

they're regulatory requirements

and building the pipeline

infrastructure to generate compliant SBOs

isn't a weekend project organizations with mature

Devsecops practices typically require six

to 12 months to achieve comprehensive s P

O m generation across their product portfolio

the fourth gap is documentation infrastructure

the CRA requires technical documentation to be retained

for 10 years or the product support period

whichever is longer

that documentation must include design specifications

risk

assessments test reports

and evidence of conformity assessment procedures

it must be available to market surveillance authorities

upon request

most engineering documentation exists to help engineers

build product c R

a documentation exists to prove to regulators

that products were built correctly

these are not the same thing

when I examine documentation

systems at midsize companies

I typically find engineering specifications

in the one system test results in another

security assessments in a third

and no systematic linking between them

producing a coherent documentation package

for a single product

requires manual assembly across multiple repositories

now multiply that by every product in your portfolio

add 10 year retention requirements

and consider that market surveillance authorities

may request this documentation

with limited notice

here's where this becomes personal

for everyone listening that means you

the EU Product Liability Directive

specifically Directive 2 0

2 4 slash 2 8

5 3

adopted in October 2024 fundamentally changed

the liability landscape

for products with digital elements

Article 9 creates a presumption of defectiveness

when a product fails to comply

with mandatory safety requirements

including cra essential cyber security requirements

Article 10 permits

courts to presume defect or causation

when manufacturers fail to disclose relevant evidence

let me translate that from regulatory language

to boardroom language

if your product experiences a security incident

and that product was not

era compliant

courts can presume the product was defective

plaintiffs no longer carry the burden of proving

your security architecture was inadequate

your organization carries the burden of proving

it wasn't and here's the discovery scenario

that should concern every executive

when litigation occurs plaintiff

attorneys will request documentation of security

investment decisions budget allocations

risk assessment

meeting minutes where security resources were discussed

the email chain

where engineering requested additional security

investments and finance declined

every security investment decision you make today

becomes

discoverable evidence in future litigation

document accordingly for healthcare executives

this intersects with existing medical device

regulation requirements

in ways many organizations haven't fully analyzed

while medical devices certified under MDR

are exempt from CRA product requirements

the connection ecosystem surrounding those devices

the data management platforms

the integration interfaces

the mobile applications may not be exempt

a security incident in your non

mdr connected infrastructure

that affects clinical data

still exposes your organization

even if the core medical device is compliant

for finance executives

The Digital Operation Resilience Act

already creates entity level ICT security

requirements

CRA adds product level requirements

for any software or connected devices

your organization manufactures

or places on the EU market

managing dual compliance requires integrated governance

that most organizations haven't established

the finance industry associations AFME

the European Banking Foundation

have advocated for CRA exemptions

for financial services firms already subject to Dohra

these exemptions have not materialized

the executive question is

whether your organization faces CRA obligations

the question isn't whether you've established

governance structures

that demonstrate board level

oversight of product security

because when market surveillance

authorities examine your compliance posture

or when plaintiffs attorneys examine your security

decisions we delegated it to engineering

will not be an adequate response

here's what I tell every executive team I work with

CRA compliance is not a technology problem

you don't solve this by buying another security tool

you solve this by establishing governance instructions

that coordinate capabilities you likely already have

have most midsize organizations

have made significant security

investments over the past decade

you have vulnerability scanners

you have dependency management tools

you have documentation systems

you have incident response procedures

what you probably don't have is a governance framework

that coordinates those capabilities

specifically for CRA compliance

and establishes clear accountability

across the product lifecycle

the CRA doesn't ask whether you've

invested in security tools

it asks whether you can prove your products

meet essential requirements

these are fundamentally different questions

the government's framework that achieves CRA compliance

has six essential elements

first product inventory and classification

before anything else

you need a complete catalogue of every product

with digital elements

your organization places on the EU market

classified against the 4 tier CRA framework

this isn't a one time

exercise products evolve

features are added components are updated

you need a process that maintains classification

accuracy as products change

second ownership assignment

every product needs a documented compliance owner

accountable from design through end of life

the CRA requires manufacturers to ensure conformity

throughout the product support period

which may be at least five years

from the market placement

when a vulnerability is disclosed in year 4

someone must own the response

if that ownership isn't documented and updated

you have a governance gap

that the market surveillance authorities will identify

third SPOM infrastructure

this is the technical foundation that enables

everything else your development

pipelines must generate compliant software

bills of materials

automatically as part of the build process

manual SBO m generation doesn't scale

and introduces accuracy errors

organizations must mature

CI slash CD infrastructure

can typically integrate

SBO m generation within existing pipelines

the requirement

is establishing it as a mandatory build gate

fourth documentation systems

CRA technical documentation requirements

are specific and extensive

design descriptions risk assessments

test reports conformity evidence

user information all linked

version controlled and retained for the required period

many organizations find that their existing product

lifestyle management systems

can support these requirements with configuration

but the configuration work is substantial

fifth vulnerability management workflow

this is where September 2026 compliance lives

you need an intake process for vulnerability

information an assessment process

that correlates vulnerabilities to affected products

a remediation process that prioritizes response

and a notification process that meets 24 hour

72 hour and 14 day timelines

many organizations establish product safety incident

it response teams to own this workflow

6 cross departmental coordination

CRA compliance touches legal engineering

it security product management

compliance and quality assurance

no single function owns all required capabilities

you need a steering committee

structure that coordinates across functions

with executive sponsorship

that resolves resource conflicts

what you do not need is another security platform

purchase in my experience

organizations with mature Devsecops practices

already addressed the majority of CRA

essential requirements through existing pipeline

integration the gap is governance

coordination and evidence generation

not tooling

the evidence supporting early

CRA preparation is becoming increasingly clear

in March 2025

Siemens published its CRA Implementation Roadmap

demonstrating that large manufacturers

are treating this as a multi year

transformative initiative

not a compliance deadline to address next year

their public documentation emphasizes SBO

m infrastructure and vulnerability management

as foundational capabilities

exactly the capabilities required

for September 2026 compliance

organizations that began CRA preparation in early 2025

report several quantifiable advantages

first SPOM infrastructure deployment

typically requires six to 12 months

for comprehensive coverage

organizations starting now

have runway to pilot with low risk products

refine processes and scale deliberately

organizations waiting till

2026 will be forced into rushed

enterprise wide deployment

second conformity assessment body capacity is finite

the organizations engaging notified bodies now

for important class 2 and critical products

are securing assessment slots

the organizations waiting

will face capacity constraints

as the deadline approaches

third and perhaps most importantly

early preparation

organizations are identifying scope surprises

with time to address them

one medical technology company I'm aware of

discovered during inventory

that their patient's data platform

which they hadn't considered

a product with digital elements

clearly fell within CRA scope

they identified this in early 2025

giving them over two years to establish compliance

an organization discovering this in late 2026

would face an impossible remediation timeline

the pattern I observe consistently

organizations that treat CRA as a governance

and change management initiative

not a compliance check box

achieve readiness

within significantly lower cost and disruption

than organizations that treat it as a

deadline driven scramble

let me give you a specific 14 day action plan

you can begin implementing Monday morning

day 1 through three product inventory

convene product management

engineering and legal

to identify every product with digital elements

your organization sells or provides into EU markets

include software products

hardware with embedded software and connected devices

include cloud enabled products

where data processing occurs remotely

don't filter or categorize yet

simply build a comprehensive list

days 4 through 7 preliminary classification

using the CRA Annex 3 and 4 categories

conduct initial classification of your inventory

which products are clearly default category

which might qualify as important

class 1 or 2 based on functionality

identify management encryption

network security industrial control

system components

which might qualify as critical based in Annex 4

designations

flag uncertain classifications for deeper analysis

but establish a preliminary view

days 8 through 10

ownership mapping for each inventory product

identify the current de facto compliance owner

document gaps where ownership is unclear or distributed

identify products where the named owner lacks authority

or resources to execute compliance responsibilities

days 11 through 14

s Bom assessment for your highest priority product

typically highest revenue

or highest risk classification

attempt to generate an s Bom

containing all seven CRA required elements

component name version

supplier unique identifier

cryptographic hash license dependencies

document

which elements your current tooling can produce

and which require additional capability

at the end of 14 days you'll have four deliverables

a product inventory a preliminary classification

an ownership map with gaps identified

and a realistic assessment of your

spom generation capability

these four deliverables form the foundation of your

CRA compliance roadmap in Episode 2

we'll go deeper on product scope

definition and classification methodology

because the classification decisions you make now

determine your conformity

assessment requirements your timeline

and your resource allocation for the next 20 months

the organizations that dominate EU markets in 2028

will be the ones that started preparing in 2025

here's what I want you to remember from this episode

December 2027 is the deadline

September 2026 is the deadline

that determines whether you can comply

with December 2027 24 hour

vulnerability reporting requires infrastructure

that most organizations don't have

and can't build in a few months

the organizations

treating CRA as a 2027 problem are already behind

the penalty for non compliance is market exclusion

no CE marking meets no EU market

plus up to €15 million

or two and a half % of global turnover

the Product Liability

Directive creates presumption of defectiveness

for non compliant products

these are not abstract regulatory risk

they are quantified

business consequences that will affect your revenue

your liability exposure and your competitive position

I work with midsize

healthcare and finance organizations

to translate

CRA requirements into actionable implementation

roadmaps

not selling tools guiding organizational transformation

if your organization sells products

with digital elements into European markets

and you haven't started cra preparation

the time to act is yesterday

the 14 day action

plan in this episode is designed to generate exactly

the clarity you need to make informed

resource allocation decisions

execute it bring the results to your next board meeting

start the conversation about what

CRA compliance requires and what it will cost to delay

next episode what exactly is in scope

because you cannot comply with requirements

you haven't mapped to specific products

once again

this is Keith Hill with the AI Governance Brief

contact me if you'd like to have a conversation

about getting out there early

and getting yourself ready for the compliance field

that's coming very very soon

that's the brief for today

remember if you can't explain your governance to a jury

in plain English you don't have governance

you have exposure don't wait for the deposition

book a first witness

stress test for your compliance team

at verbal

alchemist at Gmail dot com

this is Keith and I'll see you tomorrow