28-A
Now offering in-person and virtual training

Power Up with Cybersecurity 

Under the guidance of senior-level Cybersecurity-experienced instructors, your engineers will be exposed to a better understanding of the implementation of cybersecurity, and its management, analysis, monitoring, and evaluation processes.

 

_______

 

Sign Up Now

Overview

From conception to production, functionally safe vehicles must be protected against the criminal or unauthorized use of, or attacks against, the electronic data and systems that are the lifeblood of these modern mechatronic machines. New and existing products must follow the proper measures to avoid, detect, and control these threats. Organizations must understand how to recognize these threats and mitigate them effectively.

Our Cybersecurity Power-Up Training will describe the meaning of cybersecurity and what is being done in the automotive industry to integrate these critical processes and safeguards. You will gain insight into each cybersecurity consideration, and the impacts they have on your organization and your customers. 

What are the learning objectives?
  • Standards: Learn how to articulate the purpose of ISO/SAE 21434. Compare and contrast the impacts of relevant standards from:
    • NIST: National Institute of Standards and Technology
    • ISO: International Organization for Standardization
    • DIN: German Institute for Standardization
    • ANSI: American National Standards Institute
    • IEC International Electrotechnical Commission

  • Cyber Management:
    • Learn how to articulate overall cybersecurity management, including governance, culture, management and information systems, tool management, and audits.
    • Understand the activities related to project-dependent cybersecurity management.

  • Threat Analysis and Prevention:
    • Work through a Threat Assessment and Remediation Analysis (TARA) case study.

  • Process Monitoring and Evaluation:
    • Understand the processes for monitoring, evaluation, vulnerability analysis, and management.
    • Explain the distribution of cybersecurity activities and how to work with the supplier.
 

Executive Overview Agenda

Day 1

  • Clause 1: Scope
  • Clause 2: Normative References
  • Clause 3: Terms and Definitions
  • Clause 4: General Considerations
  • Clause 5: Organizational Cybersecurity Management
  • Clause 6: Project Dependent Cybersecurity Management
  • Clause 7: Distributed Cybersecurity Activities
  • Clause 8: Continual Cybersecurity Activities

Day 2:

  • Clause 9: Concept
  • Clause 10: Product Development
  • Clause 11: Cybersecurity Validation
  • Clause 12: Production
  • Clause 13: Operation and Maintenance
  • Clause 14: End of Cybersecurity Support and Decommissioning
  • Clause 15: Threat Analysis and Risk Assessment Methods

 

 

Meet Your Presenters

Avatar-Kelly Stephenson-1500x1500

Kelly Stephenson

Solutions Architect, Cyber Security

Kelly is a Solutions Architect in Cyber Security with over 30 years of engineering experience in automotive and industrial IoT products. Kelly is an innovative security engineer with extensive cybersecurity and software development experience within automotive design markets.

Avatar-David Ha-1500x1500

David Ha

Senior Embedded Cyber Security Engineer

David Ha is a senior embedded cyber security engineer with over 15 years of experience in Cyber Security Product Development, Systems Integration, Verification, Debug, and Failure Analysis. He is also proficient in project management in all phases of development from system design to requirement definition in semiconductor security block and video broadcast content Cyber Security.

On-site Sessions

Customer's Location

Call for Quote 812-373-0880

For Groups of up to 20 Engineers