Automotive Cybersecurity – Executive Overview of ISO/SAE 21434
Learn about automotive cybersecurity and how it relates to each stage of the vehicle lifecycle with an executive-level look at ISO/SAE 21434.
This half-day training covers automotive cybersecurity management for executive managers based on the state-of-the-art ISO/SAE 21434 standard as a guiding template. The goal is to inform managers and responsible engineers of the implications of ISO/SAE 21434’s processes and work products for their company.
Key Takeaways
- Overview of ISO/SAE 21434 standard
- The clauses (chapters) of the ISO/SAE standard and their objectives/requirements/work products:
- Clause 5 Organizational cybersecurity management includes the cybersecurity management and specification of the organizational cybersecurity policies, rules and processes.
- Clause 6 Project dependent cybersecurity management includes cybesecurity management and cybersecurity activities at the project level.
- Clause 7 Distributed cybersecurity activities includes requirements for assigning responsibilities for cybersecurity activities between customer and supplier.
- Clause 8 Continual cybersecurity activities includes activities that provide information for ongoing risk assessments and defines vulnerability management of E/E systems until end of cybersecurity support.
- Clause 9 Concept includes activities that determine cybersecurity risks, cybersecurity goals and cybersecurity requirements for an item.
- Clause 10 Product development includes activities that define the cybersecurity specifications and implement and verify cybersecurity requirements.
- Clause 11 Cybersecurity validation includes the cybersecurity validation of an item at the vehicle level.
- Clause 12 Production includes the cybersecurity-related aspects of manufacturing and assembly of an item or component.
- Clause 13 Operations and maintenance includes activities related to cybersecurity incident response and updates to an item or component.
- Clause 14 End of cybersecurity support and decommissioning includes cybersecurity considerations for end of support and decommissioning of an item or component.
- Clause 15 Threat analysis and risk assessment methods includes modular methods for analysis and assessment to determine the extent of cybersecurity risk so that treatment can be pursued.
- Cybersecurity management
- Interaction between client and suppliers
- Overview of concept phase
- Cybersecurity item definition
- Threat analysis and risk assessment methods
- Cybersecurity goals and claims
- Cybersecurity concept
- Overview of the product development phase
- Design
- Integration and verification
- Cybersecurity validation
- Continual cybersecurity activities
- Cybersecurity monitoring
- Vulnerability analysis and management
- Production, operation, maintenance and decommissioning topics
Target Audience
- Engineering managers
- Directors and VP-level executives
- Senior/principal engineering staff
- Engineers and developers
- Sales and purchasing personnel
Prerequisites
None required.
Further Information
For online trainings, all materials are offered digitally. For in-person trainings, all materials are offered digitally and may be supplemented with hard copies. Copies of any relevant standards must be provided by the learner.
Course Dates
We’re unable to process your registration due to an unexpected error. Try again or if the problem continues, contact us.
Contact Sales
Whether you're looking for a custom quote or private training, we can help. Fill out this form and we'll connect with you shortly.
Can't find what you're looking for?
Click the link and request a quote tailored to your organization's needs.
Request a QuotePrivate Trainings Available
Click the link for information on scheduling a private training for your organization.
Contact Sales