Cybersecurity and IoT compliance – Directive RED

Objectives

The primary goal of this training is to first instill the fundamental principles of cybersecurity. It will then introduce the RED Directive regulations and its harmonized standard EN 18031. Additionally, the ETSI EN 303 645 standard, its implementation guide ETSI TR 103 621, and the evaluation methodology ETSI TS 103 701 will be presented to best prepare you for certifying your product according to the standard of your choice.

Day 1

  • INTRODUCTION TO CYBERSECURITY
    • Why cybersecurity?
    • “Internet of Things”
    • Practical work: Defining the architecture of a connected biometric lock
  • CYBERSECURITY FUNDAMENTALS
    • The triforce of protection criteria
    • New technologies, new threats
  • CYBERSECURITY RISK
    • Cybersecurity market
    • Security mechanisms
    • Practical: Defining the attack surface of a connected biometric lock
  • CYBERSECURITY BY DESIGN
    • Case studies
    • 12 principles of cybersecurity
  • THE RED DIRECTIVE AND ITS FUTURE HARMONIZED STANDARD EN 18031
    • Legal, Regulatory, and Normative Aspects
    • Network Protection 3(3)(d)
    • Personal Data and Privacy Protection 3(3)(e)
    • Fraud Protection 3(3)(f)
    • Practical Exercise: Identifying Potential Vulnerabilities of a Connected Biometric Lock
  • HARMONIZED STANDARD EN 18031
    • Scope of Application
    • Requirements of Standard EN 18031-1, EN 18031-2 & 18031-3
    • Evaluation Process

Day 2

  • ETSI EN 303 645 STANDARD
    • Scope of application
    • The 13+1 requirements of the standard
    • Implementation Guide: ETSI TR 103 621
    • Evaluation Process: ICS & IXIT
  • ETSI TR 103 621 IMPLEMENTATION GUIDE
    • Risk analysis and security assessment
    • Secure Development Life Cycle (SDLC)
    • Proposed implementations
  • CYBER RESILIENCE ACT (CRA)
    • Regulatory Context and Main Objectives
    • Obligations of Manufacturers, Importers, and Distributors
    • Cybersecurity Requirements in the CRA
    • Legal Consequences of Non-Compliance
  • FIND OUT MORE
    • U.S. Cyber Trust Mark
    • ioXt Certification
    • EN 17927 Standard – SESIP

No experience in in-car safety is required. However, some knowledge of automotive infrastructure is desirable. If remote :

• Stable internet access via Ethernet or Wi-Fi with a good data rate (1.2 Mb/s minimum downstream is recommended).

• A PC / MAC with the Teams tool installed and unrestricted access to the internet.

This training is intended for individuals working in the field of connected devices, particularly those involved in projects that need to comply with the new RED directive. It can be delivered to an audience without prior knowledge of cybersecurity.

Expert in IoT and embedded cybersecurity.

  • PowerPoint presentation
  • Interactive web platform (Klaxoon)

Assessments at the beginning and end of the course, quizzes, etc.

5 working days before the course start date (if financed by OPCO).

A training certificate complying with the provisions of Article L. 6353-1 paragraph 2 is issued to the trainee.

2024 :

Satisfaction rate: 94%

Number of session: 1

Number of trainees: 3

AMONG OUR TRAINING

Cybersecurity and Compliance of Embedded Systems with Radio Communication

Cybersecurity and automotive compliance – UN R155 / UNR156 & ISO 21434

Contact us