Establishing sustainable security processes
Understanding regulatory requirements and implementing them in a targeted manner.
Cybersecurity for your products is not a sure-fire success – it requires targeted preparation, in-depth knowledge and a structured approach.
With our three service packages, we create the ideal foundation – regardless of where your company currently stands – for understanding regulatory requirements, identifying gaps and deriving concrete measures.
Whether management wants to gain an overview of the organisation's status or operational teams need to implement product-related security aspects such as threat modelling, our packages offer the right format for every role and every current situation.
Overview
| Bundle 1 Cybersecurity Readiness | Bundle 2 Getting Started: Process Focus | Bundle 3 Getting Started: Product Focus | |
Workshop: Security Awareness | x | ||
| Workshop: Security Basics for Engineers | x | x | |
| TARA Method Training | x | ||
Gap Analysis – Process Focus | x | x | |
Gap Analysis – Product Focus | x |
Our service bundles offer tailored support for all levels of your company to implement cybersecurity systematically and practically.
- Bundle 1 – Cybersecurity Readiness enables your middle management to understand normative requirements (e.g. IEC 62443) and implement them in a targeted manner. Practical security awareness and a structured GAP analysis provide clarity about the maturity level of the organisation and deliver well-founded recommendations for action as well as a documented basis for decision-making for the next steps.
- Bundle 2 – Getting Started: Process Focus is aimed at project staff and teaches how ‘security by design’ can be implemented in a practical way in the product life cycle for safety-related components. An accompanying GAP analysis highlights necessary measures and the current implementation status and provides a well-founded assessment as a basis for targeted next steps.
- Bundle 3 – Getting Started: Product Focus supports your engineers in implementing ‘security by design’ in practice. Based on a tiered security concept derived from a threat analysis and risk assessment, we teach methods for understanding threat models and applying the results independently.
Your benefit: You gain practical knowledge about normative requirements and cybersecurity processes, gain transparency about the current level of maturity and necessary measures, can understand threat models, and receive specific recommendations for action that you can implement directly in your role.
We offer tailor-made services – precisely tailored to the requirements and needs of your project. Of course, you can also request individual elements!
Interested? Feel free to contact us.
We will provide you with a personalised offer.
Enquire now!