2019 SAE Corporate Learning GV Resource Guide - P18294612

ELECTRICAL/ELECTRONICS AND ELECTRONIC SYSTEMS

process improvement and auditing. Executives and management representatives will better understand how to use J3061 to build defense and in-depth cyber-physical vehicle systems and how to drive cost savings through a systematic process. Human Resources will comprehend the need for seeking out individuals with the skills needed to address cybersecurity within their organizations. Similar content is available in the classroom seminar, Keys to Creating a Cybersecurity Process from the J3061 Process Framework (I.D.# C1730). Topical Outline SESSION ONE • Brief History of Automotive Security and Cybersecurity −− Introduction to Connected Vehicle Applications • Cyber-Physical Systems −− Difference between cyber-physical systems security (cybersecurity) and IT security • Five Levels of Vehicle Attack: wireless, wired; ECU external / internal; software / silicon • Reactive vs. Proactive Approach to Cybersecurity • What is a Process? • Key Concepts in Cybersecurity Defined • Introduction to J3061 −− What components of a process are captured −− Scope, rationale and intent −− Tailoring from the ISO 26262 process framework • When to Apply a Cybersecurity Process • Cybersecurity Process Overview −− Motivation for a well-defined and well-structured process

to monitor for and respond to incidents in the field, and to address vulnerabilities in service and operation. J3061 is unique in describing a process framework for cybersecurity that an organization can tailor against its other development processes. This allows an organization to develop an internal cybersecurity process consistent with its other processes in order to build cybersecurity robustness into their cyber-physical systems. This web seminar will define key concepts in cybersecurity and discuss what a cybersecurity process consists of and why one is needed for the development of cyber-physical vehicle systems. Featuring instructors from the SAE Vehicle Cybersecurity Systems Engineering Committee, the course will feature the process framework described in J3061 that will enable participants to relate it to their own organization’s processes, including cyberse- curity and safety activities. The instructors will provide guidance on how to tailor the standard’s process framework into an internal process to build cybersecurity robustness into cyber-physical systems. Different approaches to integrate the process within the participant’s organization, including the key issues and potential pitfalls with respect to implementation of a cybersecurity process, will be discussed. Key analysis activities that support the process, including Threat Analysis and Risk Assessment and Attack Tree Analysis, will also be presented. Note: Due to the complexities and unique internal processes within each organization, participants will not be given a complete process implementation that can be directly applied in their organization. The information provided in the course will equip participants with the necessary foundation to begin tailoring the J3061 process framework for application within their organization. Learning Objectives By participating in this web seminar, you will be able to: • Define key cybersecurity concepts • Describe what a process consists of and why a cybersecurity process is needed • Relate the process framework described in J3061 to your own development processes • Recognize ways to integrate cybersecurity and safety within your organization • Describe analysis activities to be performed with respect to an effective cybersecurity process • Recognize potential pitfalls and key issues with respect to implementation Who Should Attend This course will be beneficial to anyone involved in cybersecurity including those wishing to lead their organization in implementing and applying a cybersecurity process. Cybersecurity engineers will learn the need for a cybersecurity process and comprehend the J3061 process framework for tailored application in their organization. Quality management professionals will learn that a cybersecurity process is another important factor in internal

−− J3061 process framework −− Milestone and gate reviews

SESSION TWO • Cybersecurity Process Details • Overall management of cybersecurity • Concept phase • Product development at the system, hardware and software levels

SESSION THREE • Production, Operation and Service • Supporting Processes • Relationship between Cybersecurity Process and Safety Process • Review of Appendices A, C-E, G-I • Tailoring the J3061 Process Framework into an Internal Process

• Examples of Key Analysis Activities −− Threat Analysis and Risk Assessment −− Attack Tree Analysis • Summary

Instructor: Fee: $610

David Ward

.7 CEUs

URL:

sae.org/learn/content/wb1604/

39

3 ways to get a no-obligation price quote to deliver a course to your company: Call SAE Corporate Learning at +1.724.772.8529  |  Fill out the online quote request at sae.org/corplearning  |  Email us at corplearn@sae.org

Made with FlippingBook Online newsletter