Global training solutions for engineers creating the world's electronics
Menu

Making Cybersecurity Compliance Easier: Risk Analysis and Threat Modeling

1 hour session (All Time Zones)
Presenter: Adrian Thomasset

Senior Member Technical Staff
Presenter: Carlos Serratos
IoT Certification Expert, NXP Semiconductors
Presenter: Jon Oster
Principal Software Product Security Architect, Toradex

Asia and Europe

Time: 10-11am (BST) 11am-12pm (CEST) 2.30-3.30pm (IST)


Americas

Time: 10-11am (PDT) 11am-12pm (MDT) 12-1pm (CDT) 1-2pm (EDT)


Webinar Overview:

As the necessity for robust cybersecurity is being shaped by international compliance legislation, device makers face new obligations across their product lifecycle, from development to EOL.

Using the EU Cyber Resilience Act (CRA) as an example, this joint webinar from Toradex, NXP & Doulos will demonstrate that getting your cybersecurity risk assessment and threat modeling right isn’t just a box to tick - it's actually the foundation of all of your compliance activities. 

This webinar will provide: 

  • A view of the CRA’s stipulation for a risk assessment and the evolving standards landscape, to see what will likely be strictly required.
  • A look at the effect a product’s risk assessment has on the rest of its CRA compliance obligations, to illustrate why it’s so important.
  • A practical introduction to threat modeling, with real-world examples.
  • An overview to how hardware security features can provide concrete security controls that can shrink attack surfaces and make threat models easier to manage.
  • An example of a successful implementation of the risk analysis process. 

This session will help you understand how to implement a risk assessment strategy that’s aligned with evolving regulatory requirements. It’s useful for anyone interested in maximizing the security of connected devices, but essential viewing if you're leading development, product security, or compliance.

Webinar highlights: 

  • Relevant CRA sections that mandate risk assessment and threat modeling 
  • Why a good, correctly scoped risk assessment eases compliance burdens 
  • How to create a threat model 
  • How hardware-backed security features can help.

Adrian Thomasset

Adrian Thomasset - Senior Member Technical Staff at Doulos. With over 20 years embedded systems experience, he has been key in developing and delivering Embedded Linux, Linux security and Yocto training for Doulos.



Carlos Serratos

Carlos Serratos - IoT Certification Expert at NXP Semiconductors. He is a specialist in IoT security and compliance and also the SESIP Ecosystem Adoption Working Group Chair for GlobalPlatform.



Jon Oster

Jon Oster - Principal Software Product Security Architect at Toradex. His focus is leveraging SoM security features in Toradex SoMs in Torizon to ensure customers are prepared for cybersecurity regulations.


Attendance is free of charge

If you have any queries, please contact webinars@doulos.com


More FREE online support resources with Doulos KnowHow

Doulos Knowhow includes

  • Technical information
  • Coding examples
  • Guidelines
  • Tips
  • Tutorials
  • Video guides
  • Downloads

Visit www.doulos.com/knowhow


Related training available from Doulos:

Please contact Doulos to schedule a public course to suit you, or to discuss onsite training.