IOT Cybersecurity and RED Directive compliance

Objectives

The primary goal of this training is to first instill the fundamental principles of cybersecurity. It will then introduce the RED Directive regulations and its harmonized standard EN 18031. Additionally, the ETSI EN 303 645 standard, its implementation guide ETSI TR 103 621, and the evaluation methodology ETSI TS 103 701 will be presented to best prepare you for certifying your product according to the standard of your choice.

Day 1

  • INTRODUCTION TO CYBERSECURITY
    • Why cybersecurity?
    • “Internet of Things”
    • Practical: Define the architecture of a connected biometric lock

 

  • CYBERSECURITY FUNDAMENTALS
    • The triforce of protection criteria
    • New technologies, new threats

 

  • CYBERSECURITY RISKS
    • Cybersecurity market
    • Security mechanisms
    • Practical: Define the attack surface of a connected biometric lock

 

  • CYBERSECURITY BY DESIGN
    • Case studies
    • 12 principles of cyber security

 

  • THE RED DIRECTIVE
    • Legal, Regulatory, and Normative Aspects
    • Network Protection 3(3)(d)
    • Personal Data and Privacy Protection 3(3)(e)
    • Fraud Protection 3(3)(f)
    • Practical Exercise: Identifying Potential Vulnerabilities of a Connected Biometric Lock

 

  • HARMONIZED STANDARD EN 18031
    • Scope of Application
    • Requirements of Standard EN 18031-1, EN 18031-2 & 18031-3
    • Evaluation Process

 

Jay 2

  • ETSI STANDARD EN 303 645
    • Scope of application
    • The 13+1 requirements of the standard
    • Implementation Guide: ETSI TR 103 621
    • Evaluation Process: ICS & IXIT

 

  • ETSI TR 103 621 IMPLEMENTATION GUIDE
    • Risk analysis and security assessment
    • Secure Development Life Cycle (SDLC)
    • Proposed implementations

 

  • CYBER RESILIENCE ACT
    • Regulatory Context and Main Objectives
    • Obligations of Manufacturers, Importers, and Distributors
    • Cybersecurity Requirements in the CRA
    • Legal Consequences of Non-Compliance

 

  • FIND OUT MORE
    • U.S. Cyber Trust Mark
    • ioXt Certification
    • EN 17927 Standard – SESIP

No experience in in-car safety is required. However, some knowledge of automotive infrastructure is desirable. If remote :

• Stable internet access via Ethernet or Wi-Fi with a good data rate (1.2 Mb/s minimum downstream is recommended).

• A PC / MAC with the Teams tool installed and unrestricted access to the internet.

This training is intended for individuals working in the field of connected devices, particularly those involved in projects that need to comply with the new RED directive. It can be delivered to an audience without prior knowledge of cybersecurity.

Expert in IoT and embedded cybersecurity

  • PowerPoint presentation
  • Interactive web platform (Klaxoon)

Evaluation at the beginning and end of the course, quiz…

5 working days before the course start date (if financed by OPCO).

A training certificate complying with the provisions of Article L. 6353-1 paragraph 2 is issued to the trainee.

2025 :

  • Satisfaction rate: 92%
  • Number of sessions: 2
  • Number of trainees: 9

AMONG OUR TRAINING

Cybersecurity of embedded systems and connected objects

Sécurité des technologies sans fil

Radio hacking & security of wireless technologies SDR, LoRa, Bluetooth, Wi-Fi, and GNSS

Contact us