Play

Automotive Cybersecurity OverSimplified

Do you want to understand the basics of Automotive Cybersecurity? Then sit back and enjoy the ride with our explainer. 

Play

How to comply with the UNECE regulations

As of July 2022, the UNECE cybersecurity management and software update regulation is in effect.

Watch this short video to learn how to manage cybersecurity regulations for homologation and vehicle type approval. 

Play

Automotive Cybersecurity Engineering, what's that?

Cybersecurity Engineering, that provides encryption and makes the car more secure? Yes, but the tasks are much more extensive. This video explains what they are.

Play

How to set-up a Software Update Management System

Your Software Update Management System (SUMS) is what makes your cybersecurity activities effective: because software updates are the remedy to counter threats from cyberspace. With SUMS, you can handle these updates in compliance with regulatory requirements.

Play

How to comply with the UNECE regulations

Wondering how to comply with UNECE cybersecurity regulations? Here you' ll find out about the management systems to set up and the certificates you are required to have for vehicle type approval.

Play

How to manage your cybersecurity activities

Here you learn how to with the UNECE regulations on cybersecurity by establishing a cybersecurity management system. In this video, we introduce you stept by step in the art of setting up an efficient CSMS. 

Play

The centerpiece of your cybersecurity activities

The UNECE regulations on cybersecurity require the establishment of a cybersecurity management system. This CSMS is relevant for homologation. In this video, we show you the challenges of setting up a CSMS. You will also learn about the main CSMS components.

Play

The Nine2Five TARA Navigator

Risk assessments are the center-piece of cyberecurity-driven activities. With the Nine2Five TARA Navigator, we provide a proven approach for the elaborated TARA, Threat Analysis and Risk Assessment in the concept stage. 

Play

How to coordinate functional safety with cybersecurity

Yes, there are numerous touchpoints and overlaps between cybersecurity (ISO 21434) and functional safety (ISO 26262). Watch this discussion between two experts to understand the overlaps between the disciplines – there, you'll have to coordinate your activities intensively. 

Play

How to set-up a Software Update Management System

Your Software Update Management System (SUMS) is what makes your cybersecurity activities effective: because software updates are the remedy to counter threats from cyberspace. With SUMS, you can handle these updates in compliance with regulatory requirements.

Play

How to comply with the UNECE regulations

Wondering how to comply with UNECE cybersecurity regulations? Here you' ll find out about the management systems to set up and the certificates you are required to have for vehicle type approval.

Play

The Nine2Five TARA Navigator

Risk assessments are the center-piece of cyberecurity-driven activities. With the Nine2Five TARA Navigator, we provide a proven approach for the elaborated TARA, Threat Analysis and Risk Assessment in the concept stage. 

Play

The centerpiece of your cybersecurity activities

The UNECE regulations on cybersecurity require the establishment of a cybersecurity management system. This CSMS is relevant for homologation. In this video, we show you the challenges of setting up a CSMS. You will also learn about the main CSMS components.

Play

How to manage your cybersecurity activities

Here you learn how to with the UNECE regulations on cybersecurity by establishing a cybersecurity management system. In this video, we introduce you stept by step in the art of setting up an efficient CSMS.