Keys to Creating a Cybersecurity Process from the J3061 Process Framework

December 3-7, 2018 SAE International Web Seminar

Connected vehicles are increasingly seen as a target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack can affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats.

This web seminar will define key concepts in cybersecurity and discuss what a cybersecurity process consists of and why one is needed for the development of cyber-physical vehicle systems. Featuring instructors from the SAE Vehicle Cybersecurity Systems Engineering Committee, the course will feature the process framework described in J3061 that will enable participants to relate it to their own organization"s processes, including cybersecurity and safety activities.

The instructors will provide guidance on how to tailor the standard"s process framework into an internal process to build cybersecurity robustness into cyber-physical systems. Different approaches to integrate the process within the participant"s organization, including the key issues and potential pitfalls with respect to implementation of a cybersecurity process, will be discussed. Key analysis activities that support the process, including Threat Analysis and Risk Assessment and Attack Tree Analysis, will also be presented.

Note: Due to the complexities and unique internal processes within each organization, participants will not be given a complete process implementation that can be directly applied in their organization. The information provided in the course will equip participants with the necessary foundation to begin tailoring the J3061 process framework for application within their organization.

Learning Objectives

By participating in this web seminar, you will be able to:

  • Define key cybersecurity concepts
  • Describe what a process consists of and why a cybersecurity process is needed
  • Relate the process framework described in J3061 to your own development processes
  • Recognize ways to integrate cybersecurity and safety within your organization
  • Describe analysis activities to be performed with respect to an effective cybersecurity process
  • Recognize potential pitfalls and key issues with respect to implementation

Who Should Attend

This course will be beneficial to anyone involved in cybersecurity including those wishing to lead their organization in implementing and applying a cybersecurity process. Cybersecurity engineers will learn the need for a cybersecurity process and comprehend the J3061 process framework for tailored application in their organization. Quality management professionals will learn that a cybersecurity process is another important factor in internal process improvement and auditing. Executives and management representatives will better understand how to use J3061 to build defense and in-depth cyber-physical vehicle systems and how to drive cost savings through a systematic process. Human Resources will comprehend the need for seeking out individuals with the skills needed to address cybersecurity within their organizations.