Welcome to the CYRES Academy On-Demand Video Course “Cybersecurity policy, Rules, Resources, Processes (G3_2)”. This video course will introduce to you to Cybersecurity policy, Rules, Resources, and Processes. ISO/SAE 21434 requires companies to have a so-called Cybersecurity policy in place. What does this mean? In this video learning course, you will learn what exactly is meant by the Cybersecurity policy. At the same time you will learn how Cybersecurity rules and processes, Cybersecurity responsibilities and Cybersecurity resources are related to it.
After watching this video course, you will be able to understand, apply, and discuss the following terms in a professional manner: Cybersecurity policy, Cybersecurity rules, Cybersecurity processes, Cybersecurity audit, Cybersecurity Assessment
Please note: This video is based on content from ISO/SAE 21434:2021 Road Vehicles - Cybersecurity Engineering.
This video contains seven topics:I. Intro to Cybersecurity policy, Rules, Resources, Processes
In the intro you will get to know what you will learn in this video course.
II. Importance of Cybersecurity policy, Rules, Resources, ProcessesHere's why a better understanding of the terms Cybersecurity policy, Cybersecurity rules, Cybersecurity processes, Cybersecurity audit, and Cybersecurity Assessment helps you in your daily work.
III. Cybersecurity policy DefinitionIn this part of the course, we will explain what the Cybersecurity policy exactly is.
IV. Requirements & Recommendations in a Cybersecurity policyHere we will go deeper into what requirements and recommendations are included in a Cybersecurity policy and how it is linked to
V. Cybersecurity Rules and Processes
In this part we will go through the exact definition of a Cybersecurity Process, as well as how to establish such a process and which other interface processes should be linked to a cybersecurity process.
VI. Cybersecurity Audit & Assessment
Here we will explain the difference between Cybersecurity Audit and Cybersecurity Assessment, on what level they are addressed and what type of process it focuses on.
VII. Sum UpFinally, here we will sum up what you have learned about the Cybersecurity policy, Cybersecurity rules and process and beyond.