Welcome to the CYRES Academy On-Demand Video CourseCybersecurity policy, Rules, Resources, Processes (G3_2)”. This video course will introduce to you to Cybersecurity policy, Rules, Resources, and Processes. ISO/SAE 21434 requires companies to have a so-called Cybersecurity policy in place. What does this mean? In this video learning course, you will learn what exactly is meant by the Cybersecurity policy. At the same time you will learn how Cybersecurity rules and processes, Cybersecurity responsibilities and Cybersecurity resources are related to it.

After watching this video course, you will be able to understand, apply, and discuss the following terms in a professional manner: Cybersecurity policy, Cybersecurity rules, Cybersecurity processes, Cybersecurity audit, Cybersecurity Assessment



Please note: This video is based on content from ISO/SAE 21434:2021 Road Vehicles - Cybersecurity Engineering.


This video contains seven topics:

I. Intro to Cybersecurity policy, Rules, Resources, Processes
In the intro you will get to know what you will learn in this video course.

II. Importance of Cybersecurity policy, Rules, Resources, Processes

Here's why a better understanding of the terms Cybersecurity policy, Cybersecurity rules, Cybersecurity processes, Cybersecurity audit, and Cybersecurity Assessment helps you in your daily work.

III. Cybersecurity policy Definition

In this part of the course, we will explain what the Cybersecurity policy exactly is.

IV. Requirements & Recommendations in a Cybersecurity policy

Here we will go deeper into what requirements and recommendations are included in a Cybersecurity policy and how it is linked to Cybersecurity rules and processes, Cybersecurity responsibilities and Cybersecurity resources.


V. Cybersecurity Rules and Processes

In this part we will go through the exact definition of a Cybersecurity Process, as well as how to establish such a process and which other interface processes should be linked to a cybersecurity process.


VI. Cybersecurity Audit & Assessment

Here we will explain the difference between Cybersecurity Audit and Cybersecurity Assessment, on what level they are addressed and what type of process it focuses on.


VII. Sum Up

Finally, here we will sum up what you have learned about the Cybersecurity policy, Cybersecurity rules and process and beyond.



Course plan

All Videos
G3_2 II. Importance of Cybersecurity policy, Rules, Resources, Processes
G3_2 III. Cybersecurity policy Definition
G3_2 IV. Requirements & Recommendations in a Cybersecurity Policy
G3_2 V. Cybersecurity Rules and Processes
G3_2 VI. Cybersecurity Audit & Assessment
G3_2 VII. Sum Up