In this video course "Cybersecurity Software Control Implementation: Development vs. Production (G14_5)", you will learn how the implementation of cybersecurity must always take into account the entire product lifecycle, with special attention to the distinction between the development and post-development phases.

In the first part of the video course, as a reminder, we are going to introduce the V-model and the successive phases of the entire product lifecycle - with the main distinction between the development phase and the subsequent post-development phase.

From the perspective of cybersecurity in development, we then highlight the consequences of certain actions in the development phase for the post-development phase.

We then show the most important factors for the secure handling of cryptographic keys from the development phase to the post-development phases. This is of particular importance, for example, in order to also reduce the never-to-be-excluded internal risks ("Insider Threats") within the development of a vehicle as best as possible.

This is followed by an outline of the most important measures to be taken to ensure the security of software developments right from the development phase.



Course plan

All Videos
G14_5 Cybersecurity Software Control implementation - Development vs Production