BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Exida: Excellence. Independence. International Customer Base.//NO
 NSGML kigkonsult.se iCalcreator 2.30.10//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:b969ac92-b762-4735-8b60-d055fb8dabf2
X-WR-CALNAME:iCagenda
X-WR-CALDESC:Event Management Extension for Joomla!
X-WR-RELCALID:3E26604A-50F4-4449-8B3E-E4F4932D05B5
X-WR-TIMEZONE:Europe/Rome
BEGIN:VTIMEZONE
TZID:Europe/Rome
BEGIN:STANDARD
TZNAME:CET
DTSTART:20231029T030000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
RDATE:20241027T030000
RDATE:20251026T030000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:CEST
DTSTART:20240331T020000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RDATE:20250330T020000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:f78e72b8-a609-441e-8e4d-9fa18bc20f37
DTSTAMP:20260503T101309Z
CATEGORIES:Cybersecurity
CLASS:PUBLIC
DESCRIPTION;ALTREP="CID:<FFFF__=0ABBE548DFE235B58f9e8a93d@coffeebean.com>":
 \n\n\n\n\nRoad Vehicle Cybersecurity in the context of ISO/SAE 21434\n\n\n
 Who should attend:\n\nAutomotive Cybersecurity responsible persons\nFuncti
 onal Safety Engineers – who want to understand how they are impacted by Cy
 bersecurity\nDevelopment Engineers (System\, Hardware and Software)\nProdu
 ct Managers\nProject Leaders of cybersecurity related development projects
 \nProcess Managers \nQuality Managers\n\n\n\nAgenda and Content:\n\n\n\n\n
 \nAwareness &amp\; Motivation\n\nWhy became Automotive Cybersecurity a cri
 tical discipline?\n\n\nCybersecurity &amp\; Functional Safety\n\nHow they 
 differ? What are the synergies? What are the conflicts?\n\n\nISO/SAE 21434
  and related Standards\n\nTHE road-vehicle cybersecurity standard is out: 
 What does it address and not address?\nHow do other standards relate?\n\n
 \nCybersecurity Management\n\nOrganizational cybersecurity management\nPro
 ject dependant cybersecurity management\nVulnerability monitoring and inci
 dent response\n\n\nConcept Phase\n\nCybersecurity objectives\nItem =&gt\; 
 TARA =&gt\; security goals\nTARA methodology\n\n\nProduct Development\n\nC
 ybersecurity Specification… Needs\nMeasures/Mitigations and V&amp\;V\n\n\n
 Attacks\n\nWhy absolute security does not exist?\n\n\n\n\n\n\n\n\n\n\n\nFo
 r more details about the course topics\, download the brochure on the top 
 of the page\n \n\n\nDuration: 2.5 days\n \nSchedule: 1st day 10.00 - 18.00
 \; 2nd day 09.00 - 17.00\; 3rd day 09.00 - 13.00\;\nLanguage: English or G
 erman in agreement with the participants. The training material will be in
  English.\nLocation: ONSITE at our training rooms to exida.com GmbH office
 \, Prof. - Messerschmitt-Straße 1 - D-85579\, Neubiberg / Germany or ONLIN
 E\nCertificate: each participant gets a letter of attendance.\n\n\n
DTSTART:20240917T080000Z
DTEND:20240919T110000Z
GEO:00;0
LOCATION:Prof.-Messerschmitt-Straße 1  D-85579 Neubiberg / Germany
ORGANIZER;CN=:kerstin.tietel@exida.com
SEQUENCE:1
SUMMARY:Road Vehicle Cybersecurity (DE0602)
TRANSP:OPAQUE
URL:https://www.exida-eu.com/all-trainings/cybersecurity/169-road-vehicle-c
 ybersecurity-de0602
END:VEVENT
END:VCALENDAR
