Criteria

Text:
Display:

Results

Viewing 1 to 6 of 6
2018-04-25 ...
  • April 25-27, 2018 (2 Sessions) - Live Online
Training / Education Online Web Seminars
In recent years, total annual United States patent grants have increased to over 300,000, while patent infringement lawsuit filings have exceeded 6,000 per year. Only a small fraction of granted patents ever end up in litigation. Of the many causes for the disparity is the growing awareness and sensitivity of companies to patent infringement risk management practices. This course addresses a number of those practices (and tools for implementing the practices), placing them into context, and providing a practical overview for how to implement them to help reduce the prospect of patent infringement litigation.
Training / Education Classroom Seminars
Connected vehicles are increasingly seen as a potential target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack could affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
2018-02-26 ...
  • February 26-March 2, 2018 (3 Sessions) - Live Online
Training / Education Online Web Seminars
SAE J3061 sets out a recommended cybersecurity engineering process framework for organizations developing cyber physical systems. One of the recommendations of this framework is to carry out a threat analysis and risk assessment early in the product development. A threat analysis identifies and models the relevant threats against assets, and a risk assessment classifies the impact and likelihood associated with each threat. The approach enables the prioritization of risks and appropriate risk treatment measures to be determined in subsequent development phases.
2018-03-05 ...
  • March 5-16, 2018 (6 Sessions) - Live Online
  • November 5-16, 2018 (6 Sessions) - Live Online
Training / Education Online Web Seminars
Automotive projects continue to grow in complexity. Studies provide a glimpse into the attributes of product development projects that have a high likelihood of failure. Knowing these attributes, the approach to the project can be structured to reduce the risks. For example, the scope of the project may already place the project at risk. Understanding the risks associated with the scope enables you to either reconsider the scope or work out strategies that will eliminate or at least mitigate the risks. In addition, your approach or strategy selected to meet the project demands will have significant impact on the results.
2018-04-11 ...
  • April 11, 2018 (8:30 a.m. - 4:30 p.m.) - Detroit, Michigan
  • June 26, 2018 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan
  • October 17, 2018 (8:30 a.m. - 4:30 p.m.) - Palm Desert, California
Training / Education Classroom Seminars
Active Safety, Advanced Driver Assistance Systems (ADAS) are now being introduced to the marketplace as they serve as key enablers for anticipated autonomous driving systems. Automatic Emergency Braking (AEB) is one ADAS application which is either in the marketplace presently or under development as nearly all automakers have pledged to offer this technology by the year 2022. This one-day course is designed to provide an overview of the typical ADAS AEB system from multiple perspectives.
2018-02-12 ...
  • February 12-16, 2018 (3 Sessions) - Live Online
  • June 18-22, 2018 (3 Sessions) - Live Online
  • December 3-7, 2018 (3 Sessions) - Live Online
Training / Education Online Web Seminars
Connected vehicles are increasingly seen as a target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack can affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
Viewing 1 to 6 of 6