Browse Learn C1730

Keys to Creating a Cybersecurity Process from the J3061 Process Framework C1730

Connected vehicles are increasingly seen as a potential target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack could affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth. SAE J3061 provides an engineering process to design and build cybersecurity into vehicle systems in a comprehensive and systematic way, to monitor for and respond to incidents in the field, and to address vulnerabilities in service and operation. J3061 is unique in describing a process framework for cybersecurity that an organization can tailor against its other development processes. This allows an organization to develop an internal cybersecurity process consistent with its other processes in order to build cybersecurity robustness into their cyber- physical systems.

This seminar will define key concepts in cybersecurity and discuss what a cybersecurity process consists of and why one is needed for the development of cyber-physical vehicle systems. Featuring instructors from the SAE Vehicle Cybersecurity Systems Engineering Committee, the course will describe the process framework described in J3061 that will enable participants to relate it to their own organization"s processes, including cybersecurity and safety activities. The instructors will provide guidance on how to tailor the standards process framework into an internal process to build cybersecurity robustness into cyber-physical systems. Different approaches to integrate the process within the participant's organization, including the key issues and potential pitfalls with respect to implementation of a cybersecurity process, will be discussed. Key analysis activities that support the process, including Threat Analysis and Risk Assessment and Attack Tree Analysis, will also be presented.

Note: Due to the complexities and unique internal processes within each organization, participants will not be given a complete process implementation that can be directly applied in their organization. The information provided in the course will equip participants with the necessary foundation to begin tailoring the J3061 process framework for application within their organization.

Learning Objectives
By participating in this seminar, you will be able to:
  • Define key cybersecurity concepts
  • Describe what a process consists of and why a cybersecurity process is needed
  • Relate the process framework described in J3061 to your own development processes
  • Recognize ways to integrate cybersecurity and safety within your organization
  • Describe analysis activities to be performed with respect to an effective cybersecurity process
  • Recognize potential pitfalls and key issues with respect to implementation 

Who Should Attend

This course will be beneficial to anyone involved in cybersecurity including those wishing to lead their organization in implementing and applying a cybersecurity process. Cybersecurity engineers will learn the need for a cybersecurity process and comprehend the J3061 process framework for tailored application in their organization. Quality management professionals will learn that a cybersecurity process is another important factor in internal process improvement and auditing. Executives and management representatives will better understand how to use J3061 to build defense and in-depth cyber-physical vehicle systems and how to drive cost savings through a systematic process. Human Resources will comprehend the need for seeking out individuals with the skills needed to address cybersecurity within their organizations.


  • Brief History of Automotive Security and Cybersecurity
    •  Introduction to Connected Vehicle Applications
  • Cyber-Physical Systems
    •   Difference between cyber-physical systems security (cybersecurity) and IT security
  • Five Levels of Vehicle Attack: wireless, wired; ECU external / internal; software / silicon
  • Reactive vs. Proactive Approach to Cybersecurity
  • What is a Process?
  • Key Concepts in Cybersecurity Defined
  • Introduction to J3061
    •  What components of a process are captured
    • Scope, rationale and intent
    • Tailoring from the ISO 26262 process framework
  • When to Apply a Cybersecurity Process
  • Cybersecurity Process Overview
    •  Motivation for a well-defined and well-structured process
    • J3061 process framework
    • Milestone and gate reviews
  • Cybersecurity Process Details
  • Overall management of cybersecurity
  • Concept phase
  • Product development at the system, hardware and software levels
  • Production, Operation and Service
  • Supporting Processes
  • Relationship between Cybersecurity Process and Safety Process
  • Review of Appendices A, C-E, G-I
  • Tailoring the J3061 Process Framework into an Internal Process
  • Examples of Key Analysis Activities
    •  Threat Analysis and Risk Assessment
    • Attack Tree Analysis
  • Outlook - future standards development in ISO/SAE activity
  • Summary

Barbara Czerny or David Ward

Barbara CzernyDr. Barbara Czerny is a Technical Fellow in Engineering at DURA Automotive Systems with a focus on safety and cybersecurity. With over nine years of experience working in automotive cybersecurity. Dr. Czerny played a key role in the development of the SAE Recommended Practice J3061. She has authored numerous papers and presentations in the areas of cybersecurity and safety-critical automotive systems and has co-led workshops in both domains. Dr. Czerny also has more than 21 years of experience working in automotive system safety on advanced development safety-critical systems in automotive and non-automotive domains. She was an ISO technical expert and actively participated in the development of ISO 26262 from its beginning through 2016. She is a member of the US Technical Advisory Group that works on the development of ISO 26262. Dr. Czerny holds MS and PhD degrees in Computer Science & Engineering from Michigan State University.

David WardDr. David Ward is Senior Technical Manager, Functional Safety at HORIBA MIRA. In this role, he provides leadership in development and independent assessment of automotive electronic system safety, reliability and cybersecurity. Since joining HORIBA MIRA in the 1990s, Dr. Ward has been instrumental in industry activities to develop standards and guidance for automotive functional safety, beginning with the pioneering MISRA “Guidelines for Development of Vehicle Based Software” in 1994 and more recently as the UK Principal Expert to ISO/TC22/SC32/WG8 “Road Vehicles - Functional Safety”, which develops ISO 26262. Dr. Ward is an active contributor to the automotive industry's first standard for cybersecurity SAE J3061. In recognition of his contribution to standardization in functional safety, he was awarded the Institute of Mechanical Engineers Award for Risk Reduction in 2013. Dr. Ward holds an MA degree in Natural Science from the University of Cambridge, a Ph.D. in Electrical Engineering from the University of Nottingham, UK and holds appointments as a Visiting Professor in Functional Safety at Coventry University, UK and in Engineering Design at the University of Leicester, UK.

Hotel & Travel Information

Fees: $835.00
SAE Members: $752.00 - $752.00

.7 CEUs
You must complete all course contact hours and successfully pass the learning assessment to obtain CEUs.


For additional information, contact SAE Customer Service 1-877-606-7323 (724-776-4970 outside the U.S. and Canada) or at

Duration: 1 Day
This seminar is available for Private Delivery Corporate Learning Engagements only. Request Information »