(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KL36SKN'); Automotive Cybersecurity | Vector Consulting

Training Automotive Cybersecurity

Cybersecurity is necessary for every engineer today. Increasingly systems in the networked vehicle are critical to safety. Functional security cannot be achieved without a comprehensive concept for cybersecurity. This training shows how cybersecurity in automotive systems can be successfully implemented. We show which technologies matter and how tools help.

Automotive cybersecurity is of growing concern for the entire automotive industry. It is a must-have today, because systems are interconnected, and in one way or the other open for external penetration. Even worse, security directly impacts functionality, user experience and safety, and thus has become subject to product liability. For instance, functional safety is not feasible without a concise approach to cover security.


"Outstanding level of expertise in cybersecurity."

- Michael Prantke, Panasonic

"High practical orientation, concrete personalized action list throughout the entire seminar."

- T. Strauch, Siemens

Training Goals

Security gains has become a key challenge across industries. More and more systems are networked and are attacked. Absolute security does not exist, but you can effectively protect. Our training is the introduction and implementation of risk-based cybersecurity in practice. The following questions are addressed:

  • How to identify security objectives?
  • How do I assess the security on the basis of basic methods like TARA (Threat and Risk Analysis)
  • How can a security objective be deduced from that?
  • What are the typical threats?

Since there can be no absolute cybersecurity, the focus of the training is on a risk-based approach and on the necessary consistent methodology.

Three different, yet related, approaches will be described in detail, namely:

  • Product, that is cybersecurity at the system level
  • Process, covering the implementation of security concepts in the entire life-cycle
  • Field, that is cybersecurity applicable after-sales activities

Training Content

This training provides an introduction to the fundamentals and practice of cybersecurity engineering. It introduces the basic techniques for specification, analysis, testing and proofing of security. We show in practice how these techniques are applied, and help to introduce relevant processes and tools. In particular, we will show how to introduce and ramp up cybersecurity in the company.

  • Cybersecurity foundations for automotive applications
  • Current threats and methodology
  • Security Standards (e.g., SAE-J3061-2016, ISO-SAE-21434), legal obligations and governance
  • Threat analysis and risk assessment with TARA
  • Efficient implementation of security in the lifecycle from the security assets to the risk analysis to the consistent implementation throughout the entire lifecycle
  • Practical experience and hands-on case studies
  • Current trends

Many practical examples from our worldwide projects will emphasize how to implement cybersecurity focused and at reasonable cost. Examples include the full set of methods, such as TARA, but also concrete case studies such as over-the-air (OTA) software upgrades.

Additional bonus: The widely used assessment tool COMPASS is presented. You will receive a demo version with full functionality for your own entries.


700 € plus VAT (1 day)

Admission price includes full documentation on paper and as PDF and also our Vector book on "Automotive Embedded Engineering" with lots of best practices, project experiences and state of the art technology. Naturally, all participants benefit from our rich coffee breaks and a quality lunch in our spectacular Vector restaurant. Each participant will receive a qualifying Vector certificate for this intensive training.

Get a 10% discount (can be combined):

  • for virtual open training till end of September
  • if you register more than 2 participants of your company

  • if you book at least 60 days in advance

Full-time students receive a (non-combinable) discount of 70% (on presentation of a valid student card).

Payment method:


Register now

Fields marked with an asterisk (*) are required.
We always choose the most favourable discount solution for you!

Training Agenda

  • Motivation and challenges in automotive cybersecurity
  • Risk-oriented security
  • Systematic Security Engineering
  • Industry examples and discussions
  • Case studies
  • Round-table discussions and summary

Breaks: Coffee/Tea around 10:30 and 15:00; lunch break around 12:00.


Assessment Tool COMPASS

Planning, Execution and Evaluation of Assessments, Audits and Analyses

COMPASS satisfies all requirements that are relevant to an efficient audit and analysis tool. These include support based on different maturity models,  assessment methods and other checks, e.g. Threat and Risk Analysis.

Inhouse Formats

Do you want to adapt this training to your own examples and challenges? Looking for a workout that delivers practical exercises adjusted to your environment? Then, we suggest that you have this training conducted in-house, where you can decide on focus, speed and the training schedule. We also offer dedicated crash courses for employees and management. 

Target Audience

Engineers in product development, system and software engineers, security and safety engineers and managers, architects, engineering managers, project managers, purchasing, quality managers.

About our Trainers

Dr. Arnulf Braatz is a manager at Vector Consulting Services. Previously he worked as a project manager in development projects as well as a software architect. Dr. Braatz supports companies worldwide to improve their safety and security projects, development processes and change management. He works across industries in the field of engineering methods, system and IT architecture, requirements engineering, and to improve efficiency.



Youssef Rekik is a consultant and software developer at Vector Consulting Services. He is heavily involved in the development of security applications for smart connected embedded devices with focus on network security and communication technologies.

Prof. Dr. Christof Ebert is Managing Director of Vector Consulting Services GmbH. He supports companies worldwide in improving their product development and product strategy as well as in change management. He sits on various supervisory boards, is a professor at the University of Stuttgart and the Sorbonne in Paris, and the author of several renowned books. Twitter: @ChristofEbert.


Global Software and IT

A Guide to Distributed Development, Projects, and Outsourcing

"Global Software and IT" is the new book of Vector with experiences and guidance for distributed software and IT projects. This insightful book delivers proven strategies and practices for software development and IT sourcing on a global scale.

Training location

Vector Consulting Services

Vector Consulting Services GmbH

Ingersheimer Str. 20
70499 Stuttgart

Phone: +49 711 80670 1520
Fax: +49 711 80670 444
E-Mail: consulting-info@vector.com

Postal address:
Ingersheimer Str. 24

How may I help us?

Marlén Hohmann

Ingersheimer Str. 24
70499 Stuttgart, Germany
Tel.: +49 711 80 670 1545
E-Mail: marlen.hohmann@vector.com