This training offers a practical (hands-on) approach to applying TARA methodologies for risk identification and assessment. It provides an overview of available tools, templates and catalogues to streamline the process, and shows how to define meaningful security goals and claims that can be aligned with recommended security controls.
Participants will be guided step by step through all phases of a practical TARA, with an exercise designed to help them fully understand and learn how the process works in real-world scenarios.
Content
Implement the TARA methodology in automotive systems/components.
Evaluate and record the risks associated with the target of evaluation.
Establish cybersecurity goals and claims.
Align security controls with those goals.
Choose tools and incorporate methods to enhance the efficiency, effectiveness, and the reusable nature of TARAs.