This video is still being processed. Please check back later and refresh the page.

Uh oh! Something went wrong, please try again.

25099 SEC8: Cyber Resilience Act (August 2025)

In this class you will learn how to design embedded products for hostile cyber environments by implementing features such as Key Management, Secure Boot, Vulnerability Management, Threat and Risk Analysis, SBoM, and Threat Modeling, while understanding new regulatory requirements for availability, authenticity, integrity, and confidentiality, and mastering the processes needed for secure, cyber resilient products.

rate limit

Code not recognized.

About this course

Designing a product to be capable of surviving in a hostile cyber environment requires many different features than a classic design. The changing cyber regulatory environment is driving new requirements for availability, authenticity, integrity and confidentiality in products. Many of these requirements, and the changes they bring to both the business and design processes bring many new challenges for embedded designers. Join us to discover how to design an embedded product to meet these new challenges including Key Management, Secure Boot, Vulnerability Management, Threat and Risk Analysis, SBoM and Threat Modeling to meet the risk based approach to cyber resilient products.
Objectives:
1. Discuss Secure by Design and creating cyber resilient
products
2. Detail key processes and functions required in a product
3. Discuss cyber risk assessment and threat analysis

Curriculum59 min

  • About this course
  • Class Overview
  • Syllabus & Downloads
  • Introduction 2 min
  • From CRA Theory to Embedded Practice 8 min
  • Case Study 10 min
  • Path to Conformity 18 min
  • Threat and Risk Assessment 21 min
  • Summary
  • Complete Recording
  • 25099 SEC8 (65 min)
  • Feedback and Discussion
  • We need your feedback

About this course

Designing a product to be capable of surviving in a hostile cyber environment requires many different features than a classic design. The changing cyber regulatory environment is driving new requirements for availability, authenticity, integrity and confidentiality in products. Many of these requirements, and the changes they bring to both the business and design processes bring many new challenges for embedded designers. Join us to discover how to design an embedded product to meet these new challenges including Key Management, Secure Boot, Vulnerability Management, Threat and Risk Analysis, SBoM and Threat Modeling to meet the risk based approach to cyber resilient products.
Objectives:
1. Discuss Secure by Design and creating cyber resilient
products
2. Detail key processes and functions required in a product
3. Discuss cyber risk assessment and threat analysis

Curriculum59 min

  • About this course
  • Class Overview
  • Syllabus & Downloads
  • Introduction 2 min
  • From CRA Theory to Embedded Practice 8 min
  • Case Study 10 min
  • Path to Conformity 18 min
  • Threat and Risk Assessment 21 min
  • Summary
  • Complete Recording
  • 25099 SEC8 (65 min)
  • Feedback and Discussion
  • We need your feedback