EMBEDDED CYBER SECURITY is not a plug-in, it’s not an add-on that you can install anywhere. It is mindset, science, methodology, process, and engineering. Our product is to advise, train, and support you in all these fields. With targeted CONSULTING. And in our CYRES ACADEMY. Here’s an overview of what we offer.

Cyber Security Analysis.

In cyber security analysis, we examine the potential threats to the system, the severity of their impact, and the probability of their occurrence. We evaluate the system’s vulnerabilities, determine possible attack vectors and methods, and assess the risk for each threat. This is done using professional architecture analysis, requirement analysis as well as risk assessments. We advise and train you accordingly, and/or take over interim management.

Penetration Testing.

The most important security features of an embedded system are confidentiality, integrity, and availability. But are they protected in the event of a specific attack? Where are suspected, but also unsuspected weak points? We get to the bottom of these questions using state-of-the-art white hacking methods. On the basis of comprehensive data analyses, we help you to develop attack concepts and subject your systems to conclusive penetration tests. We support you as consultants and trainers. If needed, we’ll also take over control tasks.

Systems Security Engineering.

Systems security engineering is an interdisciplinary field of engineering that is used to develop those systems that need to perform even in the event of a cyber attack. To this end, the entire system lifecycle is considered: from the design phase, through development and commissioning, to decommissioning. All relevant system components are identified and – depending on the type and number of vulnerabilities – protective measures are defined, prioritized, and finally programmed and implemented. With our many years of expertise, we help you gain the necessary know-how and establish the required structures and processes.

Data Science & AI.

The best way to counter cyber attacks is to prevent them from taking place. But this requires reliable predictions of possible future attacks. Thanks to cutting-edge data science, data analytics, machine learning, and artificial intelligence, this is increasingly possible. Embedded systems are becoming forward-looking in the truest sense of the word. Which methods and instruments already have the necessary maturity, and how they can be used for preventive measures? We can advise you on this, and offer targeted training.

Processes & Methods.

Cyber security for embedded systems requires technical expertise, and the right tools. However, the need for the right process and methods is often underestimated. We help you set up your cyber security organization and integrate it into your company structures, and define and implement your cyber security strategy, your cyber security governance as well as a cyber security process – including the necessary agile startup culture and Scrum methodology. We support you with strategic consulting and training. If required, we also act as interim or project manager.

CYRES Academy.

In addition to our consulting services, we offer you another option to significantly increase your team’s embedded cyber security know-how: the CYRES Academy. We offer compact one-day or multi-day seminars and workshops on systems security engineering and embedded cyber security risk assessment. The training courses help you identify the risks of a cyber attack being launched against your products, and to develop countermeasures. We conduct the seminars on your premises as well as at public events. Worldwide.
How can we best support you? Let’s talk about it.