Webinar
19.Jan.2023
2023 Key Considerations of IoT Security Compliance
Date :2023/2/23(Thu)
Time :14:00 ~ 15:30
Event Type :Webinar
Although the cybersecurity awareness of enterprises has improved in recent years, it is still unable to effectively prevent malware intrusion and various cybersecurity incidents continue to break out all over the world. Developers' lack of security by design is also one of the reasons. In addition to meeting the time to market and product performance, they also require to comply with international IoT security regulations.
Many countries have set up mandatory cybersecurity regulations, and most of them use the ETSI EN 303 645 frameworks as a basic reference. The new version of RED (EU Radio Equipment Directive 2014/53/EU), which will be mandatory next year, has added network and communication security requirements, stipulating that manufacturers must comply with both product design and production. The test schedule of ETSI EN 303 645 is about 3 months, and considering the product development time, cybersecurity assessment must now start planning.
Time :14:00 ~ 15:30
Event Type :Webinar
Although the cybersecurity awareness of enterprises has improved in recent years, it is still unable to effectively prevent malware intrusion and various cybersecurity incidents continue to break out all over the world. Developers' lack of security by design is also one of the reasons. In addition to meeting the time to market and product performance, they also require to comply with international IoT security regulations.
Many countries have set up mandatory cybersecurity regulations, and most of them use the ETSI EN 303 645 frameworks as a basic reference. The new version of RED (EU Radio Equipment Directive 2014/53/EU), which will be mandatory next year, has added network and communication security requirements, stipulating that manufacturers must comply with both product design and production. The test schedule of ETSI EN 303 645 is about 3 months, and considering the product development time, cybersecurity assessment must now start planning.