BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Exida: Excellence. Independence. International Customer Base.//NO
 NSGML kigkonsult.se iCalcreator 2.30.10//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:b10726fe-7b2e-461a-9130-939d529495ce
X-WR-CALNAME:iCagenda
X-WR-CALDESC:Event Management Extension for Joomla!
X-WR-RELCALID:3E26604A-50F4-4449-8B3E-E4F4932D05B5
X-WR-TIMEZONE:Europe/Rome
BEGIN:VTIMEZONE
TZID:Europe/Rome
BEGIN:STANDARD
TZNAME:CET
DTSTART:20251026T030000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
RDATE:20261025T030000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:CEST
DTSTART:20250330T020000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RDATE:20260329T020000
RDATE:20270328T020000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:03b13b2d-6a50-4775-8fc3-41bd16433020
DTSTAMP:20260405T101752Z
CATEGORIES:Cybersecurity
CLASS:PUBLIC
DESCRIPTION;ALTREP="CID:<FFFF__=0ABBE548DFE235B58f9e8a93d@coffeebean.com>":
 \n\n\n\n\n\n \n\n\n\nWhat does “secure by design” really mean under IEC 62
 443-4-1?\n \n\n\n \n\nHow do you translate IEC 62443-4-2 requirements into
  concrete design\, development and test activities?\n\n\n\n\nHow did you i
 ntegrate security development activities into your existing development li
 fecycle?\n\n \n\n\n \n\nWhat’s required to ensure your devices meet IEC 62
 443-4-2 security levels?\n\n\n\n\n\n \nJoin our Training and learn about B
 uilding and Verifying Secure Industrial Components\n\n\n Agenda and Conten
 t:\n\n\n\nWelcome\, Introduction\, Training Goals\nIACS Cybersecurity Intr
 oduction and Threat Landscape: Why It Matters for Industrial Components\nI
 EC 62443 Family incl. the link to the EU Cyber Resilience Act\nSecurity De
 velopment Lifecycle and Security Management Process acc. to IEC 62443-4-1 
 as part of the overall development lifecycle\nThreat Modelling\, Risk Asse
 ssment &amp\; Security Levels\nIEC 62443-4-2 Technical Security Requiremen
 ts\nSecure Software Development Fundamentals\nHardware &amp\; Embedded Sec
 urity\nVulnerability Handling &amp\; Monitoring\nSecurity Verification and
  Validation Testing\nIncident Response Planning and Execution\nQ&amp\;A an
 d Wrap-Up\n\nIndustrial products are becoming smarter\, more connected - a
 nd more exposed to cyber threats. This expert-led training gives professio
 nals the essential understanding and practical tools to build and assess s
 ecure industrial automation and control components in line with IEC 62443-
 4-1 and -4-2. Participants learn how to integrate cybersecurity into every
  stage of product development\, from initial concept through validation an
 d maintenance.\nYou’ll learn to apply the IEC 62443 standards hands-on - i
 dentifying risks\, implementing secure design practices\, and verifying te
 chnical security requirements. By thinking like both a developer and an at
 tacker\, you’ll gain the insight needed to strengthen product resilience\,
  demonstrate compliance\, and prepare for upcoming regulatory demands such
  as the EU Cyber Resilience Act.\nWho should attend?\nThis training is des
 igned for professionals involved in the development\, testing\, and assess
 ment of industrial automation and control system (IACS) products. It is pa
 rticularly valuable for:\n\nSystem and security engineers responsible for 
 applying IEC 62443 technical requirements.\nQuality\, compliance\, and cer
 tification managers seeking to align development processes with IEC 62443-
 4-1 and -4-2.\nCybersecurity specialists and assessors supporting product 
 security evaluations or audits.\nProject managers and product owners overs
 eeing secure product development\nProduct and software developers implemen
 ting secure design and coding practices.\n\n \nFor more details about the 
 course topics\, download the brochure on the top of the page\n\n\n\n\n \n
 \n\nDuration: 2 days \n \nSchedule: 1st day from 10:00 to 18:00\;  2nd day
  09.00 - 17.00\; \n                  Time zone:Europe/Berlin\,Display:(UTC
 +01:00)\n \nPrice: 1.890\,00€\nLanguage: depending on the participants the
  training will be given in German or English. The training material will b
 e in English.\n \nLocation: ONSITE at our training rooms to exida.com GmbH
  office\, Prof. - Messerschmitt-Straße 1 - 85579\, Neubiberg / Germany or 
 ONLINE\nCustomer specific on-site or online training is also possible. We 
 will adjust the training content to your specific needs - just get in touc
 h!\nCertificate: each participant can voluntarily take an exam and earn a 
 Cybersecurity Practitioner (CSP) certificate or receive a confirmation of 
 attendance listing the covered topics.\n\n\n
DTSTART:20260304T090000Z
DTEND:20260305T160000Z
GEO:00;0
LOCATION:Prof.-Messerschmitt-Straße 1 - 85579 Neubiberg / Germany
ORGANIZER;CN=:kerstin.tietel@exida.com
SEQUENCE:1
SUMMARY:Cybersecurity IEC 62443 (DE0611)
TRANSP:OPAQUE
URL:https://www.exida.eu/all-trainings/331-cybersecurity-iec-62443-de0611-1
 1
END:VEVENT
END:VCALENDAR
