DR. JOACHIM LEDER 
Management     Consulting     Training

Management       Consulting       Training


We offer high-quality management solutions to support and consult our customers efficiently and goal-oriented.

Our basis and our core values are fast and personalized project and process analysis in combination with a reference to the organizational set-up. On account of our broad engineering knowlegde and the long and intense development and leadership experience in big global Automotive OEMs and several global Engineering Service Providers we are a competent partner for consulting, coaching, and training. We support you in developing and/or optimizing your processes, your projects and your organization.  Significant benefits can be provided for start-ups as well as for suppliers.

We tailor individually the methods „Recording the Starting Position“, „Fields of Action“, and „Implementation“ together with your teams. We consider technological and cultural aspects as well as leadership competencies that represent a contemporary and efficient leadership style. 

Scroll through and get your first impression. You can use the contact form to communicate directly with us.


Together with competent partners your problem will be tackled quickly. Visit also the Partner-Website and convince yourself of the offer of flexible services and solutions.

 

22.01.2019

Presentation at Automotive Circle „Assembly“, February 2019, Bad Nauheim

P2200073_2.jpgConference subject:
“Assembly in the tension field between digitalisation and IT security”

Main topics:
- Process optimization in assembly and logistics
- New technologies from the smart factory
- Cyber Security
- Human resources — the assembly worker

Dr. Joachim Leder presented on Wednesday, February 20th:

Risk analysis and threat analysis - the starting point of an effective security concept

Based on the concept of Security Lifecycle and the Compass Rose of Security the principles of Analysis were presented:

- System Security Analysis as the process of 
   > identifying the boundaries and assets of the system, 
   > understanding system vulnerabilities and 
   > evaluating possible damages
- Threat Analysis as the process of
   > identifying and understanding the threats,
   > their actors,
   > evaluating their capabilities and motivations
- Risk Analysis as
   > a combination of the results of threat and system analyses
   > to create a priority-ordered list of risks and associated controls

Using the hands-on example of V2V (Vehicle - to - Vehicle) communication in an environment of autonomous driving, the process of identifying Impact Levels and combining possible attackers with respective capabilities to yield a Threat Level Matrix has been described by Joachim and an evaluation method including an algorithm patterned on ISO/SAE 21434 proposal was presented.

Finally a scenario of possible risk mitigations was included in order to demonstrate priority adaptations in the process of Planning and Execution implementation.

The presented concept and process relates directly to the given presentation of Emmanuel Ifrah from SEGULA:

OT Cyber Analytics

For the full conference agenda topics please visit: AutCircle Assembly, Bad Nauheim

Admin - 09:52:47 | 15 comments


Homepage visitors: