Management Consulting Training
We offer high-quality management solutions to support and consult our customers efficiently and goal-oriented.
Our basis and our core values are fast and personalized project and process analysis in combination with a reference to the organizational set-up. On account of our broad engineering knowlegde and the long and intense development and leadership experience in big global Automotive OEMs and several global Engineering Service Providers we are a competent partner for consulting, coaching, and training. We support you in developing and/or optimizing your processes, your projects and your organization. Significant benefits can be provided for start-ups as well as for suppliers.
We tailor individually the methods „Recording the Starting Position“, „Fields of Action“, and „Implementation“ together with your teams. We consider technological and cultural aspects as well as leadership competencies that represent a contemporary and efficient leadership style.
Scroll through and get your first impression. You can use the contact form to communicate directly with us.
Together with competent partners your problem will be tackled quickly. Visit also the Partner-Website and convince yourself of the offer of flexible services and solutions.
- Process optimization in assembly and logistics
- New technologies from the smart factory
- Cyber Security
- Human resources — the assembly worker
Dr. Joachim Leder presented on Wednesday, February 20th:
Risk analysis and threat analysis - the starting point of an effective security concept
Based on the concept of Security Lifecycle and the Compass Rose of Security the principles of Analysis were presented:
- System Security Analysis as the process of
> identifying the boundaries and assets of the system,
> understanding system vulnerabilities and
> evaluating possible damages
- Threat Analysis as the process of
> identifying and understanding the threats,
> their actors,
> evaluating their capabilities and motivations
- Risk Analysis as
> a combination of the results of threat and system analyses
> to create a priority-ordered list of risks and associated controls
Using the hands-on example of V2V (Vehicle - to - Vehicle) communication in an environment of autonomous driving, the process of identifying Impact Levels and combining possible attackers with respective capabilities to yield a Threat Level Matrix has been described by Joachim and an evaluation method including an algorithm patterned on ISO/SAE 21434 proposal was presented.
Finally a scenario of possible risk mitigations was included in order to demonstrate priority adaptations in the process of Planning and Execution implementation.
The presented concept and process relates directly to the given presentation of Emmanuel Ifrah from SEGULA:
OT Cyber Analytics
For the full conference agenda topics please visit: AutCircle Assembly, Bad Nauheim
Admin - 09:52:47 | 1 comment
Also, on the grounds that the ink streams so without a hitch, rollerballs are great for composing text with dim and barely recognizable differences. They likewise arrive in a more extensive scope of varieties since they utilize water-solvent colors. On the off chance that you want to compose for an extensive stretch of time, utilize a rollerball. We offer a few rollerball choices.
Fill out the form below to add your own comments