Cybersecurity IoT

Cybersecurity Risk Assessment for IoT Security

On-demand Webinar

On-demand Webinar

IoT devices have become attractive targets for cybercriminals as they can be vulnerable to various security threats, such as hacking, malware, and data breaches. As part of the Radio Equipment Directive (RED), manufacturers are responsible for implementing product cybersecurity risk assessments before placing products with digital elements on the market. By implementing appropriate security risk measures and relevant risk documentation on IoT security, organisations can ensure that their IoT products are secure and protected against cyber threats and the company's reputation. Risk assessment in the early development of IoT products will also help lower the cybersecurity risks by identifying products' vulnerabilities and establishing a security baseline.  

An overview of the risk assessment of IoT security within the cybersecurity risk assessment is essential for responding to the EU RED cybersecurity requirements and the Cyber Resilience Act (CRA). This webinar provides an overview of cybersecurity risk assessment for IoT, background and explanation of the recommended methods, and comparisons with other methods.

To view the webinar, fill up the form now.


Our webinar will tackle these points, focusing on:

  • Why is Cybersecurity Risk Assessment necessary
  • Risk Assessment methods
  • TR64 methodology overview
  • Q&A session 

About the speaker

Maxime Hernandez

Maxime Hernandez, IoT Cybersecurity Expert & Lead Process Engineer, TÜV SÜD

Maxime is a mechatronics engineer, who started his career in software development for the transportation industry in Europe. Currently, he is based in China, bringing solutions to European vendors and Asian manufacturers for consumer products. 


Learn more about TR 64 IoT Threat Modelling

Next Steps

Site Selector