Cybersecurity
With INVENSITY, you have a partner who has extensive and long-standing experience in the field of cybersecurity in product development (for embedded systems) and covers a wide range of aspects from a single source, including consulting, coaching, management and engineering.
We always customize our solutions together with our customers. With our own software application ISAT pro, we also offer a state-of-the-art solution for the creation and management of their Threat Analysis & Risk Assessments (TARAs).
“From the practical applicability of IEC 62443 to the holistic view of our structures and processes for cybersecurity:
The INVENSITY team’s experience and, in particular, cross-industry expertise allowed us to think outside the box and, within a very short time, enabled us to plan and take the next steps in standards-compliant cybersecurity development at STW.”
With INVENSITY, you have a partner who has extensive and long-standing experience in the field of cybersecurity in product development and covers a wide range of aspects from a single source, including consulting, coaching, management and engineering.
We always customize our solutions together with our customers. With our own software application ISAT pro, we also offer a state-of-the-art solution for the creation and management of their Threat Analysis & Risk Assessments (TARAs).
Client references






From methodical consulting, …
The integration of measures in the field of cybersecurity is becoming indispensable for the development departments of technology manufacturers.
INVENSITY supports its customers in the selection of suitable approaches and measures, providing advice along the lines of actual needs. At the same time, INVENSITY supplements the competence development of companies at the points where it is necessary.
The goal is to enable the company to act competently on its own.
… to operational support.
-
- Execution of Threat Analysis & Risk Assessments (TARAs) for (pilot) projects, i.e. definition of aspects (assets) worthy of protection with subsequent complete hazard analysis and risk assessment as well as identification of options for the respective handling of the identified risks.
.
- Creation and coordination of cybersecurity concepts (system / software / hardware / safety), including requirements & architectures as well as an assessment regarding the suitability of third-party hardware & software.
- Taking over cybersecurity management tasks, e.g. project-specific coordination, methodological support of the development team, etc.
Kompetenzen
Ausgewählte Referenzen
Automotive
Requirements Engineering und Security Management für ein Driver Assistance System für hochautomatisiertes Fahren
Automotive
Durchführung einer Risikoanalyse und Entwicklung eines Sicherheitskonzepts für einen Body Computer
Automotive
Cybersecurity-Unterstützung zu ISO 21434 und TARA
Anlagentechnik
Cybersecurity-Beratung für einen Tier-1-Zulieferer für Industriesteuergeräte

Sebastian Wirth
Business Responsible Cybersecurity

Sebastian Wirth
Business Responsible Cybersecurity