Loading...
Compliance Manager for Common security requirements for radio equipment Internet connected radio equipment according to EN 18031-1
Description: After completing the course, participants will be able to demonstrate the following competences:
 
  • Security Mechanism Implementation – apply EN 18031‑1 security mechanisms (ACM, AUM, SUM, SCM, etc.) in device design and deployment.
  • Risk & Compliance Assessment – evaluate device compliance through defined evaluation criteria and threat analysis.
  • Regulatory Integration – integrate standard implementation into RED compliance and regulatory documentation.
  • Incident & Update Management – develop strategies for secure updates, incident handling, and resilience aligned with the standard.
  • Audit Readiness – prepare devices for conformity assessment, ensuring traceability and evidence for each mechanism.
Previous skills/knowledge: Participants are expected to have the following basic knowledge:
  • Basic understanding of information security principles and cyber risk management,
  • Familiarity with standards implementation approaches and regulatory compliance,
  • Awareness of cybersecurity challenges in networked or connected devices.
Authorized Partners:

Teaching requirements: Trainers should meet the following requirements:
  • Subject Matter Expertise – Deep knowledge of EN 18031‑1:2024, including its role in ensuring cybersecurity of internet-connected radio equipment
  • Certifications – Suggested credentials include ISO/IEC 27001 Lead Auditor or Implementer, with additional qualifications in cybersecurity or radio equipment standards.
  • Training & Practical Experience – Minimum of 2–3 years working with cybersecurity regulatory compliance, and experience delivering interactive practical sessions.
Objectives to achieve: The course aims to achieve the following objectives:
  • Understand the scope, key terms, and overarching goals of EN 18031‑1:2024, including its alignment with RED cybersecurity obligations,
  • Interpret specific security mechanisms such as access control, authentication, secure updates, data protection, network monitoring, and assess their role in device cybersecurity,
  • Apply risk assessment techniques and evaluation criteria for compliance with the standard.
  • Develop skills in planning and coordinating implementation of required mechanisms in connected radio devices.
  • Enable participants to manage regulatory compliance and readiness for audits or certification under the RED framework for devices.
Authorized Partners: