Cyber Security Learnings on technologies, trends, dos and don’ts
Our Cyber Security Video Blog
Check out our continuously growing video database
Our Cyber Security Video Blog
Check out our continuously growing video database
ITK’s security portfolio is closely aligned with existing standardization activities such as ISO/SAE 21434 and IEC 62443. In this section, we show the generic security services that are relevant in all industry sectors.
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.
With our videos we want to give you a lot of knowledge and experience in the field of cybersecurity. This is how we want to protect your embedded devices and the things connected to them. We are planning a variety of videos on all the important points. We also have a look at the ISO/SAE 21434 and UNECE regulation that is coming up. We want to produce videos that cover the topics most interesting to you. So do not hesitate to use the contact button and tell us which topics you would like to be covered.
Video library
Watch our comprehensive cybersecurity tutorials
Season 1
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.





How NOT to...
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.




General Topics
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.




Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.



Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.



Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policy
If you accept this notice, your choice will be saved and the page will refresh.



- Season 1
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policyIf you accept this notice, your choice will be saved and the page will refresh.
1/3Cybersecurity Penetration / Pen Testing - What is it and why is it so challenging? [ISO21434]1/3- How NOT to...
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policyIf you accept this notice, your choice will be saved and the page will refresh.
1/2How NOT to apply encryption - an attacker's perspective1/2- General Topics
Please accept YouTube cookies to play this video. By accepting you will be accessing content from YouTube, a service provided by an external third party.
YouTube privacy policyIf you accept this notice, your choice will be saved and the page will refresh.
1/2Cybersecurity Christmas Special - A short look back to the year 20201/2