Note: The blog is excluded from the website search. If you want to search for something in the blog, you must use the blog's search function. Please contact us if you cannot find the information you are looking for using either the navigation or the search function. We will be happy to help you.

Results

For the search term: "..."

1352 Search result(s):
What happens after registration?  
What happens after registration? After registering, you will receive a confirmation email containing the meeting link, the time, and information about the participants.   An invoice will be…  
How is the seminar conducted?  
How is the seminar conducted? The seminar takes place either in person or online.   Our online/remote seminars and workshops are conducted via the video conferencing tool MS Teams. We…  
What happens if questions or problems arise?   
What happens if questions or problems arise?  If you experience technical problems while participating or have any other questions, you can contact our support team anytime, even at short notice. The…  
Learning Content  
Learning Content The seminar covers the following topics: Regulatory framework in Europe with embedding of risk management Definitions according to ISO 14971 (with practical exercise) Risk…  
Learning Objectives   
Learning Objectives  After the seminar, you will be able to:  define comprehensible risk acceptance criteria.  systematically identify hazards and assess risks.  define suitable measures for…  
Target Group   
Target Group  This seminar is designed for people who will (in the future) take on one or more of the following roles:  Risk Manager  Quality and Regulatory Affairs Manager  Product Manager and…  
Scope of the Project  
Scope of the Project We collect the neces­sary infor­ma­tion about the system under test (SUT) and select the appropriate test cases for your device.  
Conducting a Pen Test and Presen­ting the Results  
Conducting a Pen Test and Presen­ting the Results We test your device according to the applicable require­ments of the autho­rities, such as the BSI or FDA, and follow established guides and…  
Fixing Vulnerabilities and Conducting Re-Pentest  
Fixing Vulnerabilities and Conducting Re-Pentest We work with you to define mea­sures to close the identified security gaps and improve your devices. We retest after device improvement to verify that…  
Final Report for your Cybersecurity File  
Final Report for your Cybersecurity File You will receive a final report descri­bing the test procedure in accor­dance with internationally recog­nized standards and confirming that there are no…  
Results 1331 until 1340 out of 1352
X

Privacy settings

We use cookies on our websites. Some of them are essential, while others help us to improve this website and your experience.