Live Chat Software
24 - 26 October, 2018
Silicon Valley

MAIN CONFERENCE DAY ONE

8:00 am - 9:00 am Breakfast & Conference Registration

9:00 am - 9:15 am Chairperson’s Welcome And Opening Remarks

9:15 am - 10:00 am OPENING KEYNOTE: Blockchains, Autonomous Vehicles and Cyber Security - A Ledger of Things for the Internet of Things that Won’t Shut Up and Stay Put

  • Understanding the challenges of cyber security in the connected car eco system
  • How blockchains and distributed ledgers could help OEMs and suppliers create a secure connected future

10:00 am - 10:45 am Incorporating Auto Cyber Security From The Ground Up In Semi- And Fully Autonomous Vehicles

  • Developing a preliminary definition of an acceptable risk profile
  • Understanding the connected car eco system and it’s role in cyber security
  • What is the role of OEMs and suppliers in preparing for a connected future?

10:45 am - 11:30 am Demo Drive & Refreshment Break

11:30 am - 12:15 pm Enabling Technology for Modern Propulsion Systems: Cyber Security in Innovative Brake Systems

  • Building cyber security into vehicle braking systems
  • Where are likely vulnerabilities?
  • Creating input validation systems in software

12:15 pm - 1:00 pm Developing Auto Cyber Security Measures Into Software That Will Be Used In Auto/System

  • Conducting an assessment of actual cyber risk exposure
  • Conducting security based testing at the code level
  • Using well-governed, traceable automotive software suppliers when sourcing software

1:00 pm - 2:00 pm Networking Lunch

2:00 pm - 2:45 pm TRACK 1: Going Beyond Information Sharing to Shared Threat Intelligence

  • Working with homeland security, law enforcement, military, and intelligence community o understand emerging threats
  • How can the auto and mobility sectors work together to share intelligence?
  • How the ISO and SAE are working on securing connected auto systems

2:00 pm - 2:45 pm TRACK 2: Auditing Threat Levels, Type And Origin

  • Using tools to test vehicle software safety
  • Identifying motivation of hackers and level of threat they pose to full vehicle system
  • Determining which component or vehicle software is most likely to be attacked

2:45 pm - 3:30 pm TRACK 1: From Secure Coding to Secure Software: Building Secure Vehicle Software with CERT Coding Standards

  • Creating benchmarks for cyber security awareness and preparedness
  • Initiating collaboration with suppliers to create defensible 3rd party products
  • Using adversarial testing to determine cyber security vulnerabilities

2:45 pm - 3:30 pm TRACK 2: Using AI And Deep Machine Learning To Differentiate Between Legitimate And Illegitimate Activity

  • In large data transfers, how does the vehicle software verify incoming and outgoing data?
  • Identifying useful tools to ensure safe transfer of data
  • Planning for increased levels of data transfer as more devices are added to the intelligent vehicle system

3:30 pm - 4:00 pm Afternoon Tea And Networking Break

4:00 pm - 4:45 pm CLOSING KEYNOTE: Ensuring Auto Cyber Security Issues Are Addressed Across Silos, And Down The Supply Chain

  • Creating internal benchmarks for cyber security awareness and preparedness
  • Initiating collaboration with suppliers to create defensible 3rd party products
  • Using adversarial testing to determine cyber security vulnerabilities

4:45 pm - 5:30 pm INTERACTIVE DISCUSSION GROUPS


INTERACTIVE DISCUSSION GROUPS


A: Developing Cyber Risk Analysis Tools for Connected Cars

B: Preventing hackers from accessing system and data – the potential of Blockchain

C: Using Run Time Software Attestation to Screen Incoming and Outgoing Data

D: Perfecting Response through Incident Simulation