Live Chat Software

MAIN CONFERENCE DAY ONE

8:00 am - 9:00 am Breakfast & Conference Registration

9:00 am - 9:15 am Chairperson’s Welcome And Opening Remarks

Faye Francy - Executive Director, Auto-ISAC
img

Faye Francy

Executive Director
Auto-ISAC

9:15 am - 10:00 am Developing Security by Design Processes for Improved Vehicle Architecture Security

Kristie Pfosi - Senior Manager, Automotive Cyber Security, Mitsubishi Electric Automotive America, Inc.
The effort to build in security in the early stages of vehicle design is growing in popularity throughout the automotive sector, as it offers a proactive approach to cybersecurity and protection. This session will provide an overview of the efforts to develop and integrate hardware and software cybersecurity capabilities.
 
-          Testing hardware & software to evaluate product integrity and security as part of component testing
-          Performing software-level vulnerability testing, including software unit and integration testing
-          Understanding and identifying methods of attack surface reduction
img

Kristie Pfosi

Senior Manager, Automotive Cyber Security
Mitsubishi Electric Automotive America, Inc.

10:00 am - 10:45 am Leveraging Lessons Learned and Best Cyber Practices from the Heavy Machinery Industry

Scott Smith - Chief Information Security Officer, Caterpillar
Cyber strategies and lessons learned from the heavy machinery industry can provide a multitude of benefits to the automotive cybersecurity ecosystem. This session will detail some of the cyber challenges and successes from the heavy machinery industry, and will provide in-depth insight as to some of Caterpillar’s cyber efforts.
 
-          Understanding the unique cyber challenges for the heavy machine industry
-          Caterpillar cyber security best practices for the automotive continuum
-          Cross-industry perspectives on the automotive cyber ecosystem
img

Scott Smith

Chief Information Security Officer
Caterpillar

10:45 am - 11:15 am Demo Drive & Refreshment Break

The evolving complexity and wide-spread deployment of ECUs has effectively enlarged the attack vector on each vehicle for potential malicious incident. This vulnerability has prompted the automotive industry to reevaluate their current expectations for security specifications and standards. This panel discussion will shed light on the industry efforts to secure automobiles at the ECU level.
 
-          Efforts to develop standards for ECU security components
-          Addressing the diversity of ECUs in vehicles
-          Defining individual ECU security standards
img

Chris Lupini

Cybersecurity Chief Engineer
Aptiv

img

Dave Bares

Product Cybersecurity Senior Engineer
Lear Corporation

img

Chris Green

Global Product Cybersecurity Officer
Delphi Technologies

img

Sanjay Singh

CTO & Executive VP
Dura Automotive

The current automotive cybersecurity threat environment is high-speed and adaptive to threat response and mitigation. Cybersecurity threats have already had a profound impact on the automotive ecosystem, and with the ever-increasing connectivity of modern vehicles, this threat will only compound over time.
 
-          Creating benchmarks for improved preparedness and response
-          Understanding cybersecurity’s affect on the OEM-supplier relationship
-          Expanding bug bounty programs to target weaknesses in the automotive sector
img

Chris Ballinger

CEO & Founder
the Mobility Open Blockchain Initiative

img

Srini Adiraju

Director of Cybersecurity
Visteon Corporation

img

Arun DeSouza

Chief Information Security & Privacy Officer
Nexteer Automotive

img

Stacy Janes

Security Team Lead
GENIVI Alliance

img

J. Scott Sharland

CEO
Automotive Industry Action Group (AIAG)

12:45 pm - 1:45 pm Networking Lunch

The automotive sector is not entirely different from power, water, oil & gas, chemicals and other industries that are each affected by technology trends that lead to the convergence of a digital world with a cyber-physical world. This session will explore a few examples of recent, high-profile security attacks launched against critical infrastructure companies.
 
-          Lessons learned from past cybersecurity risk-management investments from across industry
-          Critical infrastructure security strategies of benefit to the automotive industry
img

Doug Wylie

Director, Industrial & Infrastructure Practice Area
SANS Institute

1:45 pm - 2:30 pm TRACK 2: Conducting Self-Auditing and Risk Assessments for Improved Accountability

Dave Bares - Product Cybersecurity Senior Engineer, Lear Corporation
In addition to developing intuitive cybersecurity measures for vehicle protection, the automotive industry should document the details related to the cyber processes for improved auditing and accountability of incidents.

- Conducting risk-based approaches to assessing vulnerabilities and potential impacts
- Considerations on BSIMM9, MS SDL, CIS Controls v7, CySAEv2.x
img

Dave Bares

Product Cybersecurity Senior Engineer
Lear Corporation

2:30 pm - 3:15 pm TRACK 1: Developing and Attracting Automotive Cybersecurity Expertise for the Benefit of the Automotive Community

Karl Heimer - Principal, Hemier & Associates LLC
The automotive community is constantly at risk with emerging cybersecurity attacks on a daily basis, requiring the constant evaluation workforce development and training initiatives.This session will provide details on the ongoing workforce development initiatives for auto cyber, to include the efforts to attract top cyber talent for the automotive sector.
 
- Cyber workforce and training priorities
- Attracting and retaining top cyber talent 
img

Karl Heimer

Principal
Hemier & Associates LLC

This session will describe the ongoing regulatory efforts at the State level to prepare for the future of autonomous vehicles, and their security on the roads of Michigan.
 
- Overview of Current Regulatory Environment for Automotive Security
- Prioritizing MDOT Automotive Cyber Safety Investments

img

Tony Kratofil

Chief Operations Officer
Michigan Department of Transportation (MDOT)

img

Collin Castle

ITS Program Manager
Michigan Department of Transporation

img

Lt. Col. Richard Arnold

Deputy Director State Services Bureau
Michigan State Police

img

James Fackler

Director of the Office of Program Support and Development
Michigan Department of State

img

Chris DeRusha

Acting Security Chief
State of Michigan Department of Technology, Management, and Budget

3:15 pm - 3:45 pm Afternoon Tea And Networking Break

3:45 pm - 4:30 pm Developing Cyber Secure Strategies for Over the Air (OTA) Updates

Ira McDonald - Owner, High North Inc., Former Security Architect, FCA
Over the air updates provide increased flexibility to manufacturers and car owners to manage embedded systems across the lifecycle of the vehicle. OTA updates are a critical aspect of the automotive cybersecurity ecosystem, but with increased connectivity, brings increased risk.
 
-          Developing secure OTAs for vehicle life-cycle maintenance and management
-          Safeguarding against data breach and leaks
-          Improving OTA authentication to defer unauthorized entry
img

Ira McDonald

Owner, High North Inc.
Former Security Architect, FCA

4:30 pm - 5:15 pm Interactive Discussion Groups / Roundtables Round 1

Joseph Kristofik - Director Functional Safety and Cybersecurity Management, Veoneer
IDG 1: Enhancing Component Security of Critical Safety Features - Joseph Kristofik, Director, Functional Safety and Cybersecurity Management, Veoneer

IDG 2: Understanding the Cybersecurity Challenges for the Trucking Sector

IDG 3: Considerations on the Use Case for AI & Machine Learning for Automotive Defense

IDG 4: Securing ADAS Technology to Ensure the Future of Autonomous Vehicles
img

Joseph Kristofik

Director Functional Safety and Cybersecurity Management
Veoneer

5:00 pm - 5:45 pm Interactive Discussion Groups / Roundtables Round 2

Joseph Kristofik - Director Functional Safety and Cybersecurity Management, Veoneer
IDG 1: Enhancing Component Security of Critical Safety Features - Joseph Kristofik, Director, Functional Safety and Cybersecurity Management, Veoneer

IDG 2: Understanding the Cybersecurity Challenges for the Trucking Sector

IDG 3: Considerations on the Use Case for AI & Machine Learning for Automotive Defense

IDG 4: Securing ADAS Technology to Ensure the Future of Autonomous Vehicles
img

Joseph Kristofik

Director Functional Safety and Cybersecurity Management
Veoneer