Live Chat Software
24 - 26 October, 2018
Silicon Valley


8:00 am - 9:00 am Breakfast & Conference Registration

9:00 am - 9:15 am Chairperson’s Welcome And Opening Remarks

9:15 am - 10:00 am KEYNOTE: Growing Connectivity And Increase Data Volume Multiplies Vulnerabilities

  • Designing security solutions under rigorous development guidelines
  • Enabling continuous, over-the-air (OTA) software updating with changing certification protocols
  • Identifying other solution sets at the organization and product level

10:00 am - 10:45 am Developing Processes For Transitioning To A Minimal Risk Condition When A Problem Is Encountered

  • Building in air gaps and isolating the most critical systems from the most important networks in the car
  • Managing, updating, and continuously verifying cryptographic keys between critical and non-critical systems
  • Linking critical functions to more than one system and eliminating single points of failure

10:45 am - 11:15 am Networking & Refreshment Break


12:30 pm - 1:15 pm Networking Lunch

1:15 pm - 2:00 pm Modeling Safety Security Interdependencies

  • Common methodologies of managing safety and security in automotive industry by applying existing standards.
  • Nonappearance of the commonalities between the safety scope and the security scope. Even though it is mandatory to address safety security interferences.
  • New approach of mapping the safety and security to a high-level system landscape to completely cover safety and security life cycle.

2:00 pm - 2:45 pm Structuring Methods For Returning Self-Driving Vehicles To A Safe State Immediately After System Is Compromised

  • Developing a “safe mode” in the event of an attack to mitigate damage and quickly restore systems
  • Maintaining or reintroducing some basic analog control in an increasingly digital environment
  • Developing object and event detection and response

3:15 pm - 4:00 pm Using Incident Simulation To Strengthen Incident Response

  • Creating a policy that specifically defines what constitutes an incident
  • Developing a specific, step-by-step guide as to how vehicle will respond
  • Running scenario based tests to identify gaps and close them

4:00 pm - 4:45 pm Defining An Implementation Strategy And Key Enablers For Auto Cyber Security

  • Developing a detailed secure product implementation road map
  • Ensuring the steps are aligned and shared with the supply chain
  • Putting in place organizational levers to address future gaps in both capabilities and processes


A: Developing Cyber Risk Analysis Tools for Connected Cars

B: Preventing hackers from accessing system and data – the potential of Blockchain

C: Using Run Time Software Attestation to Screen Incoming and Outgoing Data

D: Perfecting Response through Incident Simulation