MAIN CONFERENCE DAY TWO

8:00 am - 9:00 am Breakfast & Conference Registration

9:00 am - 9:15 am Chairperson’s Welcome And Opening Remarks

Faye Francy - Executive Director, Auto-ISAC
img

Faye Francy

Executive Director
Auto-ISAC

9:15 am - 10:00 am Autonomous Electric Cars, Connected Vehicles, and the Future of Personal Mobility

Joe Barkai - Chair, Vehicle Internet of Things, SAE
The automotive and transportation industries are undergoing massive transformation. Three disrupting trends are shaping the future of mobility, both personal and commercial: the adoption of shared and on-demand mobility, continued development and market penetration of electric propulsion vehicles, and the maturation of autonomous driving technology.

- Technical factors shaping the future of mobility
- Connected vehicle security challenges
- Providing governance for companies in the automotive ecosystem
img

Joe Barkai

Chair, Vehicle Internet of Things
SAE

10:00 am - 10:45 am Security Architecture Considerations for Automotive Products and Software

Alan Tatourian - Security Architect, P.E. – Autonomous Driving Division, Intel
As cars increasingly transition from hardware driven products to software driven electronic devices, organizations must take careful notice to secure both hardware and software as we move towards the future of connected cars.
 
-          Defining next-gen security architectures in automotive products for both hardware and software
-          Ensuring OEM and Tier 1 software and hardware needs are met
-          Autonomous architecture ECU security trends
img

Alan Tatourian

Security Architect, P.E. – Autonomous Driving Division
Intel

10:45 am - 11:15 am Networking & Refreshment Break

11:15 am - 12:00 pm Track 1: Understanding the Current Regulatory Environment for Automotive Cybersecurity

Catherine Muir - Office Counsel, Cybersecurity Group, Baker McKenzie LLP
This conversation will detail the ongoing regulatory and policy efforts to define proper standards for automotive cybersecurity.

- Understanding risks and liability of auto cyber incidents and response
- Considerations for future regulatory actions to spur economic development
img

Catherine Muir

Office Counsel, Cybersecurity Group
Baker McKenzie LLP

11:15 am - 12:00 pm Track 2: Strength in Numbers: How Community Cyber Defense Makes Everyone Stronger

This conversation will provide a unique viewpoint as to what effective cyber threat intelligence sharing looks like.

- Why sharing cyber threat intelligence as part of a cyber defense community is critical for staying ahead of bad actors
- Discussing barriers to sharing and ways to overcome them

12:00 pm - 12:45 pm Track 1: Panel Discussion: Delivering Secure Vehicle to Vehicle Communications Security for Improved Automotive Safety

Scott McCormick - President Connected Vehicle Trade Association
Cosimo Senni - Cyber Security for Connected Vehicles, Magneti Marelli
To prepare for the massive influx of connected vehicles entering the roads globally, they must be able to securely connect with one another in order to share pertinent information to ensure driver, pedestrian, and infrastructure safety. Vehicles must be able to connect with one another to create a common sight on roads worldwide, and communication channels must be cyber secure to do so.
 
-          Understanding cybersecurity challenges specific to V2V communications
-          Weighing the benefits and challenges of DSRC, C-ITS and C-V2X deployments
-          Assessing safety and security concerns of the data
img

Scott McCormick

President
Connected Vehicle Trade Association

img

Cosimo Senni

Cyber Security for Connected Vehicles
Magneti Marelli

12:00 pm - 12:45 pm Track 2: Developing Tier 1 Cyber Response Frameworks for Improved Automotive Security & Response

Matt Fahnestock - CIO Dana Incorporated
Tier 1’s must develop adequate frameworks for responses to cyber incidents to ensure improved incident response. This session will provide insight on to some of the frameworks for Tier 1’s in the automotive continuum.

- Quantifying and measuring cyber incidents for improved organizational results
- Delivering efficient cyber frameworks for organizational response
img

Matt Fahnestock

CIO
Dana Incorporated

12:45 pm - 1:45 pm Networking Lunch


1:45 pm - 2:30 pm Afternoon Keynote: Examining the Future Federal Legislative Policy Ecosystem for Automotive Cybersecurity

Congresswoman Debbie Dingell - U.S. Congresswoman, Michigan's 12th Congressional District, U.S. House of Representatives
This discussion will provide an in-depth viewpoint on the ever evolving legislative ecosystem for automotive cybersecurity. With a keen focus on advancing legislation efforts to protect consumers and ensure safety, this panel will detail current legislative efforts to ensure the United States remains at the forefront of advanced vehicle cybersecurity technology, as well as the SELF DRIVE Act’s impact on cybersecurity.

- Federal Challenges Associated with Highly Autonomous Vehicles (HAVs) Security
- Collaborative Efforts to Develop Forward Thinking Regulatory Standards
img

Congresswoman Debbie Dingell

U.S. Congresswoman, Michigan's 12th Congressional District
U.S. House of Representatives

2:30 pm - 3:15 pm Driving OBD Port Security Level of Capability

Bob Gruszczynski - OBD Communication Expert, Volkswagen Group of America
OBD security is an integral function for any connected car, and one that is highly vulnerable to cyber attack due to its connectivity to a multitude of safety-critical automotive components. This session will address critical OBD cyber measures and strategies.
 
-          Minimizing attack vector size for safety-critical, OBD connected components
-          Preventing unauthorized access to the in-vehicle E/E system
-          Updated SAE standards for OBD port security
img

Bob Gruszczynski

OBD Communication Expert
Volkswagen Group of America

3:15 pm - 4:00 pm Developing Cyber Secure Strategies for Over the Air (OTA) Updates

Ira McDonald - Owner, High North Inc., Former Security Architect, FCA
OTA updates are a critical aspect of the automotive cybersecurity ecosystem, but with increased connectivity, brings increased risk.

- Securing supply chain with certified libraries, source code escrow, resilient ECU design, and crypto agility
- Developing secure OTA for vehicle lifecycle maintenance and management with strong key management
- Safeguarding against OTA data breaches and leaks by defense in depth
img

Ira McDonald

Owner, High North Inc.
Former Security Architect, FCA