MAIN CONFERENCE DAY TWO
8:00 am - 9:00 am Breakfast & Conference Registration
9:15 am - 10:00 am Autonomous Electric Cars, Connected Vehicles, and the Future of Personal MobilityJoe Barkai - Chair, Vehicle Internet of Things, SAE
The automotive and transportation industries are undergoing massive transformation. Three disrupting trends are shaping the future of mobility, both personal and commercial: the adoption of shared and on-demand mobility, continued development and market penetration of electric propulsion vehicles, and the maturation of autonomous driving technology.
- Technical factors shaping the future of mobility
- Connected vehicle security challenges
- Providing governance for companies in the automotive ecosystem
Joe BarkaiChair, Vehicle Internet of Things
10:00 am - 10:45 am Security Architecture Considerations for Automotive Products and SoftwareAlan Tatourian - Security Architect, P.E. – Autonomous Driving Division, Intel
As cars increasingly transition from hardware driven products to software driven electronic devices, organizations must take careful notice to secure both hardware and software as we move towards the future of connected cars.
- Defining next-gen security architectures in automotive products for both hardware and software
- Ensuring OEM and Tier 1 software and hardware needs are met
- Autonomous architecture ECU security trends
Alan TatourianSecurity Architect, P.E. – Autonomous Driving Division
10:45 am - 11:15 am Networking & Refreshment Break
11:15 am - 12:00 pm Track 1: Understanding the Current Regulatory Environment for Automotive CybersecurityCatherine Muir - Of Counsel, Baker McKenzie LLP
Ryan Bowers - Counsel, Global Cybersecurity and Privacy, GM
This conversation will detail the ongoing regulatory and policy efforts to define proper standards for automotive cybersecurity.
- Understanding risks and liability of auto cyber incidents and response
- Considerations for future regulatory actions to spur economic development
Catherine MuirOf Counsel
Baker McKenzie LLP
Ryan BowersCounsel, Global Cybersecurity and Privacy
11:15 am - 12:00 pm Track 2: From Security to Safety: Building Security Earlier in the Component Architecture LifecycleAltaz Valani - Director of Research, Security Compass
The automotive industry is undergoing a drastic change, where innovation is, to a large extent, being driven by software. With respect to securing the operating technology, automobiles companies struggle with taking the appropriate actions to build security into their technologically-advanced automobiles.
- Describing the gap in moving from traditional car manufacturing to a more sophisticated framework that includes security
- Securing software by injecting traceable security into the framework using cybersecurity standards like ISO 27001 and NIST 800-53
- From policy to governance - determining an overall risk profile based on non-conformance to
Altaz ValaniDirector of Research
12:00 pm - 12:45 pm Track 1: Fireside Chat: Delivering Secure Vehicle to Vehicle Communications Security for Improved Automotive SafetyScott McCormick - President Connected Vehicle Trade Association
Cosimo Senni - Cyber Security for Connected Vehicles, Magneti Marelli
To prepare for the massive influx of connected vehicles entering the roads globally, they must be able to securely connect with one another in order to share pertinent information to ensure driver, pedestrian, and infrastructure safety. Vehicles must be able to connect with one another to create a common sight on roads worldwide, and communication channels must be cyber secure to do so.
- Understanding cybersecurity challenges specific to V2V communications
- Weighing the benefits and challenges of DSRC, C-ITS and C-V2X deployments
- Assessing safety and security concerns of the data
Connected Vehicle Trade Association
Cosimo SenniCyber Security for Connected Vehicles
12:00 pm - 12:45 pm Track 2: 10 Principles of an Effective Cybersecurity StrategyMatt Fahnestock - CIO Dana Incorporated
Tier 1’s must develop adequate frameworks for responses to cyber incidents to ensure improved incident response. This session will provide insight on to some of the frameworks for Tier 1’s in the automotive continuum.
- Quantifying and measuring cyber incidents for improved organizational results
- Delivering efficient cyber frameworks for organizational response
12:45 pm - 1:45 pm Networking Lunch
1:45 pm - 2:30 pm Driving OBD Port Security Level of CapabilityBob Gruszczynski - OBD Communication Expert, Volkswagen Group of America
OBD security is an integral function for any connected car, and one that is highly vulnerable to cyber attack due to its connectivity to a multitude of safety-critical automotive components. This session will address critical OBD cyber measures and strategies.
- Minimizing attack vector size for safety-critical, OBD connected components
- Preventing unauthorized access to the in-vehicle E/E system
- Updated SAE standards for OBD port security
Bob GruszczynskiOBD Communication Expert
Volkswagen Group of America
2:30 pm - 3:15 pm Afternoon Keynote: Examining the Future Federal Legislative Policy Ecosystem for Automotive CybersecurityCongresswoman Debbie Dingell - U.S. Congresswoman, Michigan's 12th Congressional District, U.S. House of Representatives
This discussion will provide an in-depth viewpoint on the ever evolving legislative ecosystem for automotive cybersecurity. With a keen focus on advancing legislation efforts to protect consumers and ensure safety, this panel will detail current legislative efforts to ensure the United States remains at the forefront of advanced vehicle cybersecurity technology, as well as the SELF DRIVE Act’s impact on cybersecurity.
- Federal Challenges Associated with Highly Autonomous Vehicles (HAVs) Security
- Collaborative Efforts to Develop Forward Thinking Regulatory Standards
Congresswoman Debbie DingellU.S. Congresswoman, Michigan's 12th Congressional District
U.S. House of Representatives
3:15 pm - 4:00 pm Developing Cyber Secure Strategies for Over the Air (OTA) UpdatesIra McDonald - Owner, High North Inc.
OTA updates are a critical aspect of the automotive cybersecurity ecosystem, but with increased connectivity, brings increased risk.
- Securing supply chain with certified libraries, source code escrow, resilient ECU design, and crypto agility
- Developing secure OTA for vehicle lifecycle maintenance and management with strong key management
- Safeguarding against OTA data breaches and leaks by defense in depth
High North Inc.