Live Chat Software
24 - 26 October, 2018
Silicon Valley

Media Center

Preliminary Agenda

Check out the preliminary agenda for a deep dive into the sessions most important to you!

Fast Track Your Attendance

Post Show Report: Looking Back at Automotive Cyber Security 2017

Want to learn more about what happened in 2017? Check out our Post Show Report that highlights: attendee statistics, top speaking sessions, what to expect in 2018 and more!

Past Attendee Snapshot

Take a look at some of the job titles and companies that attended the last iteration of Automotive Cyber Security. View the snapshot to see who could be joining you this year!

Convince Your Boss Letter

Hard for you to leave the office?  Download our "Convince Your Boss" letter now for a sure fire way to leave the office and attend this summit!  

Registration Form

Registration for the Automotive Cyber Security Summit is easier than ever. Just download this registration form and send it to enquiryIQPC@IQPC.com 

Exclusive Content

Cyber Security Regulatory Challenges

The automotive industry is changing at a faster pace than ever before, propelled forward by advances in technology which break the traditional developmental cycle mold. Self-driving vehicles, electrification and connected services are driving rapid development and while new technologies offer exciting possibilities, the industry as a whole must counterbalance this...

The Autonomous Technology Transformation in the Automotive Industry

We surveyed 325+ global automotive leaders to identify where car manufacturers are on their journey towards autonomous, how they’re capitalizing on this opportunity for reinvention and the key challenges they’re facing as a result. This report aims to not only present a snapshot of the current state of autonomous, but...

8 Tips to Prevent Autonomous Vehicle Cyber Breach Liability

This article takes a look at how companies in the AV industry can best position themselves to avoid liability for a cyber breach.  The reality is that no matter how many steps are taken to prevent a breach, the threat cannot be entirely eliminated.  Even if every reasonable step is...

The Cyber Risks Associated with Connected Cars

Digital transformation is affecting every business sector, and the automotive industry is no exception. Thanks to innovative software engineers and auto manufacturers, smart, fully connected vehicles are coming to the streets, giving more freedom and comfort to their drivers. The largest cyber concern for connected cars is that once a cybercriminal...

Automotive Cyber Security eBook

This exclusive ebook includes:ARTICLE #1 "How vulnerable are automakers to cyber attacks?"INFOGRAPHIC "Carjacking - risks of the internet-connected car"WHITEPAPER "Connected car driving change in defect detection"ARTICLE #2 "When does a cyber attack become a functional safety issue?"PRESENTATION #1 "Volvo presents collaborative security"PRESENTATION #2 "Stanley Law Group presents legal concerns for...

Past Presentation Packet

In preparation for Cyber Security for Automotive 2018, we wanted to exclusively share these past presentations with you. Below you will find expert content on: Building Secure ECU's and the First Steps Towards Resilient Architectures: Andre Weimerskirch, Vice President Cyber Security, Lear CorporationSecuring Vehicles of the Future: Privacy, Cyber Security,...

Top 5 Automotive Cyber Security Vulnerabilities

In partnership with our past speaker faculty, we created this list of the Top 5 Automotive Cyber Security Vulnerabilities expected to take center stage in 2018. Learn more about the major cyber security threats the auto industry currently face, how the industry is collectively addressing them and more in this...

The Automotive Industry and their Partners are Stepping up to Protect their Customers

The Automotive Industry is stepping up their protection in order to keep hackers at bay in their connected vehicles.  Both state and federal government are in agreement to make a change!  Download this article to check out what individual states and groups have in the works.  

V2X Security from an Expert

Andre is no stranger to analyzing automotive cyber security.  In fact, in his role at the Lear Corporation he heads up their V2X department working with the analytics that encompass why consumer vehicles are susceptible to hacking and how to improve their security.  Download his interview to read more!

Interview with a Hacker

What is your position on vigilante hackers? Chris Valasek, Security Lead at Uber's Advanced Technologies Center, and famed Jeep hacker, spoke previously at the Automotive Cyber Security Summit. He shared with us his motivations, which arm of the auto industry was responsible for the openings he expolited, and his experience...

Past Presentations

Building Secure ECU's and the First Steps Towards Resilient Architectures

Andre Weimerskirch, Vice President of Cyber Security at the Lear Corporation, presents on how to design and implement a secure connected gateway, and how that secure connected gateway will significantly improve each vehicle’s security and eventually lead to resilient vehicle architectures. Andre Weimerskirch additionally shares how to:Design and implement a...

Securing Vehicles of the Future: Privacy, Cyber Security, and Product Liability

The rapid technological development of connected and autonomous vehicles requires fresh and constant attention to physical and cyber security. We will explore the future design and development of cyber security elements within vehicles of the future and discuss the corresponding legal considerations. With the lack of special legislation, courts look...

Assessing Enterprise Cyber Security Risk: Lessons Learned from 50 Years of Predicting Risk

Based on DHS-funded academic research, advances in Internet threat detection have evolved into enterprise-grade tools capable of performing a complex assessment of network security. The result is an empirical score that forecasts the likelihood of a material data breach. Douglas Clare, Vice President of FICO, presents on what you need...

Cybersecurity at the Data Link Connector ISO 26262 USA

In his presentation, Mr. Gruszczynski, OBD Communication Expert at Volkswagen Group of America, discusses current and potential future activities in methods of securing the Data Link Connector (DLC) (commonly referred to as the “OBD-II Port”) from the cybersecurity risks posed by the existence of this connector.  

Additional Content

WhiteboxCRYPTO Strength of Security

This white paper, courtesy of Microsemi, describes the company's white-box cryptography product, WhiteboxCRYPTO™. Further, it also describes the structure of the white-box algorithms, how this structure differentiates white-box cryptography from classical algorithms, and why these structures are far more secure than classical software crypto implementations.

Modern Data Platform for Connected Vehicles

Check out the informative presentation Grant Bodley put together for the last Automotive Cyber Security Summit.  

Technology Overdrive

Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.  

Principles of Automotive Cyber-Security

Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.  

Autonomous Vehicle Technology

This thorough, 200-page report, courtesy of the RAND Transportation, Space, and Technology Program, explores legislative activity, cyber hacks, the role of telematics and communications, and liability implications, among many other topics surrounding autonomous cars.

"The Industry should learn from the Software Sector" - Challenges for Automotive Cyber Security

Automotive IQ had the opportunity to interview Dr. Siraj Ahmed Shaikh, Expert in Cyber Security from Coventry University and Chairman at last year's conference, on the current challenges within the industry. See what they are!

Audio Workshop- Communications: Data Privacy & the Standardization of Security Protocols and Requirements

Josh Corman, Founder of I am the Cavalry, presented this workshop at the past summit. Listen to the full presentation and learn how to apply standardized security protocols to your cyber security ecosystem.

Chris Valasek Hacks an SUV

Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit, discusses how he breached a vehicle on the highway to expose its cyber security vulnerabilities in this exclusive video interview.

AT&T to Link Connected Cars and Home Technologies Services

The US telecommunications company, according to a Reuters news article, wishes to strengthen its position on the market for internet-connected devices. This way, it could provide a competitive platform against other internet and communications companies, such as Verizon and Google Inc. AT&T’s products, ‘Digital Life’ for the home security and...

Challenges to Make Cars Secure

Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.

Chris Valasek Hacks an SUV: Transcript

For your convenience, we've provided a transcript of our exclusive interview with Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit. Within he discusses how he breached a vehicle on the highway last month to expose its cyber security vulnerabilities.

Car Cybersecurity: What do the automakers really think?

The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and Tier One suppliers. Find out the key findings of the developer survey within!

Cyber Security - OEM Point of View

Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.

The Future of Automotive Network Solution - BUS Systems and Ethernet

Automotive IQ recently spoke with Florian Netter of Audi Electronics Venture about the current state of Automotive BUS Systems and Ethernet. Cyber security is a real challenge within BUS systems. Cyber security is and will ever be a challenge for the E/E architecture. And the more holistic the driver-supporting software...

Past Speaker Interview: Chris Valasek

Chris Valasek, Director of Vehicle Security Research at IOActive, and past speaker at our summit, broaches safety technologies and intrusion detection systems in this exclusive on-site video interview.

Past Speaker Interview: Henry Bzeih

Henry Bzeih, CTO & Head of Connected Car at KIA Motors America, and past speaker at our summit, discusses the main challenges that OEMS and Tier 1 companies are experiencing in in the automotive security space, in this exclusive on-site video interview.

Automotive Cybersecurity for In-Vehicle Communication

Automotive cybersecurity issues have emerged as information technologies are increasingly deployed in modern vehicles, and security researchers have already demonstrated the associated threats and risks. Although many security protocols have been proposed, they have not considered the threats posed by denial-of-service (DoS) attacks and external connectivity vulnerabilities. Summit speakers Kyusuk...

PANEL: Automotive Retail and the Connected Car

Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide...

Automotive Cyber Security: Industry Perspectives

Executives and industry experts from Kia, Hyundai, the University of Michigan and IOActive chime in on the industry's most pressing cybersecurity issues and how to resolve them in this exclusive report.

Past Speaker Interview: Matthew Carpenter

Matthew Carpenter, Principal Security Researcher at Grimm, and past speaker at our summit, talks industry challenges, and what it would take to overhaul cyber security incident mapping, in this exclusive on-site video interview.