Live Chat Software

Past Presentations

Past Presentation Packet

Past Presentation Packet

In preparation for Cyber Security for Automotive 2019, we wanted to exclusively share these past presentations with you. Below you will find expert content on: 

  1. Structuring Methods for Returning Self-driving Vehicles to a Safe State Immediately After System is Compromised: Scott Andrews, VP Technology, Connected Vehicle Trade Association
  2. Modeling Safety Security Interdependencies: Kholoud Hatem, Functional Safety Manager, HELLA
  3. Perfecting Incident Response and Resilience: Nicholas J. Multari, PhD, Principal, PM for Cybersecurity, Pacific Northwest National Laboratory; Rich Pietravalle, Principal, The MITRE Corporation
  4. Identifying the Top Vehicle Cyber Security Essentials: Timothy Frasier, Regional President Automotive Electronics, North America, Robert Bosch LLC
  5. Correlation of Cybersecurity and Autonomous Vehicle Architectures for End to End Security: Sriram Yarlagadda, Cybersecurity Architect, Aptiv
Perfecting Incident Response and Resilience

Perfecting Incident Response and Resilience

Nicholas J. Multari, PhD, Principal PM for Cybersecurity, Pacific Northwest National Laboratory and Rich Pietravalle, Principal, The MITRE Corporation, present on perfecting automotive cyber security incident response, the impact on connected vehicle infrastructures, and much more.

Identifying the Top Vehicle Cyber Security Essentials

Identifying the Top Vehicle Cyber Security Essentials

Timothy Frasier, Regional President Automotive Electronics, North America, Robert Bosch LLC, presents on:

  • Developing in-house policies to increase auto cyber security best practices
  • Auditing your auto supply chain to ensure secure device development
  • Working across silos to implement auto cyber security best practices
Correlation of Cybersecurity and Autonomous Vehicle Architectures for End to End Security

Correlation of Cybersecurity and Autonomous Vehicle Architectures for End to End Security

Sriram Yarlagadda, Cybersecurity Architect, Aptiv, presents on secure and smart mobility vehicle architecture.

Modeling Safety Security Interdependencies

Modeling Safety Security Interdependencies

Kholoud Hatem, Functional Safety Manager, HELLA, presents on:

  • Common methodologies of managing safety and security in automotive industry by applying existing standards.
  • Nonappearance of the commonalities between the safety scope and the security scope. Even though it is mandatory to address safety security interferences.
  • New approach of mapping the safety and security to a high-level system landscape to completely cover safety and security lifecycle.
Securing Methods for Returning Self-Driving Vehicles to a Safe State Immediately After System is Compromised

Securing Methods for Returning Self-Driving Vehicles to a Safe State Immediately After System is Compromised

Scott Andrews, VP Technology, Connected Vehicle Trade Association, presents on:

  • Developing a “safe mode” in the event of an attack to mitigate damage and quickly restore systems
  • Maintaining or reintroducing some basic analog control in an increasingly digital environment
  • Developing object and event detection and response and post-crash behavior

Building Secure ECU's and the First Steps Towards Resilient Architectures

Building Secure ECU's and the First Steps Towards Resilient Architectures

Andre Weimerskirch, Vice President of Cyber Security at the Lear Corporation, presents on how to design and implement a secure connected gateway, and how that secure connected gateway will significantly improve each vehicle’s security and eventually lead to resilient vehicle architectures. Andre Weimerskirch additionally shares how to:

  • Design and implement a secure ECU
  • Utilize a secure connected gateway to monitor, and potentially protect, the entire vehicle architecture
  • Connect to a security operations center to protect the vehicle fleet


Securing Vehicles of the Future: Privacy, Cyber Security, and Product Liability

Securing Vehicles of the Future: Privacy, Cyber Security, and Product Liability

The rapid technological development of connected and autonomous vehicles requires fresh and constant attention to physical and cyber security. We will explore the future design and development of cyber security elements within vehicles of the future and discuss the corresponding legal considerations. With the lack of special legislation, courts look to traditional legal principles to apply to these increasingly complex issues. This keynote presentation focuses on how the fundamental liability principles would apply to a crash involving vehicles of the future.

Moderators include:

  • Bill McDonald, Partner, Bush Seyferth & Paige PLLC
  • Beth Hill, General Counsel, Chief Compliance Officer & Head of Purchasing, FordDirect
  • Erinn DePorre, Lead Counsel, Product Liability, General Motors Company
  • Emily Frascaroli, Counsel, Ford Motor Company
  • James Derian, Corporate Counsel, APTIV
Assessing Enterprise Cyber Security Risk: Lessons Learned from 50 Years of Predicting Risk

Assessing Enterprise Cyber Security Risk: Lessons Learned from 50 Years of Predicting Risk

Based on DHS-funded academic research, advances in Internet threat detection have evolved into enterprise-grade tools capable of performing a complex assessment of network security. The result is an empirical score that forecasts the likelihood of a material data breach. Douglas Clare, Vice President of FICO, presents on what you need to know about predictive analytics, how they’re used in security scoring, and why you can’t afford to “ignore your score”. As well as:

  • Cyber Risk Quantification
  • FICO’s R & D
  • Managing 3rd and 4th party supply chain risk
Cybersecurity at the Data Link Connector ISO 26262 USA

Cybersecurity at the Data Link Connector ISO 26262 USA

In his presentation, Mr. Gruszczynski, OBD Communication Expert at Volkswagen Group of America, discusses current and potential future activities in methods of securing the Data Link Connector (DLC) (commonly referred to as the “OBD-II Port”) from the cybersecurity risks posed by the existence of this connector.