Live Chat Software

Presentations

Modern Data Platform for Connected Vehicles

Modern Data Platform for Connected Vehicles

Check out the informative presentation Grant Bodley put together for the last Automotive Cyber Security Summit.  

Technology Overdrive

Technology Overdrive

Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.  

Principles of Automotive Cyber-Security

Principles of Automotive Cyber-Security

Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.  

Challenges to Make Cars Secure

Challenges to Make Cars Secure

Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.

Cyber Security - OEM Point of View

Cyber Security - OEM Point of View

Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.

PANEL: Automotive Retail and the Connected Car

PANEL: Automotive Retail and the Connected Car

Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation. 

Practical Real-Time Frame Authentication for In-Vehicle Networks

Practical Real-Time Frame Authentication for In-Vehicle Networks

Summit speaker Kyusuk Han of the University of Michigan was kind enough to share this in-depth presentation about the need for in-vehicle security and a proposed protocol to help solve the major security problems.

Perfecting Incident Response and Resilience

Perfecting Incident Response and Resilience

Nicholas J. Multari, PhD, Principal PM for Cybersecurity, Pacific Northwest National Laboratory and Rich Pietravalle, Principal, The MITRE Corporation, present on perfecting automotive cyber security incident response, the impact on connected vehicle infrastructures, and much more.

Identifying the Top Vehicle Cyber Security Essentials

Identifying the Top Vehicle Cyber Security Essentials

Timothy Frasier, Regional President Automotive Electronics, North America, Robert Bosch LLC, presents on:

  • Developing in-house policies to increase auto cyber security best practices
  • Auditing your auto supply chain to ensure secure device development
  • Working across silos to implement auto cyber security best practices
Correlation of Cybersecurity and Autonomous Vehicle Architectures for End to End Security

Correlation of Cybersecurity and Autonomous Vehicle Architectures for End to End Security

Sriram Yarlagadda, Cybersecurity Architect, Aptiv, presents on secure and smart mobility vehicle architecture.

Modeling Safety Security Interdependencies

Modeling Safety Security Interdependencies

Kholoud Hatem, Functional Safety Manager, HELLA, presents on:

  • Common methodologies of managing safety and security in automotive industry by applying existing standards.
  • Nonappearance of the commonalities between the safety scope and the security scope. Even though it is mandatory to address safety security interferences.
  • New approach of mapping the safety and security to a high-level system landscape to completely cover safety and security lifecycle.
Securing Methods for Returning Self-Driving Vehicles to a Safe State Immediately After System is Compromised

Securing Methods for Returning Self-Driving Vehicles to a Safe State Immediately After System is Compromised

Scott Andrews, VP Technology, Connected Vehicle Trade Association, presents on:

  • Developing a “safe mode” in the event of an attack to mitigate damage and quickly restore systems
  • Maintaining or reintroducing some basic analog control in an increasingly digital environment
  • Developing object and event detection and response and post-crash behavior

Building Secure ECU's and the First Steps Towards Resilient Architectures

Building Secure ECU's and the First Steps Towards Resilient Architectures

Andre Weimerskirch, Vice President of Cyber Security at the Lear Corporation, presents on how to design and implement a secure connected gateway, and how that secure connected gateway will significantly improve each vehicle’s security and eventually lead to resilient vehicle architectures. Andre Weimerskirch additionally shares how to:

  • Design and implement a secure ECU
  • Utilize a secure connected gateway to monitor, and potentially protect, the entire vehicle architecture
  • Connect to a security operations center to protect the vehicle fleet


Securing Vehicles of the Future: Privacy, Cyber Security, and Product Liability

Securing Vehicles of the Future: Privacy, Cyber Security, and Product Liability

The rapid technological development of connected and autonomous vehicles requires fresh and constant attention to physical and cyber security. We will explore the future design and development of cyber security elements within vehicles of the future and discuss the corresponding legal considerations. With the lack of special legislation, courts look to traditional legal principles to apply to these increasingly complex issues. This keynote presentation focuses on how the fundamental liability principles would apply to a crash involving vehicles of the future.

Moderators include:

  • Bill McDonald, Partner, Bush Seyferth & Paige PLLC
  • Beth Hill, General Counsel, Chief Compliance Officer & Head of Purchasing, FordDirect
  • Erinn DePorre, Lead Counsel, Product Liability, General Motors Company
  • Emily Frascaroli, Counsel, Ford Motor Company
  • James Derian, Corporate Counsel, APTIV
Assessing Enterprise Cyber Security Risk: Lessons Learned from 50 Years of Predicting Risk

Assessing Enterprise Cyber Security Risk: Lessons Learned from 50 Years of Predicting Risk

Based on DHS-funded academic research, advances in Internet threat detection have evolved into enterprise-grade tools capable of performing a complex assessment of network security. The result is an empirical score that forecasts the likelihood of a material data breach. Douglas Clare, Vice President of FICO, presents on what you need to know about predictive analytics, how they’re used in security scoring, and why you can’t afford to “ignore your score”. As well as:

  • Cyber Risk Quantification
  • FICO’s R & D
  • Managing 3rd and 4th party supply chain risk
Cybersecurity at the Data Link Connector ISO 26262 USA

Cybersecurity at the Data Link Connector ISO 26262 USA

In his presentation, Mr. Gruszczynski, OBD Communication Expert at Volkswagen Group of America, discusses current and potential future activities in methods of securing the Data Link Connector (DLC) (commonly referred to as the “OBD-II Port”) from the cybersecurity risks posed by the existence of this connector.