Check out the informative presentation Grant Bodley put together for the last Automotive Cyber Security Summit.
Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.
Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.
Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.
Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.
Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation.
Summit speaker Kyusuk Han of the University of Michigan was kind enough to share this in-depth presentation about the need for in-vehicle security and a proposed protocol to help solve the major security problems.
Nicholas J. Multari, PhD, Principal PM for Cybersecurity, Pacific Northwest National Laboratory and Rich Pietravalle, Principal, The MITRE Corporation, present on perfecting automotive cyber security incident response, the impact on connected vehicle infrastructures, and much more.
Timothy Frasier, Regional President Automotive Electronics, North America, Robert Bosch LLC, presents on:
- Developing in-house policies to increase auto cyber security best practices
- Auditing your auto supply chain to ensure secure device development
- Working across silos to implement auto cyber security best practices
Sriram Yarlagadda, Cybersecurity Architect, Aptiv, presents on secure and smart mobility vehicle architecture.
Kholoud Hatem, Functional Safety Manager, HELLA, presents on:
- Common methodologies of managing safety and security in automotive industry by applying existing standards.
- Nonappearance of the commonalities between the safety scope and the security scope. Even though it is mandatory to address safety security interferences.
- New approach of mapping the safety and security to a high-level system landscape to completely cover safety and security lifecycle.
Securing Methods for Returning Self-Driving Vehicles to a Safe State Immediately After System is Compromised
Scott Andrews, VP Technology, Connected Vehicle Trade Association, presents on:
- Developing a “safe mode” in the event of an attack to mitigate damage and quickly restore systems
- Maintaining or reintroducing some basic analog control in an increasingly digital environment
- Developing object and event detection and response and post-crash behavior
Andre Weimerskirch, Vice President of Cyber Security at the Lear Corporation, presents on how to design and implement a secure connected gateway, and how that secure connected gateway will significantly improve each vehicle’s security and eventually lead to resilient vehicle architectures. Andre Weimerskirch additionally shares how to:
- Design and implement a secure ECU
- Utilize a secure connected gateway to monitor, and potentially protect, the entire vehicle architecture
- Connect to a security operations center to protect the vehicle fleet
The rapid technological development of connected and autonomous vehicles requires fresh and constant attention to physical and cyber security. We will explore the future design and development of cyber security elements within vehicles of the future and discuss the corresponding legal considerations. With the lack of special legislation, courts look to traditional legal principles to apply to these increasingly complex issues. This keynote presentation focuses on how the fundamental liability principles would apply to a crash involving vehicles of the future.
- Bill McDonald, Partner, Bush Seyferth & Paige PLLC
- Beth Hill, General Counsel, Chief Compliance Officer & Head of Purchasing, FordDirect
- Erinn DePorre, Lead Counsel, Product Liability, General Motors Company
- Emily Frascaroli, Counsel, Ford Motor Company
- James Derian, Corporate Counsel, APTIV
Based on DHS-funded academic research, advances in Internet threat detection have evolved into enterprise-grade tools capable of performing a complex assessment of network security. The result is an empirical score that forecasts the likelihood of a material data breach. Douglas Clare, Vice President of FICO, presents on what you need to know about predictive analytics, how they’re used in security scoring, and why you can’t afford to “ignore your score”. As well as:
- Cyber Risk Quantification
- FICO’s R & D
- Managing 3rd and 4th party supply chain risk
In his presentation, Mr. Gruszczynski, OBD Communication Expert at Volkswagen Group of America, discusses current and potential future activities in methods of securing the Data Link Connector (DLC) (commonly referred to as the “OBD-II Port”) from the cybersecurity risks posed by the existence of this connector.