2017 Presentations

The Cyber Threat Organizational Lessons From The Front Lines

The Cyber Threat Organizational Lessons From The Front Lines

Bob Gourley, a pioneer in cyber threat intelligence, will present insights into cyber threat actors and their capabilities learned from decades of experience defending enterprises. His threat-focused approach prioritizes organizational awareness, employee development, supply chain security, and proactive leadership on developing regulations. Bob Gourley is presenting in coordination with SAE International, whose Cybersecurity Knowledge Hub is a comprehensive source for timely, authoritative information related to the cyber-physical security of end-to-end vehicle and product design, risk mitigation, workforce development resources, training, standards, and more.
Preventing Exploits Of ECUS’ Unknown Threats

Preventing Exploits Of ECUS’ Unknown Threats

  • Hidden Security Bugs May Cause Recall Charges
  • Solution: Maintain Factory Settings
  • Autonomous Security Addresses Unknown Threats and Avoids Recalls
  • Field-Tests of Autonomous Security by 16 OEMs and Tier-1s

Presentation by Ami Dotan, CEO and Co-Founder, Karamba Security

National Highway Traffic Safety Administration Modern Vehicles & Cybersecurity Research

National Highway Traffic Safety Administration Modern Vehicles & Cybersecurity Research

With a rapid expansion of connected services in vehicles, cybersecurity has become a top priority. NHTSA has published draft best practices and guidance for vehicle

cybersecurity for OEMs, Tier 1 suppliers, and technology companies. Hear their conversation on:

  • Best Practices for improving motor vehicle cyber security
  • Research areas of interest
Effective Governance: Vehicle CyberSecurity

Effective Governance: Vehicle CyberSecurity

The vehicle development process has become more complex than ever with various automotive and technology suppliers working with OEMs on the final product. Even though in recent years there have been industry initiatives towards a widespread cyber security & functional safety standards, security must be built into the various components and technologies across the supply chain. Presentation by Faye Francy, Executive Director, AUTO-ISAC
Intelligent Car Coalition: Leading the conversation on automated and connected car policy in Washington DC

Intelligent Car Coalition: Leading the conversation on automated and connected car policy in Washington DC

Several OEMs and Tier 1s are working in a collective effort to help secure and protect their modern vehicles. GM and Tesla embrace white hackers, Volvo has collaborated with tech, academia, and government, and more OEMs continue to partner with Tier 1 supplies to leverage end-to-end security solutions. What collaborative trends are next to come? Will the industry continue to work together? Presentation by Catherine McCullough, Founder and Executive Director, Intelligent Car Coalition
Countering Intrusions And Improving V2x Security

Countering Intrusions And Improving V2x Security

The integration of IoT (Internet of Things) and connected systems is rapidly increasing. OEMs and transportation departments need to securely connect all vehicles to minimize their risk of cyber attacks and intrusions. Our expert will discuss:

  • Protecting the vehicle from incorrect signals sent to and from V2X systems
  • Next generation development of V2X systems
Building Secure Vehicles: How Asrtm System Allow Automotive Companies To Proactively Design Secure Systems Without Aversely Affecting Development Processes

Building Secure Vehicles: How Asrtm System Allow Automotive Companies To Proactively Design Secure Systems Without Aversely Affecting Development Processes

Presentation by Rohit Sethi Chief, Operating Officer, Security Compass and Timo Skytta, Chief Security Officer, HERE. In this talk we discuss the emergence of a new category of solutions that Gartner has coined ASRTM - Application Security Requirements and Threat Management. ASRTM solutions provide a single unified mechanism to define low, level operational requirements with a rule based engine to build security and privacy into in-house development as well as specify detailed requirements and test cases for suppliers. ASRTM solutions deliver only the pertinent controls along with just in time training to project teams, and take advantage of integrations with Application Lifecycle Management (ALM) tools like JIRA & CA Rally to decrease the time impact for development teams.

UNVEILED: Blackberry’s Automotive Cybersecurity Best Practices

UNVEILED: Blackberry’s Automotive Cybersecurity Best Practices

Presentation by Chris Taylor, Senior Product Manager, BlackBerry QNX