Agenda Day 1

Morning Sessions

7:30 AM - 8:30 AM Conference Arrival & Registration

Morning Sessions

8:30 AM - 8:45 AM Chairperson's Welcome & Opening Remarks

Morning Sessions

8:45 AM - 9:30 AM Keynote: Vehicle Safety & Cybersecurity Best Practices from General Motors

Jeffrey Massimilla , Vice President for Vehicle Safety and Product Cybersecurity, General Motors
General Motors VP for Vehicle Safety, Jeffrey Massimilla, has stated that “It’s not a question of if our industry will ever see a serious cyber security incident, but when,” alluding to the fact that a cybersecurity incident for one automobile manufacturer affects everyone. The need for a balanced approach to regulation and increased collaboration between the industries and government agencies remains crucial to ensure connected car security.
· Updating with GM’s current cybersecurity vehicle awareness plans
· Discussing vehicle safety standards and regulations that allow self-imposed guidance for OEM’s
· Implementing NHTSA Cybersecurity best practices guidelines into your manufacturing
· Improving and enhancing collaboration with Automobile Information Sharing and Analysis Center (Auto-ISAC)
· Protecting consumer’s personal and sensitive information within a framework that allows continued innovation and growth

img

Jeffrey Massimilla

Vice President for Vehicle Safety and Product Cybersecurity
General Motors

Morning Sessions

9:30 AM - 10:15 AM Implications & Opportunities for the Autonomous & Self-Driving Vehicle

With the House of Representatives passing the Self-Drive Act, aiming to streamline regulatory process to get vehicles on the road sooner, lawmakers agree that self-driving and autonomous cars must have technology to prevent use in terror situations. Autonomous vehicles do claim that they will be able to reduce highway deaths, provide greater mobility for seniors and disabled people and significantly cut fuel consumption. What do manufacturers need to know to prepare for this exciting step forward in the automotive industry?
Discussing the Self-Drive Act and what cybersecurity protections are in place within the bill
Propositions for equipping self-driving and autonomous vehicles with defense against hacking
Avoiding fleet level hacking and granting a new approach to cybersecurity that identifies specific behaviors and intentions of specific attackers
Outlining where we are now with the autonomous vehicle coming onto our roads and further implications and opportunities for this progression of the automotive industry

Morning Sessions

10:45 AM - 11:15 AM Networking & Refreshment Break

With the growing concern for cybersecurity safety among OEM’s, best practices, standards, and frameworks created by the NHTSA (National Highway Traffic Safety Administration), NIST (National Institute of Standards Technology), ISO (International Organization for Standardization), SAE International, Auto-ISAC (Automotive Information sharing and analysis center) and others form best practices to undertake as a manufacturer. With the recommendations from the above coupled with federal regulations forming from the U.S Department of Transportation and the Federal Trade Commission there is much discussion to take place regarding appropriate safety features and standards. Join this panel to hear discussions and best practice guidance on regulatory approaches, connected car data uses and sharing, cybersecurity issues, privacy issues and the road ahead for manufacturers, innovators and regulators staying within the same lane.
· Enforcing consumer protection standards and regulations
· Working with stakeholders to ensure innovation does not intrude consumer privacy
· Enhancing constant communication between government agencies, security experts, trade associations and stakeholders to craft guidance and self-imposed industry standards
· Sharing data on cybersecurity threats and balancing the industry vs. regulatory involvement of standards and guidance

img

Catherine Muir

Of Counsel
Baker McKenzie
img

Alex Epstein

Senior Director, Digital Strategy & Content
National Safety Council
img

Congresswoman Debbie Dingell

Congresswoman- 12th District of Michigan
United States House of Representatives
img

Faye Francy

Executive Director
Automotive ISAC
img

Alex Epstein

Senior Director, Digital Strategy & Content
National Safety Council

Morning Sessions

12:00 PM - 1:00 PM Lunch

STREAM A: Security of In-Vehicle Components

1:00 PM - 1:45 PM Stream A: Building secure ECUs and the First Steps towards Resilient Architectures

Andre Weimerskirch, VP, Global Cyber Security, Lear
A wide variety of security technologies is available by now. The involved technologies include secure boot, software separation, firewalls and filters, secure storage, application whitelisting, memory protection mechanisms, control flow mechanisms, etc. We start to enter the next stage by offering security services in the connected gateway, to monitor and protect the entire vehicle. Such services include network anomaly detection, message fingerprinting, ECU monitoring, and secure software updates. This presentation will show how to design and implement a secure connected gateway, and how that secure connected gateway will significantly improve each vehicle’s security and eventually lead to resilient vehicle architectures.
  • Design and implement a secure ECU
  • Utilize a secure connected gateway to monitor, and potentially protect, the entire vehicle architecture
  • Connect to a security operations center to protect the vehicle fleet

img

Andre Weimerskirch

VP, Global Cyber Security
Lear

STREAM A: Security of In-Vehicle Components

1:45 PM - 2:30 PM Stream A: Implementing Necessary Requirements for the Telematics Interface in Vehicles

Chris Lupini , Cybersecurity Chief Engineer , Delphi
With Automotive Telematics (Telecommunications, vehicle technologies, road safety, and electrical engineering) revenue estimated to hit $6.7 Billion globally by 2023, allowing for 70% of light vehicles to contain some form of OEM telematic system, the automotive industry must secure necessary requirements for their telematics interfaces to lessen the risk of their hacking vulnerability.
Understanding the development testing and certification process: Using approved models
Discussing Cellular Operator, PTCRB, GCF Requirements
Exploring market access for devices that transmit such as the RED Directive and FCC Testing
Challenges faced by OEM suppliers achieving wireless device compliance for products

img

Chris Lupini

Cybersecurity Chief Engineer
Delphi

STREAM A: Security of In-Vehicle Components

2:30 PM - 3:15 PM Stream A: Assessing Enterprise Cyber Security Risk: Lessons Learned From 50 Years of Predicting Risk

Douglas Clare , Vice President , FICO
Based on DHS-funded academic research, advances in Internet threat detection have evolved into enterprise-grade tools capable of performing a complex assessment of network security. The result is an empirical score that forecasts the likelihood of a material data breach. This session will articulate what you need to know about predictive analytics, how they’re used in security scoring, and why you can’t afford to “ignore your score”.
· Cyber Risk Quantification
· FICO’s R & D
· Managing 3rd and 4th party supply chain risk

img

Douglas Clare

Vice President
FICO

STREAM B: Incident Response & Management

1:00 PM - 1:45 PM Stream B: How Can We Optimize the Incident Response Process when Vulnerabilities are Exposed?

Terrance Yamak , Senior Director, Design Engineering , Hitachi America
Deployment of highly secured and reliable architecture will be of paramount importance in protecting vehicles from cyberattack in the next generation vehicles. This can be achieved by ensuring a robust security protocol that can continuously monitor the environment against hostile intrusions and attacks. In this presentation, we will discuss Hitachi's security design methodology that can be implemented to secure the in-vehicle components and systems. In addition, we will also explain our established framework for incident tracking and countermeasure execution.

Terrance Yamak

Senior Director, Design Engineering
Hitachi America

STREAM B: Incident Response & Management

1:45 PM - 2:30 PM Stream B: Preparation Tactics: Threat Modeling & Tools Needed to Prevent Cyber Hacks

There are many misconceptions and confusions on how to apply threat modeling in an efficient and correct way especially considering enhanced focus on automotive security.This session will show best methods on how to conduct a theoretical model of perceived threats to your automotive system.
How to model a system and trust its assumptions?
How to model an adversary that captures its motivation, capabilities, and actions as well as its tactics, techniques, and procedures?
Mapping out the phases of threat modeling on your product lifecycle (concept, product development, and production and operation)
Discussing various implementation methods and tools necessary for conducting an effective analysis to identify threats and mitigations

Culture of Awareness for cyber security has become a huge issue over the last year. A poor company culture with respect to employee mobility can severely expose security vulnerabilities. This session will show you best practice strategies to avoid the threat of data leakage through unmanaged devices & misused systems. You are only as strong as your weakest employee.
Ensuring your cyber security teams are properly trained and equipped for detecting and managing cyber threats
Spreading expertise across the organisation to achieve a cross-departmental approach to in house cyber security of products
Understand best practice of uniting a networked cyber community to strengthen your risk management & bolster culture of awareness

img

Dave Schippers

Assist. Professor, Head of Automotive Cybersecurity, Center for Cybersecurity Leadership
Walsh College
img

Barbara Ciaramitaro

Lead Professor, Information Technology and Cybersecurity Director
Center for Cybersecurity Leadership-Walsh College

Afternoon Sessions

3:15 PM - 4:00 PM Afternoon Break & Networking

With futuristic research already being done 5 years from now on the interactive connections between vehicles, users, and the environment, can begin to identify future mobility. This panel will assess the future urban environment through the assessment of a Smart City & Future Public Transportation System, The Autonomous Vehicle, Communication and Security Challenges, and Testing and Certification. Join this top networking session to get exposed to innovative ideas incubated in the Cyber landscape.
· Discussing the ideal vehicle for urban mobility
· Examining smart parking and new initiatives around the next generation end-to-end solution
· Adapting cities regulations and infrastructure to expedite adoption and new mobility deployment
· Debating new paradigms for urban mobility with the rise of automation and data analytics
· How can we progress from the concept of smart mobility to an “in action” reality plan?

Alex Epstein

Senior Director, Digital Strategy & Content
National Safety Council
img

Carla Bailo

President & CEO
Center for Automotive Research
img

Douglas Clare

Vice President
FICO

Afternoon Sessions

4:45 PM - 6:15 PM Post Game Networking & End of Main Conference Day 1