Agenda Day 2

Morning Sessions

8:00 AM - 9:00 AM Conference Registration & Welcome Coffee

The rapid technological development of connected and autonomous vehicles requires fresh and constant attention to physical and cyber security. We will explore the future design and development of cyber security elements within vehicles of the future and discuss the corresponding legal considerations. With the lack of special legislation, courts look to traditional legal principles to apply to these increasingly complex issues. This session will focus on how the fundamental liability principles would apply to a crash involving vehicles of the future.

Bill McDonald

Partner
Bush Seyferth & Paige PLLC
img

Beth Hill

General Counsel
FordDirect
img

Emily Frascaroli

Counsel
Ford Motor Company
img

Erinn DePorre

Legal Counsel, Product Liability
General Motors
img

James Derian

Corporate Counsel
Delphi

Morning Sessions

9:45 AM - 10:30 AM Keynote: Special Presentation: Cybersecurity War Game & Mini “White Hat Hacker” Hackathon!

With Automotive giants like Tesla and GM promoting a “bug bounty” program aimed at offering rewards for anyone that finds vulnerabilities in their vehicle design systems, it is evident that the need for stress-testing, validating, and updating safeguards has become the top priority for the cybersecurity automotive industry. 159 Bugs reported to Tesla’s program proves that vulnerabilities in the highest technologically advanced vehicles does exist. Join this session with 2 elite hackers who will show the audience common system vulnerabilities and actual “hack” a simulated default error in a sample companies system.

Morning Sessions

10:30 AM - 11:15 AM Networking & Refreshment Break

Morning Sessions

11:15 AM - 12:00 PM Collaboration Across the Global Automotive Industry & Enhancing Cybersecurity Awareness

Faye Francy , Executive Director , Automotive ISAC
With the copious amounts of data being produced from the increase in connected cars on the road, the automotive industry must collaborate to maximize business potential, accelerate the pace of innovation, and save consumer lives on the road.
Developing relationships with OEM’s and Stakeholders to enhance the speed of innovation and increase consumer safety
Assessing safety improvements from city infrastructure and car manufacturers to reduce the number of car fatalities, accidents, and cyber hacks
Discussing out of industry models for cyber security that can be directly applied to the automotive industry
Analyzing data generation of connected and future vehicles to boost future of autonomy business models

img

Faye Francy

Executive Director
Automotive ISAC

Morning Sessions

12:00 PM - 1:00 PM Lunch

STREAM A: Addressing System Design Changes & Vulnerabilities to Stay Connected & Protected

1:00 PM - 1:45 PM Stream A: How the International Transportation Innovation Center Builds and Tests Cyber Security

Prof. Dr. Joachim Taiber, Chief Technology Officer , International Transportation Innovation Center
Dr. Joachim has been testing and developing cyber security systems for vehicles for over 10 years. Previously working at the IT innovation lab at BMW, Dr. Joachim tests sensors to back end servers, looking for vulnerabilities in design mechanisms. ITIC, known as the leading test site for connected and sustainable mobility, has also been working on wireless power transfer for electrified vehicles with partners like Toyota, Cisco, Duke Energy and Cu-ICAR.
Designing public/private partnership models
Developing physical test beds for connected vehicle sustainable mobile technologies
Discussing further research into testing methods to validate product functions of the vehicle
Facilitating transportation innovation in a safe, secure, and confidential ecosystem

img

Prof. Dr. Joachim Taiber

Chief Technology Officer
International Transportation Innovation Center

STREAM A: Addressing System Design Changes & Vulnerabilities to Stay Connected & Protected

1:45 PM - 2:30 PM Stream A: Implications and Opportunities for 5G for Connected Vehicles and Cooperative Driving Systems

As Huawei and DLR tested 5G for cooperative automated driving in February in Munich, the results showed the applicability of 5G V2X to achieve a reliable and ultra-low latency connection between vehicles for collision avoidance. The 5G network has continued to be tested for platooning and the V2X series for more complex cooperative measures.
Evolving towards the 5G era and what vehicle network architectures need to change to achieve this
Considering the increase in safety 5G offers and what system design changes we need to address
Exploiting the new ecosystem for traffic efficiency and infotainment provision
Requirements of cooperative emergency measures to increase safety aspects of Highly Automated Driving (HAD)

STREAM B: Connected and Autonomous Cars: Security Testing for Critical Transport Infrastructure and Communication in ADAS Systems

1:00 PM - 1:45 PM Stream B: Establishing IoT Security and AV Testing at the Department of Michigan

Kirk Steudle, Director, Michigan Department of Transportation
With 75% of shipped cars globally able to connect to the internet by 2020, vehicle manufacturers must build security into connected vehicles to protect communications and mitigate cybersecurity data hacking threats.
Examining the mobile operators’ role in securing vehicle security and infrastructure
Maintaining integrity throughout the vehicle lifecycle
Preventing interception of consumer data and securing vehicle gateway
Discussing implications and opportunities for IoT expansion, Electronic Control Units (ECU) progression, and Machine to Machine (M2M) communication

img

Kirk Steudle

Director
Michigan Department of Transportation

STREAM B: Connected and Autonomous Cars: Security Testing for Critical Transport Infrastructure and Communication in ADAS Systems

1:45 PM - 2:30 PM Stream B: Securing the Connected Truck

With the plethora of security challenges in all transports, OEM’s struggle to find a tamper-proof automotive architecture. With the connected Truck Market worth $37.64 Billion USD by 2022, understanding proper security measures and potential automated security for future vehicles and connected trucks will prove essential in the next 12-18 months.
Exploring best practices from railway and aeronautic domains
Building hack-proof systems for future vehicles and trucks
Addressing cyber security challenges of increasing attack points from c
connectivity and automatic driving
Enhancing security and safety for connected trucks

Afternoon Sessions

2:30 PM - 3:15 PM Afternoon Networking & Refreshments

Afternoon Sessions

3:15 PM - 4:00 PM DATA PANEL: Securing IT Backend Receivers & Vehicle & Consumer Data: Privacy and Safety Concerns of The Connected Car

Catherine Muir, Of Counsel, Baker McKenzie Andre Weimerskirch, VP, Global Cyber Security, Lear Prof. Dr. Joachim Taiber, Chief Technology Officer , International Transportation Innovation Center
A shift in consumer requirements has resulted due to advancements in technology. Our connected world needs to continuously reflect the high-tech cars we desire to drive. How can the automotive industry work with the variety of technology, and communication companies to prevent a hack of safety-critical systems, and protect consumer data? Join us during this collaborative discussion to explore:
Available tools & strategies to increase security of vehicle communication systems, and deter third party attacks, and hacks while permitting OEMs access to those systems
· Best practices in software development in communication systems that will reduce chances of a cyber attack
· Discussing future advancements of the connected car and managing your team to assess, test, and detect threats for your consumer’s vehicle

img

Andre Weimerskirch

VP, Global Cyber Security
Lear
img

Prof. Dr. Joachim Taiber

Chief Technology Officer
International Transportation Innovation Center

Catherine Muir

Of Counsel
Baker McKenzie

Afternoon Sessions

4:00 PM - 5:00 PM Automotive Cyber Security Interactive Discussion Session

*The audience will separate into 4 tables based on choice and discuss the topic with a leading solution provider as well as other delegates at the table. Each table session will run for 30 minutes allowing you to choose two topics of choice with a rotation in between sessions.
Table 1: New Practices for Developing and Implementing Cyber Security Solutions
Table 2: Improving Security to Wireless Interfaces within a Vehicle
Table 3: Equipping Vehicles with End to End Cloud Security
Table 4: Software Approaches to Cyber Security and the Future of ECU’s

Afternoon Sessions

5:00 PM - 6:00 PM Post Game Networking & End of Main Conference Day 2