Terrance YamakSenior Director, Design Engineering
2:45 PM Stream B: How Can We Optimize the Incident Response Process when Vulnerabilities are Exposed?
Deployment of highly secured and reliable architecture will be of paramount importance in protecting vehicles from cyberattack in the next generation vehicles. This can be achieved by ensuring a robust security protocol that can continuously monitor the environment against hostile intrusions and attacks. In this presentation, we will discuss Hitachi's security design methodology that can be implemented to secure the in-vehicle components and systems. In addition, we will also explain our established framework for incident tracking and countermeasure execution.