Knect365 Automotive and TU-Auto are part of the Knowledge and Networking Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Informa
Jun 06
Show Filter
9:00am - 9:20am 20 mins
Exclusive Headline Presentation from Audi of America
  • Speaker Cian O’Brien - Executive Vice President and Chief Operating Officer, Audi of America
more

More information coming soon

9:20am - 9:40am 20 mins
The Battle for Miles and Minutes
  • Speaker Roger Lanctot - Director Automotive Connected Mobility, Strategy Analytics
more

Soon the auto industry will no longer be defined by number of units sold, but how many miles are driven and how long is spent in the vehicle. So how will this new battle play out?

  • Get to grips with how to increase consumer usage of in vehicle connected services with radical strategies such as subsidizing connectivity and even compensating drivers for the miles driven! 
  • Extrapolate how to gain real value from miles and minutes driven through the integration of monetizable digital services from a variety of providers
  • Consider how to increase the adoption and usage of EVs via car sharing/ride hailing and subscription-based vehicle access to prove their economic viability to the world
9:40am - 10:20am 40 mins
More Headlines TBA
10:20am - 11:00am 40 mins
Morning Coffee & Networking Break
more
11:00am - 11:30am 30 mins
Automotive Cybersecurity: Understanding A Crowded Market
  • Speaker Paul Sanderson - Cyber Security Senior Technical Specialist, SBD Automotive
more

Finding the best cybersecurity partners and solutions can be daunting! Get an overview of the market and the best providers and techniques for your needs.

  • Automotive cybersecurity 101: Identify the common attack surfaces for your products and identify the key risks you need to address
  • With so many companies out there offering a “complete solution”, understand who is doing what so you can approach the right partners
  • Learn the latest trends and technology, such as in-vehicle monitoring & silicon security, so that you can prepare for next gen roll-out
11:30am - 12:00pm 30 mins
Keeping the Autonomous Car Safe & Secure
  • Speaker Joseph Buck - Product Cybersecurity Autonomous Vehicle Urban Active Platforms, General Motors
  • Moderator Greg Basich - Senior Analyst - AMCS, Strategy Analytics
more

The autonomous car’s prime purpose is to increase safety. But how can we ensure the vehicle itself is safe from cyber threats?

  • Identify what new attack vectors and threats, e.g. altering vehicle intent, can be targeted by hackers on AVs so that you can secure vulnerable systems
  • Consider the requirements of cybersecurity in a variety of system layouts e.g. integrated network and centralized processor, to establish what layout offers the most secure architecture
  • With more autonomy comes more connectivity! Consider how to scale up your cyber security through additional defensive layers to keep the connected AV secure
12:00pm - 12:30pm 30 mins
Build Your Auto Security A Team
  • Speaker Barbara Ciaramitaro - Professor, Information Technology and Cybersecurity, Director, Center for Cybersecurity, Walsh College
more

Automotive cybersecurity presents a security paradigm that is very different from IT security, and we desperately need experts! Harness cross-discipline skill-sets to develop an effective cyber task force!

  • Combine engineering, IT, cybersecurity & academic expertise to meet the auto security challenge head-on. Do not let an over reliance on proprietary knowledge hinder the identification of vulnerabilities .
  • Understand the unique issues of cyber-physical systems versus traditional IT and cybersecurity; including real-time detection & response, the merging of hardware & software, & updatability problems.
  • Use new tools such as a move from “use case” to “abuse case”; adapt the functionality-oriented engineering design process to include cybersecurity threat analysis.
12:30pm - 2:00pm 90 mins
Lunch Break
2:00pm - 2:30pm 30 mins
Auto-ISAC: Sharing is Caring!
  • Speaker Faye Francy - Executive Director, Auto-ISAC
more

With cybersecurity, openness can actually be more secure than keeping issues secret. Learn why it’s essential to share security & safety information.

  • Learn what good information sharing looks like v bad information sharing
  • Understand the ways that the industry builds on learning from sharing, and how this has evolved since the Auto-ISAC has founded. What can we learn from other industry ISACs?
  • Map out the industry stakeholders who should be involved in the Auto-ISAC, with automakers, tier 1’s and suppliers involved, how far should it reach into the ecosystem?
2:30pm - 3:00pm 30 mins
Security and the Supply Chain
more

An increasing need for cybersecurity is already having an impact on automotive supply chain relationships and management. Understand the key implications and measures to be taken.

  • Explore the issues for implementing cybersecurity across partners, including overcoming the security limitations of changing contracts and encouraging more effective collaboration
  • Constant Vigilance! Assess the need to reintroduce quality assessments that include the security element, such as Supplier Quality Management (SQM) and Quality Assurance (QA)
  • Look beyond cyber to the different levels of hacks and identify the processes that can analyze what went wrong at different stages e.g. when a malicious code was introduced
3:00pm - 3:30pm 30 mins
Collaborating on Standards & Best Practices
  • Speaker Todd Lawless - Automotive Cyber Security Specialist, Continental
more

The industry is learning that no one company can solve cybersecurity; with such an intertwined supply chain & global implications if something goes wrong, collaborate to deliver safe & secure vehicles.

  • From the Auto-ISAC to the SAE/ISO working group to government legislation, get to grips with who is working on what so you can anticipate new measures & requirements
  • Identify where the industry can build best practices and processes, such as vulnerability disclosure programs, data sharing, & risk management, to create a unified approach
  • Take cue from other industries that have already addressed/are addressing these issues, such as aerospace, automated manufacturing, & shipping, to accelerate industry progress
3:30pm - 4:10pm 40 mins
Afternoon Coffee & Networking Break
more
4:10pm - 4:40pm 30 mins
Presentation from Green Hills Software
more

More information coming soon

4:40pm - 5:10pm 30 mins
Enabling New Connected Services and Experiences through Cybersecurity
  • Speaker Stacy Janes - Chief Security Architect, Irdeto
more

More information coming soon.

5:10pm - 5:40pm 30 mins
Session TBA
5:40pm - 7:10pm 90 mins
Evening Networking Drinks Reception
Showing of Streams
10:20am - 11:00am

Morning Coffee & Networking Break

more
Showing of Streams
12:30pm - 2:00pm

Lunch Break

Showing of Streams
3:30pm - 4:10pm

Afternoon Coffee & Networking Break

more
Showing of Streams
5:40pm - 7:10pm

Evening Networking Drinks Reception