Cybersecurity From a Tier 1 s Perspective. Christopher A Lupini Director, Cybersecurity Engineering Delphi Automotive Systems September 16 th 2015

Size: px
Start display at page:

Download "Cybersecurity From a Tier 1 s Perspective. Christopher A Lupini Director, Cybersecurity Engineering Delphi Automotive Systems September 16 th 2015"

Transcription

1 Cybersecurity From a Tier 1 s Perspective Christopher A Lupini Director, Cybersecurity Engineering Delphi Automotive Systems September 16 th 2015

2 Megatrends Drive Our Technology Portfolio Safe Green Connected Active Safety systems Vehicle-to-Vehicle communication Automated driving Driver state monitoring Occupant classification systems Gasoline and diesel fuel injection systems Engine management system controllers Hybrid & electric vehicle technologies Infotainment Rear seat entertainment Integrated center stack Driver interface systems Connected vehicle infrastructure Security is a priority for components with software communication 2 Cybersecurity Engineering

3 Essential Elements of Automated Driving Sensors and Perception 3 Functional Safety and Security

4 Future Automated Driving Infrastructure Cloud Cloud Vehicle Share Request Vehicle from parking request Cloud From - vehicle data To infotainment (map, traffic, entertainment), ADAS (roadway \topology, dynamic zones) Cloud Cloud Traffic Lights with vision V2V Low speed Autonomous vehicles Share request Dynamic Signs Speed changes, Lane changes Traffic Signs with vision 4

5 Connected Eco-System Infotainment Map Traffic Entertainment ADAS Topology Dynamic Zones Personal Device Back-end Server Vehicle Data Speed Position Location Diagnostics Etc. Vehicle-to-Infrastructure (V2I) Vehicle-to-Vehicle (V2V) Vehicle Data Parking info Signage Etc.. Vehicle Data Acceleration Status Warnings Position 5

6 Potential Automated Driving Players Data Centers: IBM, SAP, Microsoft, Oracle, Amazon, Google, Salesforce, Yahoo, Teradata, Cisco Network (Short Range): Cisco, Arada, Savari, NXP, Qualcomm, Coda Vehicle Sharing: Google/Uber, Zipcar, Lyft Security: McAfee, Symantec [+datacenters] Maps: Google, Navteq. Nokia, Apple, TomTom, Garmin Vehicle Systems: Delphi and others Cellular infrastructure: AT&T, Verizon, Sprint, T-mobile, etc 6

7 Exponentially increasing security sphere OEM Suppliers ITS Operator OBD DSRC 4G LTE Public Clouds Service Provider 7

8 What can go wrong? Why need Cybersecurity? There is no safety without security 8 Cybersecurity Engineering

9 9 Example Attack Vectors

10 What Needs To Be Addressed? Scope of Problem Prevent unauthorized personnel from taking control of in-vehicle electronic systems via wireless or wired means. Related Areas Security of mobile media information such as copyrighted video and audio being used in the car. Security of in-vehicle parameters such as engine calibrations, odometer, etc. Accuracy and validity of in-vehicle parameters such as vehicle speed. Will involve Functional Safety ISO Integrity of emission-control systems Detection of counterfeit ECUs Heightened Threats Personal Device Integration Telematics Cloud Access V2X Automated Driving IoT car may not be the primary target 10 10

11 Why Cybersecurity Matters Senator Edward Markey letter December 2013 Sent to twenty automakers demanding answers to a long list of questions about their automobiles potential vulnerability to hacking. Answers trickled in during the next year Breach of OPM (Office of Personnel Management) OPM is the HR system of the US Government with records of security clearances Hackers stole over 20M current and former federal employees data. Target Breach Hackers breached Target and stole over 40M customers data including credit cards, names, mailing addresses, phone numbers, etc. Target offers $10M to settle a class-action lawsuit And the list goes on for most recent breaches 11 11

12 Why Cybersecurity Matters (cont.) In his report, Senator Markey (D-MA) highlighted the following 8 key findings: Nearly 100% of cars on the market include wireless technologies that could pose vulnerabilities to hacking or privacy intrusions. Most OEMs were unaware of or unable to report on past hacking incidents. Security measures to prevent remote access to vehicle electronics are inconsistent and haphazard across all OEMs, and many manufacturers did not seem to understand the questions posed by Senator Markey. Only two OEMs were able to describe any capabilities to diagnose or meaningfully respond to an infiltration in real-time, and most say they rely on technologies that cannot be used for this purpose at all. OEMs collect large amounts of data on driving history and vehicle performance. A majority of automakers offer technologies that collect and wirelessly transmit driving history data to data centers, including third-party data centers, and most do not describe effective means to secure the data. Manufacturers use personal vehicle data in various ways, often vaguely to improve the customer experience and usually involving third parties, and retention policies how long they store information about drivers vary considerably among manufacturers. Customers are often not explicitly made aware of data collection and, when they are, they often cannot opt out without disabling valuable features, such as navigation. 12 (February 11, 2015) 12

13 Why Cybersecurity Matters (cont.) S SPY Car Act of Introduced 07/21/2015 National Highway Traffic Safety Administration (NHTSA) to issue motor vehicle cybersecurity regulations Require motor vehicles manufactured for sale in the United States to protect against unauthorized access to: (1) electronic controls or driving data, including information about the vehicle's location, speed, owner, driver, or passengers; or (2) driving data collected by electronic systems built into a vehicle 13 13

14 IT s Role in Vehicle cybersecurity Close partnership with Delphi Information Security Information Technology Key Management Infrastructure DTCP, HDCP, V2X, future encryption key/certificate support Cybersecurity Awareness Program Secure Coding Guidelines Vulnerability Definitions for Engineers Cybersecurity Incident Response Program Proper communication channels for Engineering or IT related vulnerability Public website for OEMs, Tier 1s, Hackers/Security Researchers to reach out through. 14

15 Cybersecurity Lessons Learned Align Engineering with IT Tier 1 Supplier has a different view than OEMs We can sell solutions on their own or as de-facto standards Tier 1 customers include agriculture, construction, etc. 15 Cybersecurity protection points available: Cloud/cell/Bluetooth CAN/LIN/FR/MOST bus (gateway or router; intrusion detection) Smart chip Secure hardware module onboard microcontroller Atomic level Collaboration with suppliers and customers: Training Consulting Standards 15

16 Delphi s Cybersecurity Approach Vision Enable a safe and secure vehicle experience through the identification and mitigation of cybersecurity risks for Delphi products Mission Key partnerships Enhance Delphi s reputation as a leader in the development of safe and secure vehicle systems Develop secured hardware and software products in collaboration with our customers and suppliers Establish cybersecurity requirements and incorporate into Product Development Process (PDP) Collaborate with OEMs, silicon providers and industry experts to develop relevant solutions Research new techniques through cross-industry information sharing Cooperate with national and international organizations on regulations and design standards Focused on a high-security driving experience 16 Cybersecurity Engineering

17 Delphi Cybersecurity Organization Glen De Vos VP, Engineering Michael Groene Director, Global Software Engineering John Bingham Chief Information Security Officer Mary Gustanski VP, Engineering & Program Management Harry Husted Chris Lupini Ron Szabo Rob Seidler Powertrain Director, Cybersecurity E&S E/EA Technical Lead, Engineering Technical Lead, Process & Tools Cybersecurity Lab, Manager IDI, Functional Security Manager EC, Functional Security Manager PT, Functional Security Manager 17 Cybersecurity Engineering

18 Academia & Industry Activities Software and Security Engineering Research Center Coordinates applied and basic research on software and system security 13 participating universities Academic involvement University of Michigan Transportation Research Institute Industry involvement SAE Cybersecurity Committee member Consult on all aspects of transportation cybersecurity and privacy Cybersecurity Test Lab evaluates cybersecurity solutions Future member of IT Information Sharing and Analysis Center (IT-ISAC) SAE Battelle Cyber Auto Challenge host Aligned with industry and academic initiatives 18 Cybersecurity Engineering

19 OEM Cybersecurity Strategy Partnering with key OEMs to identify best approach for cybersecurity protection for current product launches Protection methods Communication paths secured with controller-level protection Gateway provides vehicle and/or product-level protection Example OEM partnerships 19 Cybersecurity Engineering

20 Cybersecurity Guidelines and Actions Delphi s cybersecurity strategy centered on core principles Prepare React Design Align Deploy Develop cybersecurity awareness program Align with Delphi Information and Security organization Create cybersecurity incident response program Design to engineering guidelines with OEM collaboration Deploy according to global Delphi processes Structured approach to cybersecurity 20 Cybersecurity Engineering

Connected and Automated Vehicles and the Cybersecurity Threat

Connected and Automated Vehicles and the Cybersecurity Threat Connected and Automated Vehicles and the Cybersecurity Threat How the Industry is Responding Dr Andrew Brown, Jr, PE, FESD, FSAE, NAE Vice President & Chief Technologist CAR Breakfast Briefing Series February

More information

Cybersecurity And The Automotive Industry

Cybersecurity And The Automotive Industry Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014

More information

The relevance of cyber-security to functional safety of connected and automated vehicles

The relevance of cyber-security to functional safety of connected and automated vehicles The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction

More information

Paradigm shift in insurance policies

Paradigm shift in insurance policies Athens, April 2016 Paradigm shift in insurance policies ADAPTIVE technical workshop Agenda Driverless cars & need for insurance Shift of Motor Insurance model Motor liability Product Liability Data ownership

More information

CONNECTED CARS A RISING TREND IN THE GLOBAL AUTOMOBILE SECTOR. Thematic Report by Jay Thakker Senior Research Analyst. www.aranca.

CONNECTED CARS A RISING TREND IN THE GLOBAL AUTOMOBILE SECTOR. Thematic Report by Jay Thakker Senior Research Analyst. www.aranca. www.aranca.com CONNECTED CARS A RISING TREND IN THE GLOBAL AUTOMOBILE SECTOR Thematic Report by Jay Thakker Senior Research Analyst Image Source: ExtremeTech.com TECHNOLOGICAL ADVANCEMENTS TO SET NEW TRENDS

More information

Capitalizing on The Internet of Things

Capitalizing on The Internet of Things Capitalizing on The Internet of Things March 2016 Capitalizing on The Internet of Things Table of Contents Executive summary... 2 Transforming from a product business into a service business... 2 The core

More information

Frost & Sullivan Cybersecurity Presentation

Frost & Sullivan Cybersecurity Presentation Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Authors: Dr. Joerg Borchert, VP of Chip Card and Security ICs, Infineon North America Shawn Slusser, VP of Automotive,

More information

Connected Transport. Steve Brown SVP Telematics. 29 October 2015

Connected Transport. Steve Brown SVP Telematics. 29 October 2015 Connected Transport Steve Brown SVP Telematics 29 October 2015 Driving Greater Safety, Efficiency and Mobility EIoT along with socio-economic factors and policy are transforming the transportation industry

More information

Secure software updates for ITS communications devices

Secure software updates for ITS communications devices Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,

More information

Telematics Workshop: Remote 2-Way Communication Meeting Results

Telematics Workshop: Remote 2-Way Communication Meeting Results March 31, 2016 Telematics Workshop: Remote 2-Way Communication Meeting Results ASAM Members and Non-Members primarily from the North American On-Road/Off-Road Commercial Vehicle Market met to discuss the

More information

Automotive and Industrial Data Security

Automotive and Industrial Data Security André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication

More information

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned

More information

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE October 19, 2015 To: Members, Subcommittee on Commerce, Manufacturing, and Trade From: Committee Majority Staff Re: Hearing entitled Examining

More information

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Authors(s): Arthur Carter, David Freeman, and Cem Hatipoglu National Highway Traffic Safety Administration (NHTSA) Paper

More information

Information Technology in the Automotive Aftermarket

Information Technology in the Automotive Aftermarket Information Technology in the Automotive Aftermarket March 2015 AASA Thought Leadership: The following white paper consists of key takeaways from three AASA surveys conducted in 2014, which focused on

More information

VEHICLE CYBERSECURITY. DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Realworld

VEHICLE CYBERSECURITY. DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Realworld United States Government Accountability Office Report to Congressional Requesters March 2016 VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding

More information

Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk

Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk Analysis of automobile manufacturers efforts reveals security and privacy gaps Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk February 2015 www.markey.senate.gov EXECUTIVE SUMMARY

More information

PEMS Conference. Acquiring Data from In-Vehicle Networks. Rick Walter, P.E. HEM Data Corporation

PEMS Conference. Acquiring Data from In-Vehicle Networks. Rick Walter, P.E. HEM Data Corporation PEMS Conference Acquiring Data from In-Vehicle Networks Rick Walter, P.E. HEM Data Corporation Acquiring Data from In-Vehicle Networks Topics Overview/Benefits Heavy Duty J1939 protocol Available J1939

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

The Vision of Vehicle Infrastructure Integration (VII)

The Vision of Vehicle Infrastructure Integration (VII) The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts

More information

The Internet of Things (IoT)

The Internet of Things (IoT) The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities

More information

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure

More information

In the past 30 years, the motor vehicle has

In the past 30 years, the motor vehicle has 2. The Auto Industry Transformation: Dimensions of Change In the past 30 years, the motor vehicle has undergone a remarkable evolution. The personal passenger vehicle is now the most high-tech purchase

More information

Hybrid System for Driver Assistance

Hybrid System for Driver Assistance International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1583-1587 International Research Publications House http://www. irphouse.com Hybrid System

More information

In-Vehicle Infotainment. A View of the European Marketplace

In-Vehicle Infotainment. A View of the European Marketplace In-Vehicle Infotainment A View of the European Marketplace In-Vehicle Infotainment: A View of the European Marketplace A number of trends are impacting the automotive industry, creating fertile ground

More information

Automotive Software Development Challenges Virtualisation and Embedded Security

Automotive Software Development Challenges Virtualisation and Embedded Security Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive

More information

Improving Driving Safety Through Automation

Improving Driving Safety Through Automation Improving Driving Safety Through Automation Congressional Robotics Caucus John Maddox National Highway Traffic Safety Administration July 25, 2012 NHTSA s Missions Safety Save lives, prevent injuries and

More information

TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT

TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT Go beyond error detection to ensure safety and security TABLE OF CONTENTS The Three Biggest Challenges...4 Ensure compliance

More information

Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles

Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles SAE INTERNATIONAL Advanced Safety Standards & Resources Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications Helping industry engineer safe vehicles Driver Vehicle Interface,

More information

Continental, A*STAR s Institute for Infocomm Research (I²R) & TUM CREATE collaborate in an Intelligent Transport Systems (ITS) Lab

Continental, A*STAR s Institute for Infocomm Research (I²R) & TUM CREATE collaborate in an Intelligent Transport Systems (ITS) Lab - 1 - Continental, A*STAR s Institute for Infocomm Research (I²R) & TUM CREATE collaborate in an Intelligent Transport Systems (ITS) Lab MOU to set up first tri-party ITS collaboration to research, study

More information

Evolution of Connected Vehicle Ecosystem

Evolution of Connected Vehicle Ecosystem SAE Symposium: Intelligent Vehicle Systems Advancing the Connected Mobility Experience November 8-9, 2011 Troy Marriott, Troy MI Evolution of Connected Vehicle Ecosystem Partha Goswami Technology Manager

More information

Detroit Regional Chamber

Detroit Regional Chamber Detroit Regional Chamber Maureen Krauss Vice President, Economic Development Email: mkrauss@detroitchamber.com Detroit Regional Chamber Overview The Detroit Regional Chamber is the premier business development

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Driving cybersecurity advances in an interconnected world Key findings from The Global State of Information Security Survey 2015

Driving cybersecurity advances in an interconnected world Key findings from The Global State of Information Security Survey 2015 Driving cybersecurity advances in an interconnected world Key findings from The Global State of Information Security Survey 2015 Technology advances like telematics, networked manufacturing tools, and

More information

Acquisition of Novero. Investor presentation 18th December 2015

Acquisition of Novero. Investor presentation 18th December 2015 Acquisition of Novero Investor presentation 18th December 2015 What Novero brings to Laird The acquisition of Novero and LSR rebalances our business, Wireless Systems will now be of a similar scale to

More information

Automotive Suppliers and Cybersecurity

Automotive Suppliers and Cybersecurity Automotive Suppliers and Cybersecurity OEMs sometimes specify their security requirements in an incomplete or vague way, but that certainly doesn t mean that Tier 1 automotive suppliers (Tier 1s) should

More information

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved. Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S

More information

Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research

Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research Connected Vehicles as things on the Internet big data, the cloud, and advanced automotive research Clark Gaylord Chief Information Officer Virginia Tech Transportation Institute cgaylord@vt.edu Bingo card

More information

Connected Vehicle Insurance

Connected Vehicle Insurance Connected Vehicle Insurance The Business of Preventing Crashes Authors Andreas Mai Dirk Schlesinger April 2011 Cisco Internet Business Solutions Group (IBSG) Cisco IBSG 2011 Cisco and/or its affiliates.

More information

Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL

Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL Digital Topic Area Theaters May 17-19, 2016 Orlando, FL Session ID Title Abstract Time and Location DB34027 Exploit Business Benefit Cases to Accelerate and Improve Processes DB34011* DB34008 DB34051*

More information

THE CONNECTED CAR: A Value Chain in Flux

THE CONNECTED CAR: A Value Chain in Flux THE CONNECTED CAR: A Value Chain in Flux A Parks Associates Whitepaper THE CONNECTED CAR: A Value Chain in Flux CONNECTED CAR SERVICES AND TECHNOLOGY HAVE ADVANCED SIGNIFICANTLY IN THE PAST TWO YEARS.

More information

STATEMENT THE ALLIANCE OF AUTOMOBILE MANUFACTURERS APRIL 14, 2016 PRESENTED BY:

STATEMENT THE ALLIANCE OF AUTOMOBILE MANUFACTURERS APRIL 14, 2016 PRESENTED BY: STATEMENT OF THE ALLIANCE OF AUTOMOBILE MANUFACTURERS BEFORE THE: THE HOUSE ENERGY AND COMMERCE SUBCOMMITTEE ON COMMERCE, MANUFACTURING AND TRADE APRIL 14, 2016 PRESENTED BY: MITCH BAINWOL PRESIDENT AND

More information

Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings!

Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings! Eric Collins Connected Holdings Market Makers: Accelerate Your IoT Business with Connected Holdings! Connected Holdings Heritage: 2006 2009 2011 2012 2013 2014 Founded with Design Services Business Model

More information

SMART TRANSPORT KEEPING STUDENTS CONNECTED AND SAFE WITH THE SMART SCHOOL BUS

SMART TRANSPORT KEEPING STUDENTS CONNECTED AND SAFE WITH THE SMART SCHOOL BUS Practical thinking for a connected world. SMART TRANSPORT KEEPING STUDENTS CONNECTED AND SAFE WITH THE SMART SCHOOL BUS PRACTICAL THINKING FOR A TRULY CONNECTED WORLD We have an unprecedented opportunity

More information

V2X Next Steps. April 22, 2014. John Maddox

V2X Next Steps. April 22, 2014. John Maddox V2X Next Steps April 22, 2014 John Maddox 3 Key Next Steps: Ready deployment for V2V and V2I Increase focus on V2M and V2P Test smart phones as nomadic seed devices Michigan Initial Deployment Michigan

More information

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.

More information

Internet of Things Connected cars: risks and opportunities

Internet of Things Connected cars: risks and opportunities Internet of Things Connected cars: risks and opportunities Giulio Coraggio, DLA Piper, Milan Elliot Katz, DLA Piper, San Francisco Alan Prescott, Ford Motor Company Jan-Hinnerk Mohr, Boston Consulting

More information

Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology

Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology Michael R. Nelson Kymberly Kochis October 13, 2015 Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology INSURANCE AND FINANCIAL SERVICES LITIGATION WEBINAR SERIES

More information

Cyber-Security in the Connected Car Age

Cyber-Security in the Connected Car Age IHS AUTOMOTIVE Presentation Cyber- in the Connected Car Age GENIVI Conference Seoul, October 21, 2015 ihs.com Egil Juliussen, Director Research & Principal Analyst +1 630 432 1304, egil.juliussen@ihs.com

More information

Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle. White Paper

Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle. White Paper Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle White Paper Published February 2015 Copyright 1999-2015 Redbend. All Rights Reserved. This Software

More information

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since

More information

Keeping Up with the Data & Security Demands of the Automotive IoT

Keeping Up with the Data & Security Demands of the Automotive IoT Keeping Up with the Data & Security Demands of the Automotive IoT AESIN 2015 Robert Moran Automotive Systems Engineering O C T O B E R 2 0 1 5 External Use Keeping Up with the Data & Security Demands of

More information

Introduction CHAPTER 1

Introduction CHAPTER 1 CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by

More information

Improving Fuel economy and CO 2 Through The Application of V2I and V2V Communications

Improving Fuel economy and CO 2 Through The Application of V2I and V2V Communications Ricardo 1 Improving Fuel economy and CO 2 Through The Application of V2I and V2V Communications Making Connected Vehicles Happen Karina Morley August 4, 2009 2 Background and Market Drivers There Are Three

More information

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 10:30 AM 12:00 PM AM01: Sustainable Transportation Performance Measures: Best Practices September 8th 10:30 AM

More information

Program Automotive Security and Privacy

Program Automotive Security and Privacy Program Automotive Security and Privacy FFI Board Funded Program 2015 10 02 Abstract This document describes the FFI board funded program Automotive Security and Privacy. This document is prepared by the

More information

Channels of Delivery of Travel Information (Static and Dynamic On-Trip Information)

Channels of Delivery of Travel Information (Static and Dynamic On-Trip Information) Channels of Delivery of Travel Information (Static and Dynamic On-Trip Information) Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation

More information

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things White Paper Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things Connect things. Analyze and act on the data they produce in milliseconds. Then send the right data to the cloud for

More information

Microsoft in Automotive and the Future of Connected Vehicle Consumer Experiences

Microsoft in Automotive and the Future of Connected Vehicle Consumer Experiences Microsoft in Automotive and the Future of Connected Vehicle Consumer Experiences John Mullinax Market Development Manager Automotive Industry john.mullinax@microsoft.com Microsoft in Automotive Microsoft

More information

December 2013 Copyright 2013 GSM Association

December 2013 Copyright 2013 GSM Association The Embedded SIM Whitepaper December 2013 Copyright 2013 GSM Association Abstract In the future, everyone and everything around us that might benefit from a wireless connection will, in fact, have one.

More information

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems November 2014 1 Contents Executive Summary... 2 Introduction... 3 The Undeniable Value of Data... 3 The Smart Car as a Communications Hub...

More information

House Commerce, Manufacturing and Trade Subcommittee

House Commerce, Manufacturing and Trade Subcommittee WRITTEN STATEMENT OF PETER K. WELCH, PRESIDENT NATIONAL AUTOMOBILE DEALERS ASSOCIATION before the House Commerce, Manufacturing and Trade Subcommittee of the House Energy and Commerce Committee a hearing

More information

Cloud and the Car - Use Cases, Business Models, and Impact Analysis

Cloud and the Car - Use Cases, Business Models, and Impact Analysis Brochure More information from http://www.researchandmarkets.com/reports/3420812/ Cloud and the Car - Use Cases, Business Models, and Impact Analysis Description: The research service discusses the key

More information

Car Connections. Johan Lukkien. System Architecture and Networking

Car Connections. Johan Lukkien. System Architecture and Networking Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Integrated Engineering Solutions

Integrated Engineering Solutions Integrated Engineering Solutions Karthikeyan Natarajan & Prashant Kamat November 2014 1 Integrated Engineering Solutions: An Introduction AUTOMOTIVE Tie-up with 8 OEMs and 10 Tier-1 majors AEROSPACE &

More information

HCL in the Automotive Industry

HCL in the Automotive Industry HCL in the Automotive Industry Solutions for Advanced Passenger Experience UNDERSTANDING THE INDUSTRY Market trends: volatile raw material costs and fuel prices; falling demand; tighter emission regulations;

More information

Smart Systems: the key enabling technology for future IoT

Smart Systems: the key enabling technology for future IoT Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS

FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS SMG 1117.2111 FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS OFFICE OF INFORMATION MANAGEMENT AND TECHNOLOGY OFFICE OF INFORMATION MANAGEMENT

More information

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute 1 Executive Summary The Ponemon Institute recently conducted a cybersecurity

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Mentor Embedded Automotive Solutions

Mentor Embedded Automotive Solutions Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark

More information

Connected Intelligence and the 21 st Century Digital Enterprise

Connected Intelligence and the 21 st Century Digital Enterprise Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,

More information

Ahead of the Curve with Intelligent. Transportation

Ahead of the Curve with Intelligent. Transportation Ahead of the Curve with Intelligent Transportation Advanced technologies to ensure the safe, efficient, and secure movement of passengers and freight. Intelligent transportation is changing the way America

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform. Pusik Park. Korea Electronics Technology Institute

For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform. Pusik Park. Korea Electronics Technology Institute For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform Pusik Park Korea Electronics Technology Institute Agenda Trend Introduction of the project Key missions 2 Trend Open

More information

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

Mitigating Bring Your Own Device (BYOD) Risk for Organisations Mitigating Bring Your Own Device (BYOD) Risk for Organisations Harness the benefits and mitigate the risks of BYOD espiongroup.com Executive Summary Mobile devices such as smart phones, tablets, or laptops

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Exploring the Connected Car

Exploring the Connected Car Cognizant 20-20 Insights Exploring the Connected Car Emerging technologies and industry ecosystems are enabling automotive makers to deliver an immersive information experience that transcends the boundaries

More information

Updating Car ECUs Over-The-Air (FOTA) White Paper

Updating Car ECUs Over-The-Air (FOTA) White Paper Updating Car ECUs Over-The-Air (FOTA) ABSTRACT As the amount of software in automobiles grows, so too does the need to effectively manage that software asset. The telecom industry has a proven solution

More information

Testing the Internet of Things

Testing the Internet of Things Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of

More information

2015 Transit Safety Summit

2015 Transit Safety Summit 2015 Transit Safety Summit Cybersecurity In Transit Vulnerable Systems APTA Enterprise Cyber Security WG update Cyber attacks may be targeted toward one or more of the *system layers that Transit agencies

More information

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

Rationale for a Cloud Services Framework

Rationale for a Cloud Services Framework Rationale for a Cloud Services Framework AIIA response to Draft Paper for Consultation January 2015 T 61 2 6281 9400 E W info@aiia.com.au www.aiia.comau About AIIA The Australian Information Industry Association

More information

SmartTrac Stability Control Systems

SmartTrac Stability Control Systems Innovation That Delivers SmartTrac Stability Control Systems safety SmartTrac brings stability to your vehicles and your bottom line. Meritor WABCO is a recognized pioneer in delivering advanced stability

More information

Vehicles in the Cloud: Using Online Services to Improve Safety and Functionality in the Automotive Industry

Vehicles in the Cloud: Using Online Services to Improve Safety and Functionality in the Automotive Industry Vehicles in the Cloud: Using Online Services to Improve Safety and Functionality in the Automotive Industry Far from being pie in the sky, the cloud is already the foundation of hundreds of breakthrough

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Dr. Brian Murray March 4, 2011

Dr. Brian Murray March 4, 2011 Event that could lead to an accident GM Autonomy HAZARD 1 Q=6e-7 Event that could lead to a hazard Control to prevent HAZARDOUS EVENT 1 HAZARDOUS EVENT 1 HAZARD CONTROL 1 r=6e-008 Q=0.0006 Q=0.001 Q=0.001

More information

Perspectives on In-Vehicle Infotainment Systems and Telematics

Perspectives on In-Vehicle Infotainment Systems and Telematics Perspectives on In-Vehicle Infotainment Systems and Telematics How will they figure in consumers vehicle buying decisions? 2 Key trends shaping the automotive landscape What are the most important trends

More information

INTRODUCTION. IoT AND IP STRATEGIES

INTRODUCTION. IoT AND IP STRATEGIES INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic

More information

Effective Information Sharing and Analysis Process

Effective Information Sharing and Analysis Process Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting

More information

In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that. plays a key role. J1939 networks are based on the CAN bus (high-speed

In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that. plays a key role. J1939 networks are based on the CAN bus (high-speed Networking Heavy-Duty Vehicles Based on SAE J1939 From Parameter Group to plug-and-play Application In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that plays a key role. J1939 networks

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information