AI in Automotive Cybersecurity | Three Day Agenda

Day One | March 19, 2024

8:00 am - 9:00 am REGISTRATION & REFRESHMENTS

9:00 am - 9:05 am AUTOMOTIVE IQ WELCOME

9:05 am - 9:15 am CHAIRPERSON’S OPENING REMARKS

9:15 am - 10:30 am R155 COMPLIANCE – OEM CASE STUDY & DISCUSSION GROUPS | FIND OUT HOW R155 AFFECTED THE OEM & MEASURES THAT WERE TAKEN TO COMPLY WITH IT

o  Learn how metrics were established around implementation of R155.

o  Find out the exact process that was adopted to achieve compliance.

o  How did the OEM prove that they were compliant?

o  Gain clarity on what challenges to expect on the road to R155 compliance and what measures to adopt to mitigate them. 

10:30 am - 11:15 am MORNING REFRESHMENT BREAK

11:15 am - 12:00 pm PREPARE FOR R156 TYPE APPROVAL | PRESENTATION & PANEL SHOWING HOW TO EFFECTIVELY IMPLEMENT SUMS AND COMPLY WITH R156

As a vehicle manufacture are providing software updates to vehicles, you need to comply with the UN R156 and establish a SUMS to sell vehicles in UNECE member states. This presentation will demonstrate how to cost effectively implement a SUMS and prepare for UN R156 type approval. 

12:00 pm - 1:00 pm NETWORKING LUNCH BREAK

1:00 pm - 1:40 pm PANEL | FACTUAL INSIGHT ON THE ACTUAL THREAT LANDSCAPE: WHAT ARE THE ACTUAL SECURITY CONCERNS AND WHAT SHOULD OEMS DEFEND AGAINST

1:40 pm - 2:10 pm PRESENTATION | WHICH SECURITY FEATURES ARE MUST-HAVES FOR CONNECTED VEHICLES IN THE FUTURE

2:10 pm - 2:50 pm US LEGISLATIVE UPDATE FOR DATA PRIVACY | BRIEFING ON WHAT IS THE CURRENT LANDSCAPE, WHERE IT’S GOING AND HOW IS IT EXPECTED TO CHANGE?

2:40 pm - 3:00 pm AFTERNOON BREAK

3:00 pm - 3:40 pm HOW TO ENSURE THAT CONNECTED VEHICLE DATA REMAINS PRIVATE | PRESENTATION ON STEPS TO MITIGATE LIABILITY WHEN OCCUPANTS CONNECT DEVICES TO CARS

3:40 pm - 4:10 pm FOCUS ON AI TOOLS | UNDERSTAND HOW AI TOOLS CAN BE USED TO DEVELOP RELIABLE, HIGHER QUALITY SOLUTIONS, FIX SECURITY & QUALITY ISSUES & DEVELOP SOFTWARE

4:30 pm - 4:30 pm CHAIRPERSON’S CLOSING REMARKS & END OF DAY ONE

4:30 pm - 6:00 pm START OF VIP RECEPTIONS

Day Two | March 20, 2024

7:30 am - 7:45 am REGISTRATION & REFRESHMENTS

7:45 am - 8:45 am WOMEN IN AUTOMOTIVE BREAKFAST | EVERYONE’S INVITED!

8:45 am - 8:50 am AUTOMOTIVE IQ WELCOME

8:50 am - 9:00 am CHAIRPERSON’S OPENING REMARKS

9:00 am - 9:40 am WHAT IS AND IS NOT POSSIBLE WITH AI & THE IMPACT OF ARTIFICIAL INTELLIGENCE IN THE AUTOMOTIVE INDUSTRY | QUANTIFY HOW SECURITY IN AUTOMOTIVE WILL BE IMPACTED BY AI

Where the industry is right here, right now, there is a lot of fear, uncertainty, doubt surrounding AI. Everybody wants to understand a little better, what is and is not possible with AI, and how security in the automotive industry will be impacted by AI.

 

This presentation will set the tone for the AI focused stream, with an AI expert sharing insights on:

 

o  What is the latest and greatest AI technology out there.

o  Recent developments in AI security for EV and autonomous driving applications.

o  What are automotive industry professionals using AI for and what are their biggest security concerns around it.

o  Pitfalls of using AI.

o  What security and privacy issues should companies look out for when using AI, and which AI tools can help mitigate security issues. 

9:40 am - 10:10 am HOW CAN AUTOMOTIVE COMPANIES PREPARE FOR AI IN THE CYBERSECURITY SPACE | PANEL DISCUSSION

o  Find out what OEMs see as the biggest threats with AI in the vehicle.

o  What can be done from a design point of view to mitigate these threats, including employing AI within embedded ECUs to look for threats or some analytics.

o  Establishing what suppliers can do help OEMs protect against threats and vulnerabilities. 

10:10 am - 11:00 am MORNING REFRESHMENT BREAK

11:00 am - 11:40 am PIONEERING RISK MANAGEMENT AND AI IN VEHICLE SECURITY

11:40 am - 12:20 pm HOW GENERATIVE AI IS GOING TO ASSIST HACKERS & HOW TO USE GEN AI TOOLS TO MITIGATE THESE SECURITY ISSUES

o  How can Gen AI give hackers another set of tools that speed up hacking and elevate their maturity levels.

o  How can Gen AI tools help automotive companies to mitigate security issues.

o  Sharing if any real-world issues have been experienced where hackers have used Gen AI and affected automotive modules. 

12:20 pm - 12:30 pm LET’S GET INPUT FROM AI TOOL & SOLUTION PROVIDERS | HOW CAN VENDORS HELP PROTECT AGAINST AI SECURITY THREATS

12:30 pm - 1:00 pm QUANTUM COMPUTING: WHAT WILL THIS TRANSITION LOOK LIKE & HOW CAN WE PREPARE FOR IT? ACTION YOU NEED TO TAKE TO FULFIL THE SECURITY PROTECTION NEEDS

Quantum Computing is something that's at the cusp right now; and the industry as whole needs to start having conversations around threats that exist in the environment today. The transition from here to where we need to be with new algorithms and with post quantum threat is going to require a tactical approach.

 

o  Understand when quantum computing is coming and what we need to do now/in six months/and in 18 months to prepare for this change.

o  Keep an eye on when elliptical algorithms are going to be not useful anymore.

o  Understand when companies will need to start thinking about implementing a new crypto algorithm.

o  Learn how the industry can protect against these cybersecurity risks and the extent of this threat on encryption methods.

1:00 pm - 2:00 pm LUNCH BREAK & WALKTHROUGH WITH EXHIBITORS

2:00 pm - 2:40 pm MACHINE LEARNING & CYBERSECURITY | FIRESIDE CHAT

This fireside chat will see a distinguished guest speaker handling and answering some of your most asked questions, including:

 

o  How does machine learning work and how can it be manipulated?

o  Why is it challenging to know what a machine learning algorithm is going to do?

o  How does ML affect security and how can we ensure this security is maintained after vehicle assault.

o  How do you know that the machine learning-based systems in a vehicle is going to do what you think it’s going to do?

o  How do we know that the machine learning algorithms that we’ve trained are representative of what will happen in the real world and include edge cases?

o  How do we explain the behavior of machine learning algorithms afterwards?

2:50 pm - 2:50 pm CHAIRPERSON’S CLOSING REMARKS & END OF CONFERENCE

Attendees can now join the parallel sessions.

Day Three | March 21, 2024

8:00 am - 9:00 am REGISTRATION & REFRESHMENTS

9:05 am - 9:15 am CHAIRPERSON’S OPENING REMARKS

9:10 am - 9:50 am HOW TO PROTECT AUTONOMOUS VEHICLES OR ADAS FROM CYBERSECURITY THREATS | ENSURE YOUR AUTONOMOUS PRODUCT MEETS CYBERSECURITY DEMANDS ACROSS THE SUPPLY CHAIN

9:50 am - 10:30 am PRESENTATION | ENSURING SECURITY OF A SINGLE COMPUTE PLATFORM

The current trend for AV and ADAS application to go for a single compute unit instead of many computers or embedded chips presents unique challenges for the industry.

 

o  Understand what the biggest security threats will be.

o  Understand how the single compute platform will look for hardware companies.

o  Measures to ensure security of a single compute platform.

o   How to respond to a security event in an autonomous vehicle.

10:30 am - 11:15 am MORNING REFRESHMENT BREAK

11:15 am - 11:55 am DRIVING FORWARD: PROTECTING THE MODERN AUTOMOTIVE SOFTWARE SUPPLY CHAIN

11:55 am - 12:30 pm PRESENTATION | HOW WILL SECURITY APPROACHES CHANGE FOR SOFTWARE-DEFINED VEHICLES

12:30 pm - 1:00 pm DISCUSSION | HOW TO MAINTAIN SECURITY FOR A PRODUCT THAT GETS CONTINUOUS SOFTWARE UDPATES

What will be discussed:

 

o  Is maintenance of an SDV easier or harder?

o  If OEMs are going to make changes to software architecture, what are some of the strategies that they can adopt to make it more maintainable.

o  How does the OEM-Supplier interface and roles/responsibilities change with SDVs.

o  What does security testing look like over time.

o  How do you integrate test security testing at earlier stages in the lifecycle.

1:00 pm - 2:00 pm LUNCH BREAK & WALKTHROUGH WITH EXHIBITORS

2:00 pm - 2:40 pm ADDRESSING THE CHALLENGE OF MAKING RELEVANT SAFETY CHANGES & SECURING A VEHICLE THAT HAS AN AVERAGE LIFETIME OF 12.5 YEARS OR WAS DESIGNED 20 YEARS AGO | DISCUSSION ON SECURING AGAINST VULNERABILITIES LONG-TERM

The median age of a passenger vehicle today in the US is 12.8 years. And half of the vehicles on the road were designed nearly 20 years ago. To make relevant safety changes to something that was designed 20 years ago or something that stays on the road for >10 years is really a challenge.

 

If you want to find out what cybersecurity experts are doing or planning to do to address this challenge, take a seat in the audience, and learn:

 

o  The role of long-term maintenance for passenger & commercial vehicles

o  How automakers can enable themselves and their supply chains to preserve knowledge, devices, and testing for longer timescales.

o  Recommendation on how to manage security vulnerabilities for a timeline of 15 to 30+ years.

o  The type of support OEMs will require from Tier-1 and Tier-2 suppliers to safeguard vehicles for full lifetime.

2:40 pm - 2:50 pm LET’S GET INPUT FROM EXPERTS IN THE AUDIENCE : WHAT ARE YOUR ORGANIZATIONS DOING TO STRENGHTEN SUPPLY CHAIN SECURITY?

2:50 pm - 3:20 pm WHAT TYPE OF TALENT & TRAINING ARE AUTOMAKERS LOOKING FOR & WHAT CAN VENDORS OFFER | PANEL DISCUSSION ON CYBERSECURITY TRAINING

There’s a huge need for talent in the automotive space, and continued skill and availability of skilled people is hugely important. This session is focused entirely on finding out what car companies are looking for from their employees, and what type of training vendors can offer.

 

What will be discussed:

 

o  What is the profile of individual we need today, and what type of profile will be need in 10 years – do we have a flexible academic program to ensure that?

o  Redefining the role of who we need to solve the security challenge of SDVs.

o  From an education standpoint, what is the most important certification.

o  What resources and support is available for someone who is already in the industry and wants to learn more about transitioning into cybersecurity.

o  What type of vendor support and training is available.

3:20 pm - 4:00 pm CYBERSECURITY IN MANUFACTURING: INTERACTIVE SMALL GROUP WORKSHOP

The industry is not as mature in the manufacturing space, especially with upticks of ransomware and a lot of people thinking their manufacturing is a closed network, when it might not be. This small group workshop focuses on addressing vulnerabilities associated with our manufacturing environment without halting or impacting manufacture of vehicles/products.

 

Share ideas and best practices on:

 

o  How to implement security in older machines that are still required to manufacture products in an efficient and acceptable manner.

o  How to ensure that the other lines are not infected if there’s a breach of security on the manufacturing side.

o  How to secure/streamline signing for cycles from common hacks.

o  Where does the responsibility of the supplier end, and the OEM start.

o  How to store the right keys and how many keys do you need.

4:00 pm - 4:00 pm CHAIRPERSON’S CLOSING REMARKS & END OF CONFERENCE