Automotive Cybersecurity: Meeting the High-Stakes Challenge
|
|
- Gabriella Walker
- 6 years ago
- Views:
Transcription
1 The following is a customized excerpt from a VDC Research report Automotive Cybersecurity: Meeting the High-Stakes Challenge Licensed to Distribute By: Part of the Strategic Insights 2015 Security & The Internet of Things Research Program: Topic 2 By Steve Hoffenberg, Director, with Chris Rommel, Executive Vice President
2 1 Executive Summary Electronics continue to proliferate in automotive applications, such that the typical new car contains dozens of embedded systems. And a hacked car is among the nightmare scenarios for automakers and drivers alike. Security domains for hardware and software include: in-vehicle processors; local area and wide area communications; infotainment; remote software updating and management; and related applications. As Internet connectivity and electronic features proliferate in motor vehicles, cybersecurity threats will increase risks to both occupant safety and data privacy. The tiered nature of the automotive supply chain complicates efforts to design and build secure vehicles. Forthcoming vehicle-to-vehicle and vehicle-toinfrastructure communications technologies will introduce additional cybersecurity risks. A range of automotive hardware and software security solutions is already available with more in development. However, automakers will exacerbate the challenges of data security and privacy through their desire to monetize vehicle data. Key Findings Nearly one-third of new vehicles sold in 2015 had Internet connectivity through embedded cellular modems and/or smartphone interface, and by 2020, more than three-quarters of new vehicles will have such connectivity. The average new vehicle in 2015 contained 31 microprocessors, a number which will continue to rise in coming years but be partially offset by consolidation of multiple functions into individual processors. Fewer than 2% of in-vehicle microprocessors employed hardware security features in 2014, but VDC expects that portion to rise to 11% by IoT cloud services for the automotive market will rise from $1.1B in 2014 to $12.4B in 2020, presenting strong opportunity for cloud vendors and technology suppliers with expertise in both security and the automotive market.
3 1 The Automotive Market & Internet Connectivity According to figures from the Organisation Internationale des Constructeurs d Automobiles [International Organization of Motor Vehicle Manufacturers], the industry churned out 89.7 million cars, trucks, and buses in , and there are approximately 1.2 billion motor vehicles in use worldwide 2. Although there are cybersecurity risks from attackers who gain physical access to vehicles, such as through the OBD II (On-Board Diagnostics II) port present in all cars and light trucks built since 1996, by far the greater concern is from wireless remote hacking over the Internet. It s just plain scary to think that someone at a keyboard thousands of miles away could wrest control of a vehicle away from a driver at the steering wheel. Increasingly, vehicle manufacturers are including Internet connectivity for all the usual IoT benefits (usage data, system diagnostics, etc.) as well as telematics services (GPS, navigation, traffic information) and personal information and entertainment (text messaging, , streaming music, etc.). Many new vehicles contain embedded cellular modems for these functions. VDC estimates that approximately 19% of new motor vehicles sold in 2015 year have Internet connectivity via embedded cellular modem, and approximately 17% have Internet capability through cellular connectivity in the user s smartphone. Combined, 31% of new vehicles in 2015 have Internet connectivity by one or both methods. (The two types of connectivity are not mutually exclusive, as vehicles may have, for example, embedded connectivity for the carmaker to monitor and communicate vehicle system data and updates, while user infotainment content comes through the smartphone connection.) Today, these technologies are more prevalent in luxury cars and commercial vehicles, but we expect that each of these types of connectivity will trickle down to be included in more than half of all new cars by 2020, and altogether, more three-quarters of new vehicles in 2020 will include at least one of these technologies to have Internet connectivity For this forecast, VDC does not count vehicles that will have connectivity only via the European ecall emergency calling feature mandated for all new passenger cars sold in the region beginning April The ecall system will be dormant except in the event of a severe collision or by manual activation from the driver in the event of an emergency.
4 2 Exhibit 1: Percent of New Vehicles with Internet Connectivity, by Connection Type
5 3 Automotive Security is Less Than the Sum of its Parts In the case of automotive electronics, today s vehicles contain dozens of embedded microprocessors (MCUs, CPUs, and SoCs 4 ), as shown in Exhibit 2. Specific numbers per vehicle vary widely, and luxury cars tend to have the most. (One independent site estimates that a 2014 Tesla Model S electric car contains 64 microprocessors 5 not including sensors, more than double the industry average.) Exhibit 2: Average Number of Embedded Microprocessors per New Vehicle The number of electronic functions in vehicles is rising even faster than the number of microprocessors, but that functional rise is being partially offset by consolidation of multiple functions into individual processors, to contain costs not only for the processors but also for wiring, harnesses, connectors, and the like. Security Implications of Tiered Supply Chain One overarching challenge for vehicle manufacturers is due to the tiered supply chain of the automotive 4 MCU=Microcontroller Unit; CPU=Central Processing Unit; SoC=System on a Chip (An SoC is typically a CPU plus wireless radio, such as Bluetooth, Wi-Fi, or cellular modem.) 5
6 4 industry. Consumers tend to think of cars as being made by GM, Toyota, etc. In practice, the OEM carmaker is the lead designer and assembler of the final product, but not the actual manufacturer of most of the parts. The majority of parts are provided by contractors (Tier 1 suppliers), and the subcontractors to the contractors (Tier 2), and the subcontractors to those subcontractors (Tier 3). Each electronics supplier may (or may not) have designed its own subsystems to be secure based on certain common assumptions such as protocol standards and expectations of sensor inputs or embedded communications during normal vehicle functions. But vulnerabilities can slip into the cracks between the subsystems, and hackers don t necessarily abide by common assumptions. Only the vehicle OEM has the potential to observe in advance of production how the numerous electronic subsystems function in concert with one another, and how the overall system responds to many security threats. As VDC often puts it, to be secure, an embedded system not only has to do what it s supposed to do, it has to not do what it isn t supposed to do. That s much more difficult to accomplish when so many subsystems are interconnected with each other and by extension in connected vehicles, to the Internet. Long before the infamous Jeep hack of , which brought automotive cyber-threats to widespread public attention, this overall system-level security problem was documented by technology researchers from the University of California at San Diego and the University of Washington, who jointly established the Center for Automotive Embedded Systems Security (CAESS). Back in 2010, the group published a report 7 detailing how it successfully hacked numerous subsystems of a pair of test cars, including the ability to over a wireless link engage brakes as well as prevent braking while a vehicle was in motion. These hacks were highly involved to perform, and required extensive research and extended physical access to test multiple subsystems and later install connections to the OBD II port. Nevertheless, the group proved it could be done. The next year, CAESS published a follow-up report 8 describing additional hacks, noting in its analysis:...while each supplier does unit testing (according to the specification) it is difficult for the manufacturer to evaluate security vulnerabilities that emerge at the integration stage. Traditional kinds of automated analysis and code reviews cannot be applied and assumptions not embodied in the specifications are difficult to unravel. And those CAESS white hat hacks were before vehicles had built-in Internet connectivity. With the addition of such connectivity, the complexity of embedded systems, the security challenges, and the potential attack vectors rise dramatically. 6 Hackers Remotely Kill a Jeep on the Highway With Me in It, Andy Greenberg, Wired, July 21, Experimental Security Analysis of a Modern Automobile, Koscher et al., Comprehensive Experimental Analyses of Automotive Attack Surfaces, Checkoway et al., 2011.
7 5 Securing Functional Safety In a general sense, functional safety ensures that in order to reduce the chances of human injury a safetycritical system will operate properly and/or in a safe manner, even when confronted with adverse conditions, conflicting signals, or partial failure of hardware or software. In motor vehicles, functional safety can include redundant systems to take over in case of primary system failure, as well as fail-safe limp home modes, and intelligent implementations (e.g. power windows systems that will stop going up if they encounter resistance, and processing systems that detect spoofed inputs). The term can apply to the workings of any functional component, such as the engine, brakes, steering, airbags, door locks, etc. The functional safety of most electrical and electronic automotive systems today comes under the ISO standard, which encompasses not only the finished product (the vehicle and its subsystems), but the processes by which the systems are designed, developed, produced, and serviced. However, ISO does little to address security of functional systems. Although some of the principles and best practices contained in the standard will have the effect of reducing security risks, ISO is not intended to directly address resistance to willful attempts to circumvent safety measures. As such, a vehicle that is compliant with ISO is not necessarily secure. In other words, functional safety does not equal security. The concepts and procedures for designing security into functional automotive systems are not materially different than for other product categories, but their implementations are more complex (and their consequences are greater). They imply rejection of external attempts to adversely influence functional safety, while not themselves compromising that safety.
8 6 Securing Personal Data The task of securing functional automotive systems is largely a technological challenge, as is securing data while its internal to the vehicle. However, securing data once it s external of the vehicle is both a technical challenge as well as a significant business challenge. The technical challenge encompasses the prevention of hackers from accessing and misusing personal data. Just as smartphones have become treasure chests of personal information including many financial transactions, connected vehicles will take on similar characteristics. Cars can conceivably communicate credit card or other payment data to content providers, toll systems, parking lots, gas pumps or electric chargers, etc., making vehicle data potential targets of organized and sophisticated groups of financially motivated hackers. The significant business challenge arises because OEMs have an ulterior motive, namely a cut of revenue that can be generated from vehicle data by offering authorized access to third parties. By doing so, the OEMs have the responsibility of maintaining data privacy, not only by anonymizing it and securing it from unauthorized access, but also by ensuring that parties authorized to access it don t misuse it for unauthorized purposes. (Which parties can do what with user data is a frequent topic for discussion among IoT providers. For more on the topic, see a previously published VDC View document entitled, Beyond Who Owns the Data? 9 ) Regulators also need to ensure that data privacy technologies don t prevent independent repair shops from accessing relevant data about the performance or status of vehicle systems. (In the US and some other countries, such access is required by so-called Right to Repair laws.) However, distinguishing between legitimate repair shops and hacker storefronts is not necessarily a simple task. Much of the access to personal data from vehicles will occur in the cloud, secured by the same types of technologies developed to protect cloud and conventional enterprise/it databases. In that VDC sees opportunity for cloud respect, the automotive market is not unique, although VDC sees services vendors to develop platforms optimized for the opportunity for cloud services vendors to develop platforms optimized needs of the automotive market. for the needs of the automotive market, including designated levels of data access, dashboards, and analytics for OEMs, Tier suppliers, dealerships, and vehicle owners. Covisint and Elektrobit are examples of vendors offering this type of cloud platform for the automotive market. 9 Beyond Who Owns the Data? is available for free download from VDC Research (registration required)
9 7 Conclusion Because much of automotive security is software-based, the supply chain is more complicated and interwoven than the supply chain for physical parts, although the Tier 1 parts suppliers still play a crucial role. Opportunities for startups are often limited by regulatory and performance requirements, as well as the need to have their technologies accepted across the ecosystem. Established vendors from other vertical markets seeking to grow their presence in the automotive industry often face hurdles (albeit surmountable ones) in the form of entrenched partnerships and business relationships. Nevertheless, new ideas and technologies can succeed if they offer solutions to existent or commonly anticipated problems. Everyone in the automotive ecosystem carmakers, suppliers, dealers, and users needs to understand the importance of cybersecurity for the sake of both vehicle safety and data privacy. Ultimately, the carmakers must take the leadership role in steering the industry toward improved security, but the elements of security have to be taken into account at every step of the design and production processes, requiring a wellorganized and ongoing approach that continues long after vehicles are driven off the lot.
10 8 VDC Research About the Authors Steve Hoffenberg is a leading industry analyst and market research professional for Internet of Things technology. He has more than two decades of experience in market research Contact Steve: and product management for technology products and shoffenberg@vdcresearch.com services. Prior to joining VDC, he spent 10 years as Director of Consumer Imaging and Consumer Electronics Research at the firm Lyra Research, where he led industry advisory services providing extensive market research on consumer technology trends, user adoption, market sizing, marketing strategy, and competitive analysis for major consumer electronics manufacturers. Previously, he worked in product management for electronic design companies that developed and licensed embedded digital imaging and audio products. Steve holds an M.S. degree from the Rochester Institute of Technology and a B.A. degree from the University of Vermont. Chris Rommel is responsible for syndicated research and consulting engagements focused on development and deployment solutions for intelligent systems. He has helped a wide variety of clients respond to and capitalize on the leading trends impacting next-generation device markets, such as security, the Internet of Things, and M2M connectivity, as well as the growing need for system-level lifecycle management solutions. Chris has also led a range of proprietary consulting projects, including competitive analyses, strategic marketing initiative support, ecosystem development strategies, and vertical market opportunity assessments. Chris holds a B.A. in Business Economics and a B.A. in Public and Private Sector Organization from Brown University. About VDC Research Founded in 1971, VDC Research provides in-depth insights to technology vendors, end users, and investors across the globe. As a market research and consulting firm, VDC s coverage of AutoID, enterprise mobility, industrial automation, and IoT and embedded technologies is among the most advanced in the industry, helping our clients make critical decisions with confidence. Offering syndicated reports and custom consultation, our methodologies consistently provide accurate forecasts and unmatched thought leadership for deeply technical markets. Located in Natick, Massachusetts, VDC prides itself on its close personal relationships with clients, delivering an attention to detail and a unique perspective that is second to none.
The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationAutomotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationPreventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security
Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent
More informationFuture Implications for the Vehicle When Considering the Internet of Things (IoT)
Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationReal estate predictions 2017 What changes lie ahead?
Real estate predictions 2017 What changes lie ahead? Cyber Risk 2017. For information, contact Deloitte Consultores, S.A. Real Estate Predictions 2017 2 Cyber Risk Rising cyber risk in real estate through
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationThe case for a Vehicle Gateway.
The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol
More informationConnected & Smart Home Research Package
TECHNOLOGY, MEDIA & TELECOMMUNICATION KEY COMPONENTS Intelligence Services Real-time access to continually updated market data and forecasts, analyst insights, topical research reports and analyst presentations.
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationINSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom
INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationSGS CYBER SECURITY GROWTH OPPORTUNITIES
SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER
More informationARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More informationCONNECTED CARS: WORLDWIDE TRENDS AND FORECASTS
RESEARCH FORECAST REPORT CONNECTED CARS: WORLDWIDE TRENDS AND FORECASTS 2013 2025 MICHELE MACKENZIE AND TOM REBBECK Analysys Mason Limited 2016 analysysmason.com About this report This report analyses
More informationBOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption
February 2016 BOSCH CASE STUDY How Bosch Has Benefited from GENIVI Adoption Overview The GENIVI Alliance was launched with a mission of driving the broad adoption of open source, In-Vehicle Infotainment
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationAutorama, Connecting Your Car to
Autorama, Connecting Your Car to the Internet of Tomorrow Nicholas Sargologos, Senior Marketing Manager, Digital Networking Freescale Semiconductor Overview Automotive OEMs need a secure, managed process
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationSecuring the Connected Car. Eystein Stenberg CTO Mender.io
Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined
More informationGlobal Information Security Survey. A life sciences perspective
Global Information Security Survey A life sciences perspective Introduction Welcome to the life sciences perspective on the results from Creating trust in the digital world: EY s Global Information Security
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationIndustrial IoT Trends: WSN, LPWAN & Cloud Platforms
Industrial IoT Trends: WSN, LPWAN & Cloud Platforms Wireless sensor networks (WSN), low power wide area networks (LPWAN) and cloud-based platforms are driving growth for the industrial Internet of Things
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationNEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS
NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationThe Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005
The Fully Networked Car Trends in Car Communication Geneva March 2, 2005 Is The Connected Car Really A Major Business Opportunity? 2 Are We Flushing Money Away Having No Convincing Customer Benefits? 3
More informationARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market
ARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market Automotive Electronics (AES) Report Snapshot NXP has now launched its new S32K range of microcontrollers for the
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationSupporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains
Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer
More informationIOT IN THE AUTOMOTIVE INDUSTRY
IOT IN THE AUTOMOTIVE INDUSTRY IOT CHALLENGES AND OPPORTUNITES FOR AUTOMOTIVE MANUFACTURERS FEBRUARY 2018 TATA COMMUNICATIONS MOVE TM INTRODUCTION New technology is proving transformational to the automotive
More informationWhite Paper. Connected Car Brings Intelligence to Transportation
White Paper Connected Car Brings Intelligence to Transportation 2 NEXCOM White Paper As urban population grows at an exponential rate, traffic jams are becoming more hideous and driving more and more tedious.
More informationConnect Vehicles: A Security Throwback
Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE
More informationReal-Time Insights from the Source
LATENCY LATENCY LATENCY Real-Time Insights from the Source This white paper provides an overview of edge computing, and how edge analytics will impact and improve the trucking industry. What Is Edge Computing?
More informationData Privacy in Your Own Backyard
White paper Data Privacy in Your Own Backyard Staying Secure Under New GDPR Employee Internet Monitoring Rules www.proofpoint.com TABLE OF CONTENTS INTRODUCTION... 3 KEY GDPR PROVISIONS... 4 GDPR AND EMPLOYEE
More informationThe hidden cost of smart buildings
Real estate The hidden cost of smart buildings Cybersecurity Risk Understanding cyber risk for asset managers and owners November 2017 Contents Section Page Asset management issues for boards 01 Smart
More informationFeatured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure
Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationBluetooth in Automotive Market Research Report - Global Forecast to 2023
Report Information More information from: https://www.marketresearchfuture.com/reports/1262 Bluetooth in Automotive Market Research Report - Global Forecast to 2023 Report / Search Code: MRFR/AM/0754-CRR
More informationDesignated Cyber Security Protection Solution for Medical Devices
Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack
More informationCYBERSECURITY AND THE MIDDLE MARKET
CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationExperimental Security Analysis of a Modern Automobile
Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationThe Future of Network Infrastructure & Management
WHITE PAPER The Future of Network Infrastructure & Management Software-defined networks, cloud management and LTE offer the ability to adapt a network to the changing workforce. Future Look: New Way to
More informationWireless Connectivity: Future Evolution of the Mobile Network
Wireless Connectivity: Future Evolution of the Mobile Network Simon Yeung Executive Director, Comba Telecom Systems Holdings 26 May 2017 President, Comba Telecom Systems International 2017 Comba Telecom.
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationSecurity Analysis of modern Automobile
Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces
More informationSecurity Concerns in Automotive Systems. James Martin
Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationEmerging Trends of Micro Data Centers
Emerging Trends of Micro Data Centers Micro Modular Data Centers and the IoT The Internet of Things can be defined as an interconnected network of real-world physical objects capable of communicating without
More informationConvergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations
Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security
More informationAgenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2
Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationVehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI
Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery
More informationWhy This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars
Case Study Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars At a Glance Industry Automotive Services BlackBerry Cybersecurity Services
More informationMOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationModern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego
Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,
More informationRobert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group
Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity
More informationSignal Processing IP for a Smarter, Connected World. May 2017
Signal Processing IP for a Smarter, Connected World May 2017 Forward Looking Statements This presentation contains forward-looking statements that involve risks and uncertainties, as well as assumptions
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationTRUSTED MOBILITY INDEX
TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationCyber Security: Threat and Prevention
Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will
More informationAn outlook on INTELLIGENCE in 2024
An outlook on INTELLIGENCE in 2024 Paul Gray, Research Director, paul.gray@ihsmarkit.com +44 7810 854646 2018 IHS Markit. All Rights Reserved. Top 8 Transformative Technology predictions for 2018 / April
More informationNew York Analyst Day. November 12, 2009
New York Analyst Day November 12, 2009 1 Steve Altman President 2 Safe Harbor Before we proceed with our presentation, we would like to point out that the following discussion will contain forward-looking
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationINSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationCELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS
analysysmason.com RESEARCH FORECAST REPORT CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 About this report This report
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More information2018 Edition. Security and Compliance for Office 365
2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationAN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS
AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS The Software-Enabled Automobile Software is a key differentiating factor for today s automakers. It is critical to harnessing the opportunities of autonomous
More informationHow Your Organization Can Drive Success in the Age of Digital Disruption
How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,
More informationCyber Threat Landscape April 2013
www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve
More informationConquering Complexity: Addressing Security Challenges of the Connected Vehicle
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com
More informationISG Provider Lens TM
ISG Provider Lens TM 2019 Definition Facebook s data leakage affair attracted the public s attraction to data security again. This is a very striking example for an unwanted use of data, but not comparable
More informationOVERVIEW BROCHURE GRC. When you have to be right
OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance
More informationJane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.
Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationBack to the Future Cyber Security
Back to the Future Cyber Security A manifesto for Cyber Security and the Industrial Legacy Introduction Industrial facilities and infrastructure form the core of our economy and society. These advanced
More informationSOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions
SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationSEVEN Networks Open Channel Traffic Optimization
SEVEN Networks Open Channel Traffic Optimization Revision 3.0 March 2014 The Open Channel family of software products is designed to deliver device-centric mobile traffic management and analytics for wireless
More informationA Perspective on V2X in the United States
A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected
More information