Automotive Cybersecurity: Meeting the High-Stakes Challenge

Size: px
Start display at page:

Download "Automotive Cybersecurity: Meeting the High-Stakes Challenge"

Transcription

1 The following is a customized excerpt from a VDC Research report Automotive Cybersecurity: Meeting the High-Stakes Challenge Licensed to Distribute By: Part of the Strategic Insights 2015 Security & The Internet of Things Research Program: Topic 2 By Steve Hoffenberg, Director, with Chris Rommel, Executive Vice President

2 1 Executive Summary Electronics continue to proliferate in automotive applications, such that the typical new car contains dozens of embedded systems. And a hacked car is among the nightmare scenarios for automakers and drivers alike. Security domains for hardware and software include: in-vehicle processors; local area and wide area communications; infotainment; remote software updating and management; and related applications. As Internet connectivity and electronic features proliferate in motor vehicles, cybersecurity threats will increase risks to both occupant safety and data privacy. The tiered nature of the automotive supply chain complicates efforts to design and build secure vehicles. Forthcoming vehicle-to-vehicle and vehicle-toinfrastructure communications technologies will introduce additional cybersecurity risks. A range of automotive hardware and software security solutions is already available with more in development. However, automakers will exacerbate the challenges of data security and privacy through their desire to monetize vehicle data. Key Findings Nearly one-third of new vehicles sold in 2015 had Internet connectivity through embedded cellular modems and/or smartphone interface, and by 2020, more than three-quarters of new vehicles will have such connectivity. The average new vehicle in 2015 contained 31 microprocessors, a number which will continue to rise in coming years but be partially offset by consolidation of multiple functions into individual processors. Fewer than 2% of in-vehicle microprocessors employed hardware security features in 2014, but VDC expects that portion to rise to 11% by IoT cloud services for the automotive market will rise from $1.1B in 2014 to $12.4B in 2020, presenting strong opportunity for cloud vendors and technology suppliers with expertise in both security and the automotive market.

3 1 The Automotive Market & Internet Connectivity According to figures from the Organisation Internationale des Constructeurs d Automobiles [International Organization of Motor Vehicle Manufacturers], the industry churned out 89.7 million cars, trucks, and buses in , and there are approximately 1.2 billion motor vehicles in use worldwide 2. Although there are cybersecurity risks from attackers who gain physical access to vehicles, such as through the OBD II (On-Board Diagnostics II) port present in all cars and light trucks built since 1996, by far the greater concern is from wireless remote hacking over the Internet. It s just plain scary to think that someone at a keyboard thousands of miles away could wrest control of a vehicle away from a driver at the steering wheel. Increasingly, vehicle manufacturers are including Internet connectivity for all the usual IoT benefits (usage data, system diagnostics, etc.) as well as telematics services (GPS, navigation, traffic information) and personal information and entertainment (text messaging, , streaming music, etc.). Many new vehicles contain embedded cellular modems for these functions. VDC estimates that approximately 19% of new motor vehicles sold in 2015 year have Internet connectivity via embedded cellular modem, and approximately 17% have Internet capability through cellular connectivity in the user s smartphone. Combined, 31% of new vehicles in 2015 have Internet connectivity by one or both methods. (The two types of connectivity are not mutually exclusive, as vehicles may have, for example, embedded connectivity for the carmaker to monitor and communicate vehicle system data and updates, while user infotainment content comes through the smartphone connection.) Today, these technologies are more prevalent in luxury cars and commercial vehicles, but we expect that each of these types of connectivity will trickle down to be included in more than half of all new cars by 2020, and altogether, more three-quarters of new vehicles in 2020 will include at least one of these technologies to have Internet connectivity For this forecast, VDC does not count vehicles that will have connectivity only via the European ecall emergency calling feature mandated for all new passenger cars sold in the region beginning April The ecall system will be dormant except in the event of a severe collision or by manual activation from the driver in the event of an emergency.

4 2 Exhibit 1: Percent of New Vehicles with Internet Connectivity, by Connection Type

5 3 Automotive Security is Less Than the Sum of its Parts In the case of automotive electronics, today s vehicles contain dozens of embedded microprocessors (MCUs, CPUs, and SoCs 4 ), as shown in Exhibit 2. Specific numbers per vehicle vary widely, and luxury cars tend to have the most. (One independent site estimates that a 2014 Tesla Model S electric car contains 64 microprocessors 5 not including sensors, more than double the industry average.) Exhibit 2: Average Number of Embedded Microprocessors per New Vehicle The number of electronic functions in vehicles is rising even faster than the number of microprocessors, but that functional rise is being partially offset by consolidation of multiple functions into individual processors, to contain costs not only for the processors but also for wiring, harnesses, connectors, and the like. Security Implications of Tiered Supply Chain One overarching challenge for vehicle manufacturers is due to the tiered supply chain of the automotive 4 MCU=Microcontroller Unit; CPU=Central Processing Unit; SoC=System on a Chip (An SoC is typically a CPU plus wireless radio, such as Bluetooth, Wi-Fi, or cellular modem.) 5

6 4 industry. Consumers tend to think of cars as being made by GM, Toyota, etc. In practice, the OEM carmaker is the lead designer and assembler of the final product, but not the actual manufacturer of most of the parts. The majority of parts are provided by contractors (Tier 1 suppliers), and the subcontractors to the contractors (Tier 2), and the subcontractors to those subcontractors (Tier 3). Each electronics supplier may (or may not) have designed its own subsystems to be secure based on certain common assumptions such as protocol standards and expectations of sensor inputs or embedded communications during normal vehicle functions. But vulnerabilities can slip into the cracks between the subsystems, and hackers don t necessarily abide by common assumptions. Only the vehicle OEM has the potential to observe in advance of production how the numerous electronic subsystems function in concert with one another, and how the overall system responds to many security threats. As VDC often puts it, to be secure, an embedded system not only has to do what it s supposed to do, it has to not do what it isn t supposed to do. That s much more difficult to accomplish when so many subsystems are interconnected with each other and by extension in connected vehicles, to the Internet. Long before the infamous Jeep hack of , which brought automotive cyber-threats to widespread public attention, this overall system-level security problem was documented by technology researchers from the University of California at San Diego and the University of Washington, who jointly established the Center for Automotive Embedded Systems Security (CAESS). Back in 2010, the group published a report 7 detailing how it successfully hacked numerous subsystems of a pair of test cars, including the ability to over a wireless link engage brakes as well as prevent braking while a vehicle was in motion. These hacks were highly involved to perform, and required extensive research and extended physical access to test multiple subsystems and later install connections to the OBD II port. Nevertheless, the group proved it could be done. The next year, CAESS published a follow-up report 8 describing additional hacks, noting in its analysis:...while each supplier does unit testing (according to the specification) it is difficult for the manufacturer to evaluate security vulnerabilities that emerge at the integration stage. Traditional kinds of automated analysis and code reviews cannot be applied and assumptions not embodied in the specifications are difficult to unravel. And those CAESS white hat hacks were before vehicles had built-in Internet connectivity. With the addition of such connectivity, the complexity of embedded systems, the security challenges, and the potential attack vectors rise dramatically. 6 Hackers Remotely Kill a Jeep on the Highway With Me in It, Andy Greenberg, Wired, July 21, Experimental Security Analysis of a Modern Automobile, Koscher et al., Comprehensive Experimental Analyses of Automotive Attack Surfaces, Checkoway et al., 2011.

7 5 Securing Functional Safety In a general sense, functional safety ensures that in order to reduce the chances of human injury a safetycritical system will operate properly and/or in a safe manner, even when confronted with adverse conditions, conflicting signals, or partial failure of hardware or software. In motor vehicles, functional safety can include redundant systems to take over in case of primary system failure, as well as fail-safe limp home modes, and intelligent implementations (e.g. power windows systems that will stop going up if they encounter resistance, and processing systems that detect spoofed inputs). The term can apply to the workings of any functional component, such as the engine, brakes, steering, airbags, door locks, etc. The functional safety of most electrical and electronic automotive systems today comes under the ISO standard, which encompasses not only the finished product (the vehicle and its subsystems), but the processes by which the systems are designed, developed, produced, and serviced. However, ISO does little to address security of functional systems. Although some of the principles and best practices contained in the standard will have the effect of reducing security risks, ISO is not intended to directly address resistance to willful attempts to circumvent safety measures. As such, a vehicle that is compliant with ISO is not necessarily secure. In other words, functional safety does not equal security. The concepts and procedures for designing security into functional automotive systems are not materially different than for other product categories, but their implementations are more complex (and their consequences are greater). They imply rejection of external attempts to adversely influence functional safety, while not themselves compromising that safety.

8 6 Securing Personal Data The task of securing functional automotive systems is largely a technological challenge, as is securing data while its internal to the vehicle. However, securing data once it s external of the vehicle is both a technical challenge as well as a significant business challenge. The technical challenge encompasses the prevention of hackers from accessing and misusing personal data. Just as smartphones have become treasure chests of personal information including many financial transactions, connected vehicles will take on similar characteristics. Cars can conceivably communicate credit card or other payment data to content providers, toll systems, parking lots, gas pumps or electric chargers, etc., making vehicle data potential targets of organized and sophisticated groups of financially motivated hackers. The significant business challenge arises because OEMs have an ulterior motive, namely a cut of revenue that can be generated from vehicle data by offering authorized access to third parties. By doing so, the OEMs have the responsibility of maintaining data privacy, not only by anonymizing it and securing it from unauthorized access, but also by ensuring that parties authorized to access it don t misuse it for unauthorized purposes. (Which parties can do what with user data is a frequent topic for discussion among IoT providers. For more on the topic, see a previously published VDC View document entitled, Beyond Who Owns the Data? 9 ) Regulators also need to ensure that data privacy technologies don t prevent independent repair shops from accessing relevant data about the performance or status of vehicle systems. (In the US and some other countries, such access is required by so-called Right to Repair laws.) However, distinguishing between legitimate repair shops and hacker storefronts is not necessarily a simple task. Much of the access to personal data from vehicles will occur in the cloud, secured by the same types of technologies developed to protect cloud and conventional enterprise/it databases. In that VDC sees opportunity for cloud respect, the automotive market is not unique, although VDC sees services vendors to develop platforms optimized for the opportunity for cloud services vendors to develop platforms optimized needs of the automotive market. for the needs of the automotive market, including designated levels of data access, dashboards, and analytics for OEMs, Tier suppliers, dealerships, and vehicle owners. Covisint and Elektrobit are examples of vendors offering this type of cloud platform for the automotive market. 9 Beyond Who Owns the Data? is available for free download from VDC Research (registration required)

9 7 Conclusion Because much of automotive security is software-based, the supply chain is more complicated and interwoven than the supply chain for physical parts, although the Tier 1 parts suppliers still play a crucial role. Opportunities for startups are often limited by regulatory and performance requirements, as well as the need to have their technologies accepted across the ecosystem. Established vendors from other vertical markets seeking to grow their presence in the automotive industry often face hurdles (albeit surmountable ones) in the form of entrenched partnerships and business relationships. Nevertheless, new ideas and technologies can succeed if they offer solutions to existent or commonly anticipated problems. Everyone in the automotive ecosystem carmakers, suppliers, dealers, and users needs to understand the importance of cybersecurity for the sake of both vehicle safety and data privacy. Ultimately, the carmakers must take the leadership role in steering the industry toward improved security, but the elements of security have to be taken into account at every step of the design and production processes, requiring a wellorganized and ongoing approach that continues long after vehicles are driven off the lot.

10 8 VDC Research About the Authors Steve Hoffenberg is a leading industry analyst and market research professional for Internet of Things technology. He has more than two decades of experience in market research Contact Steve: and product management for technology products and shoffenberg@vdcresearch.com services. Prior to joining VDC, he spent 10 years as Director of Consumer Imaging and Consumer Electronics Research at the firm Lyra Research, where he led industry advisory services providing extensive market research on consumer technology trends, user adoption, market sizing, marketing strategy, and competitive analysis for major consumer electronics manufacturers. Previously, he worked in product management for electronic design companies that developed and licensed embedded digital imaging and audio products. Steve holds an M.S. degree from the Rochester Institute of Technology and a B.A. degree from the University of Vermont. Chris Rommel is responsible for syndicated research and consulting engagements focused on development and deployment solutions for intelligent systems. He has helped a wide variety of clients respond to and capitalize on the leading trends impacting next-generation device markets, such as security, the Internet of Things, and M2M connectivity, as well as the growing need for system-level lifecycle management solutions. Chris has also led a range of proprietary consulting projects, including competitive analyses, strategic marketing initiative support, ecosystem development strategies, and vertical market opportunity assessments. Chris holds a B.A. in Business Economics and a B.A. in Public and Private Sector Organization from Brown University. About VDC Research Founded in 1971, VDC Research provides in-depth insights to technology vendors, end users, and investors across the globe. As a market research and consulting firm, VDC s coverage of AutoID, enterprise mobility, industrial automation, and IoT and embedded technologies is among the most advanced in the industry, helping our clients make critical decisions with confidence. Offering syndicated reports and custom consultation, our methodologies consistently provide accurate forecasts and unmatched thought leadership for deeply technical markets. Located in Natick, Massachusetts, VDC prides itself on its close personal relationships with clients, delivering an attention to detail and a unique perspective that is second to none.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent

More information

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Future Implications for the Vehicle When Considering the Internet of Things (IoT) Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

Real estate predictions 2017 What changes lie ahead?

Real estate predictions 2017 What changes lie ahead? Real estate predictions 2017 What changes lie ahead? Cyber Risk 2017. For information, contact Deloitte Consultores, S.A. Real Estate Predictions 2017 2 Cyber Risk Rising cyber risk in real estate through

More information

Retail Security in a World of Digital Touchpoint Complexity

Retail Security in a World of Digital Touchpoint Complexity Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of

More information

The case for a Vehicle Gateway.

The case for a Vehicle Gateway. The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol

More information

Connected & Smart Home Research Package

Connected & Smart Home Research Package TECHNOLOGY, MEDIA & TELECOMMUNICATION KEY COMPONENTS Intelligence Services Real-time access to continually updated market data and forecasts, analyst insights, topical research reports and analyst presentations.

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

ARM processors driving automotive innovation

ARM processors driving automotive innovation ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device

More information

CONNECTED CARS: WORLDWIDE TRENDS AND FORECASTS

CONNECTED CARS: WORLDWIDE TRENDS AND FORECASTS RESEARCH FORECAST REPORT CONNECTED CARS: WORLDWIDE TRENDS AND FORECASTS 2013 2025 MICHELE MACKENZIE AND TOM REBBECK Analysys Mason Limited 2016 analysysmason.com About this report This report analyses

More information

BOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption

BOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption February 2016 BOSCH CASE STUDY How Bosch Has Benefited from GENIVI Adoption Overview The GENIVI Alliance was launched with a mission of driving the broad adoption of open source, In-Vehicle Infotainment

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

Autorama, Connecting Your Car to

Autorama, Connecting Your Car to Autorama, Connecting Your Car to the Internet of Tomorrow Nicholas Sargologos, Senior Marketing Manager, Digital Networking Freescale Semiconductor Overview Automotive OEMs need a secure, managed process

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Securing the Connected Car. Eystein Stenberg CTO Mender.io

Securing the Connected Car. Eystein Stenberg CTO Mender.io Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined

More information

Global Information Security Survey. A life sciences perspective

Global Information Security Survey. A life sciences perspective Global Information Security Survey A life sciences perspective Introduction Welcome to the life sciences perspective on the results from Creating trust in the digital world: EY s Global Information Security

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

Industrial IoT Trends: WSN, LPWAN & Cloud Platforms

Industrial IoT Trends: WSN, LPWAN & Cloud Platforms Industrial IoT Trends: WSN, LPWAN & Cloud Platforms Wireless sensor networks (WSN), low power wide area networks (LPWAN) and cloud-based platforms are driving growth for the industrial Internet of Things

More information

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

The Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005

The Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005 The Fully Networked Car Trends in Car Communication Geneva March 2, 2005 Is The Connected Car Really A Major Business Opportunity? 2 Are We Flushing Money Away Having No Convincing Customer Benefits? 3

More information

ARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market

ARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market ARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market Automotive Electronics (AES) Report Snapshot NXP has now launched its new S32K range of microcontrollers for the

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer

More information

IOT IN THE AUTOMOTIVE INDUSTRY

IOT IN THE AUTOMOTIVE INDUSTRY IOT IN THE AUTOMOTIVE INDUSTRY IOT CHALLENGES AND OPPORTUNITES FOR AUTOMOTIVE MANUFACTURERS FEBRUARY 2018 TATA COMMUNICATIONS MOVE TM INTRODUCTION New technology is proving transformational to the automotive

More information

White Paper. Connected Car Brings Intelligence to Transportation

White Paper. Connected Car Brings Intelligence to Transportation White Paper Connected Car Brings Intelligence to Transportation 2 NEXCOM White Paper As urban population grows at an exponential rate, traffic jams are becoming more hideous and driving more and more tedious.

More information

Connect Vehicles: A Security Throwback

Connect Vehicles: A Security Throwback Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE

More information

Real-Time Insights from the Source

Real-Time Insights from the Source LATENCY LATENCY LATENCY Real-Time Insights from the Source This white paper provides an overview of edge computing, and how edge analytics will impact and improve the trucking industry. What Is Edge Computing?

More information

Data Privacy in Your Own Backyard

Data Privacy in Your Own Backyard White paper Data Privacy in Your Own Backyard Staying Secure Under New GDPR Employee Internet Monitoring Rules www.proofpoint.com TABLE OF CONTENTS INTRODUCTION... 3 KEY GDPR PROVISIONS... 4 GDPR AND EMPLOYEE

More information

The hidden cost of smart buildings

The hidden cost of smart buildings Real estate The hidden cost of smart buildings Cybersecurity Risk Understanding cyber risk for asset managers and owners November 2017 Contents Section Page Asset management issues for boards 01 Smart

More information

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Bluetooth in Automotive Market Research Report - Global Forecast to 2023

Bluetooth in Automotive Market Research Report - Global Forecast to 2023 Report Information More information from: https://www.marketresearchfuture.com/reports/1262 Bluetooth in Automotive Market Research Report - Global Forecast to 2023 Report / Search Code: MRFR/AM/0754-CRR

More information

Designated Cyber Security Protection Solution for Medical Devices

Designated Cyber Security Protection Solution for Medical Devices Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

Experimental Security Analysis of a Modern Automobile

Experimental Security Analysis of a Modern Automobile Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

The Future of Network Infrastructure & Management

The Future of Network Infrastructure & Management WHITE PAPER The Future of Network Infrastructure & Management Software-defined networks, cloud management and LTE offer the ability to adapt a network to the changing workforce. Future Look: New Way to

More information

Wireless Connectivity: Future Evolution of the Mobile Network

Wireless Connectivity: Future Evolution of the Mobile Network Wireless Connectivity: Future Evolution of the Mobile Network Simon Yeung Executive Director, Comba Telecom Systems Holdings 26 May 2017 President, Comba Telecom Systems International 2017 Comba Telecom.

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Security Analysis of modern Automobile

Security Analysis of modern Automobile Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces

More information

Security Concerns in Automotive Systems. James Martin

Security Concerns in Automotive Systems. James Martin Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Emerging Trends of Micro Data Centers

Emerging Trends of Micro Data Centers Emerging Trends of Micro Data Centers Micro Modular Data Centers and the IoT The Internet of Things can be defined as an interconnected network of real-world physical objects capable of communicating without

More information

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security

More information

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2 Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery

More information

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars Case Study Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars At a Glance Industry Automotive Services BlackBerry Cybersecurity Services

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,

More information

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity

More information

Signal Processing IP for a Smarter, Connected World. May 2017

Signal Processing IP for a Smarter, Connected World. May 2017 Signal Processing IP for a Smarter, Connected World May 2017 Forward Looking Statements This presentation contains forward-looking statements that involve risks and uncertainties, as well as assumptions

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Cyber Security: Threat and Prevention

Cyber Security: Threat and Prevention Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will

More information

An outlook on INTELLIGENCE in 2024

An outlook on INTELLIGENCE in 2024 An outlook on INTELLIGENCE in 2024 Paul Gray, Research Director, paul.gray@ihsmarkit.com +44 7810 854646 2018 IHS Markit. All Rights Reserved. Top 8 Transformative Technology predictions for 2018 / April

More information

New York Analyst Day. November 12, 2009

New York Analyst Day. November 12, 2009 New York Analyst Day November 12, 2009 1 Steve Altman President 2 Safe Harbor Before we proceed with our presentation, we would like to point out that the following discussion will contain forward-looking

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS

CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS analysysmason.com RESEARCH FORECAST REPORT CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 About this report This report

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

2018 Edition. Security and Compliance for Office 365

2018 Edition. Security and Compliance for Office 365 2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS

AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS The Software-Enabled Automobile Software is a key differentiating factor for today s automakers. It is critical to harnessing the opportunities of autonomous

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

Cyber Threat Landscape April 2013

Cyber Threat Landscape April 2013 www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve

More information

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com

More information

ISG Provider Lens TM

ISG Provider Lens TM ISG Provider Lens TM 2019 Definition Facebook s data leakage affair attracted the public s attraction to data security again. This is a very striking example for an unwanted use of data, but not comparable

More information

OVERVIEW BROCHURE GRC. When you have to be right

OVERVIEW BROCHURE GRC. When you have to be right OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance

More information

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity. Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

Back to the Future Cyber Security

Back to the Future Cyber Security Back to the Future Cyber Security A manifesto for Cyber Security and the Industrial Legacy Introduction Industrial facilities and infrastructure form the core of our economy and society. These advanced

More information

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

SEVEN Networks Open Channel Traffic Optimization

SEVEN Networks Open Channel Traffic Optimization SEVEN Networks Open Channel Traffic Optimization Revision 3.0 March 2014 The Open Channel family of software products is designed to deliver device-centric mobile traffic management and analytics for wireless

More information

A Perspective on V2X in the United States

A Perspective on V2X in the United States A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected

More information