DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

Similar documents
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Automotive Cyber Security

Bradford J. Willke. 19 September 2007

NIS-Directive and Smart Grids

General Framework for Secure IoT Systems

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

National Infrastructure Protection Plan (NIPP) Transportation Sector Specific Plan (TSSP) and The TSSP R&D Working Group

Strategy for information security in Sweden

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Commonwealth Cyber Declaration

Directive on security of network and information systems (NIS): State of Play

How to adjust and improve the security level of infrastructure

Cyber Security in Europe

Standardization for DRR: Opportunities or barriers?

STRATEGIC PLAN. USF Emergency Management

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Critical Information Infrastructure Protection Law

HPH SCC CYBERSECURITY WORKING GROUP

National Policy and Guiding Principles

Heavy Vehicle Cyber Security Bulletin

Professional Training Course - Cybercrime Investigation Body of Knowledge -

The NIS Directive and Cybersecurity in

CIRT: Requirements and implementation

Big Data Value cppp Big Data Value Association Big Data Value ecosystem

Cyber Security Strategy

Authentication with Privacy for Connected Cars - A research perspective -

RESOLUTION 130 (REV. BUSAN, 2014)

How can the Future Internet

Overview of the Cybersecurity Framework

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

ENISA EU Threat Landscape

H2020 WP Cybersecurity PPP topics

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

Cybersecurity The Rough Road Beyond Awareness

Big data privacy in Australia

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach

Package of initiatives on Cybersecurity

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

European Activities towards Cooperative Mobility

align security instill confidence

Security Challenges with ITS : A law enforcement view

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Business continuity management and cyber resiliency

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

Innovation policy for Industry 4.0

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

Cesium Co. Ltd., Company Profile. Certification. Laboratory. Metrology Standards. When Performance Matters. Testing Quality

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Summary of Cyber Security Issues in the Electric Power Sector

Vulnerability Assessments and Penetration Testing

The NIST Cybersecurity Framework

Internet of Things Toolkit for Small and Medium Businesses

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

A regulatory framework for connected and automated driving Towards a strengthened cooperation

THE POWER OF TECH-SAVVY BOARDS:

Next Generation Policy & Compliance

Exploring threats and opportunities through Mega Trends in the Space 4.0 era

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Economic and Social Council

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Securing Europe's Information Society

Cyber Security Beyond 2020

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Call for Expressions of Interest

Discussion on MS contribution to the WP2018

Position Title: IT Security Specialist

Legal and Regulatory Developments for Privacy and Security

ISAO SO Product Outline

IPv6 Task Force - Phase II. Welcome

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Developing your GDPR response for competitive advantage. EU General Data Protection Regulation (GDPR)

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

HEALTH IN ECSO (European Cyber Security Organisation) 18 October 2017

Secure Product Design Lifecycle for Connected Vehicles

Horizon 2020 Secure Societies WP 2017 Border Security and External Security (BES)

Controlling traffic In a Connected world

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cybersecurity Strategy of the Republic of Cyprus

The EU Vision on Connected and Automated Driving (and its implementation via H2020)

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Strategic Transport Research and Innovation Agenda - STRIA

Platform Economy and Trustworthiness Standardization

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

General Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN!

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

GIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field

European Union Agency for Network and Information Security

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

G7 Bar Associations and Councils

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Directive on Security of Network and Information Systems

Transcription:

DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY

Content Reminder The mission of the program Scope of the program Status regarding applications How to get more applications within Processes and Technology Management How to melt together different intiatives 2

Build knowledge Vehicles are becoming increasingly automated, connected and personalized, and finally a system connected to (all?) other societal systems Cyber crimes will be an endless real threat to the industry Cyber security is not crisis management We have a common responsibility!

Mission for the FFI-Program Automotive Security and Privacy The mission is to improve product quality and safety as well as to contribute to sustainable transport systems and society by adopting security-by-design and privacy-by-design approaches. Collaboration across OEMs, industrial partners, academia and research institutes along with other relevant stakeholders is expected to be established as a result of this program. This along with dissemination and exploitation of research results would allow for development of a critical mass of awareness, knowledge and competence in Sweden and minimization of vehicle related security risks. 4

Scope of the FFI-Program Automotive Security and Privacy Security Engineering Estimating impact of security and privacy breaches Security requirements and mechanisms Key management Development of novel technologies Adapting existing technologies from other industrial domains Methods and tools Security testing, verification and validation (V&V) E/E system architecture and ECU platform Software platform and software security Intrusion detection and tolerance Processes and Technology Management Societal aspects, human and organization factors Incident management Processes to support end-to-end vehicle security Development and organization processes Interplay among security, privacy and safety Automation, Connected and Autonomous Vehicles Needs from higher automation (cyber physical capabilities) Needs from exposure from communication technologies Security for wireless vehicle interface and wireless communication technologies Security for physical vehicle interface and wired communication technologies Security for vehicle-to-x (V2X) communication Impact of security on function performance IT architecture supporting ITS and connected vehicles Privacy and data protection Laws and regulations Exploitation, Dissemination and Standardization Exploitation of and alignment with on-going national and international research initiatives Activities to increase awareness and information exchange Training seminars, conferences and events Exploitation of and alignment with on-going European and international standardization initiatives and activities 5

Ongoing projects and? Security Engineering Processes and Technology Management Automation, Connected and Autonomous Vehicles Exploitation, Dissemination and Standardization Cyber Security and Privacy HoliSec HoliSec DEx? 6

Granted applications BAuD 2, Big Automotive Data 7

Processes and Technology Management Societal aspects Human and organizational factors Incident management Processes to support end to end vehicular security Development and organizational processes Interplay and trade-offs among security, privacy and safety 8

Societal Aspects, Trust and Security Societal aspects Human and organizational factors Incident management Processes to support end to end vehicular security Development and organizational processes Interplay and trade-offs among security, privacy and safety 9

How to get more applications within Societal Aspects, Trust and Security Spread the word Lift the challenges to the right level within the industry and involve relevant stakeholders as hostages Encourage inter-disciplinary initiatives See beyond the mobility area Define needs and common interest areas between SME and large cooperations Get support from international organizations when prioritizing 10

System Innovation and Transition Design Explore and impact root causes of complex problems Societal Aspects, Trust and Security Societal aspects, human and organization factors Incident management Processes to support end-to-end vehicle security Development and organization processes Interplay among security, privacy and safety INSIGHTS vision interventions /change root cause system dynamics people

Needs defined in EARPAs position paper Key research needs 1. Vehicle as a cyber-physical entity 2. Secure vehicle in unsecure environment 3. Secured operations in an unsecure environment 4. Secured ownership in an unsecure environment 12

How to melt together different initiatives FFI program Other Swedish initiatives EARPA Position paper ARTEMIS/ECSEL ECSO Road map? Security Engineering Automation, Connected and Autonomous Vehicles Process and Technology Management Exploitation, Dissemination and Standardization Security Engineering Automation, Connected and Autonomous Vehicles Process and Technology Management Exploitation, Dissemination and Standardization Key Research Needs Key Research Needs 13

14 Thank you for listening!