• Home
  • Webinars
  • Knowledge Partners
  • Experts
  • Become a Knowledge Partner
  • About
  • Contact
  • Webinars
  • Knowledge Partners
  • Experts
  • About
  • Contact

Home > Keynotes > Cyber Security > Page 2

Cyber Security

Securing automotive and smart mobility APIs

September 14, 2022
Connected VehiclesCyber SecurityDataSoftware

Experts from Ford Motor Company and Upstream discuss how the OEM approaches API security to protect their connected vehicles, services and applications.

Securing connected vehicle fleets with an adaptable, multi-network intrusion detection system

September 7, 2022
Connected VehiclesCyber SecurityDataE/E ArchitectureSoftwareStandards and RegulationsWireless Networks

Stephane Strahm and Cavy Pan explain how to integrate IDS software across multi-network environments and application processor “detection-isolation-report-response” algorithms.

The high-impact automotive cyber security trends and incidents of H1 2022

August 10, 2022
Connected VehiclesCyber SecurityDataElectric VehiclesSoftwareStandards and Regulations

Upstream’s Guy Molho and Shachar Azriel discuss three emerging cyber threats and their potential impact on end users, OEMs, and the entire smart mobility ecosystem.

The role of the Battery Management System in ISO/SAE 21434 compliance

August 3, 2022
Connected VehiclesCyber SecurityElectric Vehicle BatteryElectric VehiclesSoftware

Assaf Harel of Karamba Security provides unique insight into the Battery Management System (BMS), a critical vehicle component with significant risks ranging from intellectual property theft to human safety.

Automotive cybersecurity: a new dimension of processes and product

July 21, 2022
Connected VehiclesCyber SecurityDataIn-Vehicle InfotainmentSensorsSoftwareStandards and RegulationsWireless Networks

Puneet Makkar of Method Park by UL discusses modern automotive cybersecurity challenges and explains how OEMs and suppliers can overcome them to prepare for the evolving cybersecurity process landscape.

Electric vehicles: new drive systems, persistent cyber threats

July 20, 2022
Connected VehiclesCyber SecurityDataElectric VehiclesInternal Combustion EngineSoftware

Upstream’s Giuseppe Serio and Professor Hans-Joachim Hof of the Technische Hochschule Ingolstadt explain how stakeholders can implement threat analysis and make intelligent changes to secure the new E-mobility landscape.

Transforming the automotive industry with innovative hardware and intelligent software

June 29, 2022
Automotive DesignConnected VehiclesCyber SecurityPerception SystemsSensorsVehicle SafetyWireless Networks

Experts from Marvell and Elektrobit explain how innovative hardware solutions and intelligent software can jointly deal with the challenges posed by emerging connected vehicle trends.

Securing modern vehicles with AUTOSAR

June 28, 2022
Connected VehiclesCyber SecurityE/E ArchitectureSensorsSoftwareStandards and RegulationsWireless Networks

Michael Schneider of ETAS explains how AUTOSAR offers a way to implement a multi-level security approach by providing standardized security building blocks that can be used off the shelf.

Efficient and secure V2X PKI integration with a global harmonized solution

June 15, 2022
Autonomous VehiclesConnected VehiclesCyber SecurityDataSoftwareVehicle Safety

Norbert Bissmeyer and Omar Alshabibi of ETAS explain how OEMs can create efficient and secure V2X PKI integration with a global harmonized solution.

Android Automotive security assurance in a factory model

June 7, 2022
Connected VehiclesCyber SecurityIn-Vehicle InfotainmentSoftwareTesting and Validation

Sasken’s Narasimha Bashyam and Debashis Panigrahi explain how to stay on top of Android security releases to maintain customer loyalty.

The role of virtualization in connected vehicle infotainment systems

May 10, 2022
Connected VehiclesCyber SecurityIn-Vehicle InfotainmentSoftwareWireless Networks

Tero Salminen of OpenSynergy explains how virtualizing a single function increases connected vehicle systems security and makes updating and upgrading software components much more straightforward.

Scaling V2X deployments securely and reliably for autonomy

May 5, 2022
Autonomous VehiclesCyber SecurityDataMarket ForecastsSoftwareVehicle SafetyWireless Networks

Sasken’s Vasudevan Mukundan and Debashis Panigrahi discuss a cloud-native framework that could scale V2X deployments reliably and securely, reducing cost and time-to-market.

How to manage secure resource sharing on next-generation E/E architectures

May 5, 2022
Connected VehiclesCyber SecurityE/E ArchitectureSoftware

Andrew Coombes and Rohan Pandit of ETAS present a use case of integrating an HSM into a microcontroller hypervisor system.

How to achieve fast, flexible, and secure in-vehicle communication for next-generation vehicles

April 20, 2022
Connected VehiclesCyber SecurityDataE/E ArchitectureSoftwareWireless Networks

Elektrobit’s Illia Safiulin provides unique insight into the demands on software solutions needed for new zonal architectures in connected vehicles.

A lifecycle approach to vehicle cybersecurity in days of supply chain shortages

April 6, 2022
Connected VehiclesCyber SecurityDataSoftwareStandards and Regulations

AVL’s Harald Petschnik and Guy Gilam of Cybellum explore the impact of cybersecurity trends on the automotive ecosystem.

Staying ahead of hackers with an adaptable, multi-network vehicle intrusion detection system

March 31, 2022
Connected VehiclesCyber SecurityDataE/E ArchitectureSoftwareWireless Networks

Garrett’s Stephane Strahm and Cavy Pan present an IDS software that integrates multi-network and application processor detection-isolation-report-response algorithms.

How to build an automotive cybersecurity incident response team

February 16, 2022
Connected VehiclesCyber SecurityDataStandards and Regulations

ESCRYPT’s Dr Moritz Minzlaff and Dr Carolina Adaros of Robert Bosch explain how to build an automotive cybersecurity incident response team.

Automotive fuzzing: unmasking hidden security risks

December 14, 2021
Connected VehiclesCyber SecuritySoftwareTesting and Validation

ESCRYPT experts Joe Cusumano and John McShane discuss automotive-specific fuzzing, a robust testing technique that unmasks hidden security risks in automotive systems.

Future trends in HSM-driven automotive cybersecurity

December 9, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureMarket ForecastsSoftware

ESCRYPT’s Rohan Pandit and Suraj Ramachandrappa discuss future market trends and requirements regarding the HSM in the automotive cybersecurity domain towards next-generation vehicle E/E architectures.

Tying WP.29 cybersecurity requirements to mitigation verification testing

November 23, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and ValidationWireless Networks

Thomas Leifert of Keysight Technologies explains how UNECE WP.29 UN R155 relates to ISO/SAE 21434, the implications to the automotive industry, and how a successful implementation might look.

  1. ←
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. →
  1. ←
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. →
Mobex by Automotive World
1 – 3 The Washington Building
Stanwell Road
Penarth CF64 2AD
United Kingdom

Sign up for emails and never miss a webinar. Opt out or change your preferences at any time.

© Automotive World Ltd 2022. All rights reserved.

  • Become a Knowledge Partner
  • Terms and Conditions
  • Privacy Policy

Create a free account to view all
webinar videos and slide decks

Already have a Mobex account? .

* Required field

Hidden
Hidden

Which future mobility topics interest you most?

Which future mobility topics interest you most?

*
I want to receive emails regarding upcoming Mobex webinars.
I want to receive informative emails from third party Knowledge Partners whose presentations I view on this site.
This field is for validation purposes and should be left unchanged.

Log in to your account

Forgot password