Garrett’s Stephane Strahm and Cavy Pan present an IDS software that integrates multi-network and application processor detection-isolation-report-response algorithms.
ESCRYPT’s Dr Moritz Minzlaff and Dr Carolina Adaros of Robert Bosch explain how to build an automotive cybersecurity incident response team.
ESCRYPT experts Joe Cusumano and John McShane discuss automotive-specific fuzzing, a robust testing technique that unmasks hidden security risks in automotive systems.
ESCRYPT’s Rohan Pandit and Suraj Ramachandrappa discuss future market trends and requirements regarding the HSM in the automotive cybersecurity domain towards next-generation vehicle E/E architectures.
Thomas Leifert of Keysight Technologies explains how UNECE WP.29 UN R155 relates to ISO/SAE 21434, the implications to the automotive industry, and how a successful implementation might look.
Paul Wooderson of HORIBA MIRA discusses cybersecurity challenges and solutions when implementing the requirements of the new UNECE Regulation 155 and international standard ISO/SAE 21434.
AVL’s Stefan Marksteiner and Cybellum’s Eyal Traitel explain how cyber digital twins can be automatically derived from automotive components and subsequently used to formulate security tests that verify their cybersecurity.
NXP experts explain why designing ECUs for functional safety, cybersecurity, and AUTOSAR compliance requires an understanding of the embedded hardware and software components available for implementation.
ESCRYPT’s Siddharth Shukla and Andreas Weber discuss different cyber attack prevention techniques and how to combine them with IDS sensors to protect the vehicle E/E architecture.
Experts from ESCRYPT explain why it is essential to use a combination of automated SIEM and human expert teams for fleet security monitoring.
Experts from ESCRYPT provide unique insight into automotive security regulations and standards in China, including MIIT’s critical upcoming regulation.
ESCRYPT’s Jan Holle and Andreas Weber explain why distributed E/E architectures require a distributed IDPS that maps the specific protection needs of the vehicle systems.
Dr. Dennis Kengo Oka outlines a practical step by step guide to building fuzz testing into the CI pipeline using the Zephyr Project RTOS as an example.
SBD Automotive’s Jitesh Joshy and David McClure reveal how true success comes from marrying real-world pen test findings, deep threat modelling expertise, and insight into competitor adoption trends.
ESCRYPT experts discuss the global demands on the ESCRYPT Intrusion Detection and Prevention Solution (IDPS) and its several components based on a review of binding legislation.
EB experts discuss the latest UNECE regulations covering over-the-air software updates and explain how OEMs and suppliers can overcome evolving challenges to implement them successfully.
ESCRYPT’s Dr Michael Peter Schneider examines the security mechanisms included in the latest AUTOSAR releases and explains how they should be integrated into the Software Engineering Process.
Experts from OpenSynergy and LDRA discuss the inherent security of a virtualized architecture, and how that strength can be underpinned by applying secure development techniques to code that handles data passed between processes.
ESCRYPT’s cybersecurity experts discuss the organizational processes that OEMs and suppliers must implement to comply with the latest software update delivery regulations.
Experts from Elektrobit and Argus Cyber Security explain the need for a secure architecture and how to enforce security zones with intrusion detection and prevention systems.