Securing Mobility Summit @ AutoMobility LA 2018
26 NOVEMBER, 2018, LOS ANGELES
Emerging Security Technologies Speed Lunch
Enjoy a delicious catered lunch while receiving new product briefings from some of the most innovative automotive security companies in the world.
Solution Business Lead
Co-founder and Executive Chairman
Sensato Cybersecurity Solutions
Sr. Technology Consultant
G+D Mobile Security
Director of IoT Solutions
G+D Mobile Security
VP of Business Development
Chief Security Architect
Future of Privacy Forum
|1||Continental Breakfast / Networking||8:30am - 9:30am||Los Angeles Convention Center|
|2||Security Engineering For Autonomous Vehicles and Smart Cars||9:30am - 11:30am||Los Angeles Convention Center|
|3||Emerging Security Technologies Speed Lunch||11:30am - 2:00pm||Los Angeles Convention Center|
|4||National Security Challenges and Business Risks||2:00pm - 4:30pm||Los Angeles Convention Center|
Speaker: Chris Ballinger
MOBI’s first projects develop blockchain use cases and technology standards for automotive applications. Our first project is to build a vehicle digital identity prototype or car passport that can track and secure a vehicle’s odometer and relevant data on distributed ledgers. This can dramatically reduce fraud in used car sales as buyers can finally have an accurate vehicle history.
MOBI’s roadmap includes several other high-value use cases for blockchain in mobility, like setting common and interoperable data and technology standards and addressing notable challenges in blockchain R&D such as protocol and application scalability and security. Each use case will be developed by specialist committees within MOBI and led by consumer-facing mobility providers in the consortium. Through open co-development in MOBI committees, these solutions have a much higher likelihood of industry-wide adoption than if they were built by any player independently.
Speaker: Lauren Smith
Autonomous vehicles are positioned to transform the future of mobility—a change enabled by new on-board sensors that collect and transmit growing types and quantities of data. While data in vehicles is not entirely new, autonomous vehicles promise an explosion in the variety, connectivity, volume of such data. As consumer privacy increasingly becomes a contentious political issue, autonomous cars will raise new and unique considerations around what happens with that data—and how it is protected. As the automotive industry becomes more data-driven, getting consumer privacy right will become increasingly important for both car companies and technology companies that build in-car devices.
Speaker: John Gomez
The technical approaches to defending today’s vehicles is only one part of the equation. Understanding the audacity, innovation and tactics employed by cyber-criminals, spies and terrorists is just as important to solving the challenges of cybersecurity. During this highly dynamic and engaging discussion, you will be afforded a front-row seat inside the minds of todays most innovative and successful attackers. You will glimpse into their psychology, maturity and practices in order to better understand what you are up against.
Modern cars are not just electromechanical vehicles anymore. With each generation, they are becoming more and more connected, incorporating progressive, intelligent technologies to make vehicles more efficient, comfortable and safe. At the same time, new technologies like remote diagnostics, telematics and infotainment are bringing new challenges to the industry.
- Learn how malicious users could exploit connectivity opportunities of modern cars(Anatomy of attack).
- Explore how risks could be addressed without major changes to car development.
- Understand how cybersecurity expertise can be of help to improve car safety.
This talk will explore the challenges that the U.S. Army has in safeguarding its autonomous vehicles from network attacks as well as possible solutions to those challenges.
“3PO” is GRIMM’s mobile car hacking lab. Since nearly every modern car is Internet-connected, you no longer need physical access to break out of, or break into a vehicle. Hackers prove vehicles are not only insecure from a cybersecurity perspective, but because of that, also unsafe. From controlling the steering, accelerating, braking, and communications, this presents an extremely large attack surface. As automotive original equipment manufactures (OEM) and their Tier 1 direct suppliers have become more aware of the threat, their need for end-to-end hardware and software vulnerability assessments has grown. In an industry where most companies just tell you you have a problem, we created 3PO to actually demonstrate the problem, as well as raise awareness and help train folks while at conferences and exhibits.