SlideShare a Scribd company logo
1 of 16
Digital Transformation and Data Protection
in Automotive Industry
Av. Özlem Kurt Karayürek, LL.M. – Av. Serter Öztürk, MCSE, MCT
The Digital Enterprise Wave
• Big Data & Analytics
• Internet of Things
• Artificial Intelligence
• 3D Printers
• Industry 4.0..
«..the "car of the future" will be intelligent, inter-connected and instrumented and will
c o m m u n i c at e, s o c i a l i ze a n d c o l l ab or at e with other vehicles, traffic lights, parking bays,
billboards, (self-tailored ads) and retailers..»
Title and Content Layout with List
• Add your first bullet point here
• Add your second bullet point here
• Add your third bullet point here
• Adopting a new mindset @
• adding value means considering
customer experience, connectivity &
mobility benefits.
• Age of Doing More with Less
Less Time +
Less Cost +
Less Error
= More..
How the «Auto» Digitally Transforms
• Digital Service Planning - Remote Diagnostics
• Digital Showroom Experience – «Showrooming»
• Customers are using smart apps & gadgets when visiting
• «Info-tainment» : Customers expect their car to be an extension
of their home, office, club etc.
• «..the fear of OEMs is that a car will become a smartphone on
wheels, with cars built around their entertainment value rather
than their hardware value.. P. Fielden – IBM»
• Augmented Reality glasses create new driving experience:
• New Gadgets create a «Want to have and «Want to Use»
feeling!
Today Connected World Presents New Security Issues
• significant new opportunities vs a set of security issues
• requires new ways of thinking that can defend the customers against attackers
and privacy abuses
• Executives list cyber-attack vulnerability as their most important privacy
concern
• Previously closed & secure dosed systems now offer remote access and control
• Press reports indicate hackers have already breached everything from major
corporate databases to thousands of everyday consumer devices
« . . F o r t h e i n d u s t r y t o s u c c e e d t h i s t r a n s f o r m a t i o n , o r g a n i za t i o n s a n d
c o n s u m e r s n e e d t o b e l i e v e t h a t i t s b e n e f i t s o u t w e i g h i t s r i s k s . . »
OEMs and dealers need to offer new consumer services
« . . t h e f e a r o f O E M s i s
t h a t a c a r w i l l b e c o m e
a s m a r t p h o n e o n w h e e l s ,
w i t h c a r s b u i l t a r o u n d
t h e i r e n t e r t a i n m e n t
v a l u e r a t h e r t h a n t h e i r
h a r d w a r e v a l u e . . »
P. Fielden, IBM
You are already connected !
3 yet reported cases – OEMs have to adequetaly be prepared
• Fiat Chrysler Automobiles recalled 1.4 million vehicles in US over a
vulnerability in dashboard computers that allowed hackers to disable
the vehicle
• White hat hackers broke into General Motor's Onstar system
• White hat hackers plugged into a Tesla Model S to implant malware
into the car's central computer
« . . e s t i m a t i o n s t r a n s p i r e s t h a t 1 0 4 m i l l i o n c a r s w i l l h a v e s o m e f o r m o f
c o n n e c t i v i t y b y 2 0 2 5 . . »
LAW : Updates are needed to secure the risks coming
with the new revolution
• This expedited timeline has created vehicles with advanced capabilities but few protections!
• Governments are very sensitive about car safety and cyber security issues. For 2017,
connectivity is already prioritized on lawmakers’ agendas. It is obvious that
the automotive industry’s growth trajectory does not leave much time for reflection.
• Data privacy and cybersecurity will become a strong selling point for car buyers. The key
will be providing a smooth communication in an easy to understand way despite such
protective features .
N e w c a t e g o r i e s o f f i l e s w i l l f o r m i n l e g i s l a t i o n s ; D r i v e r le s s / A u t o n o m o u s
Ve h i c l e s a n d C r a s h Av o i d a n c e Te c h n o l o g i e s - i n c a s e o f a n a c c i d e n t - w h o
w i l l b e t h e f a u l t y, w h o w i l l b e p u n i s h e d : )
Five Principles of Data Protection
in-the-car to which the Industry will Adhere
• Transparency
• Customer Choice
• ‘Privacy by Design’
• Data Security
• Proportionate Use of Data
« . . E u r o p e a n A u t o m o b i l e M a n u f a c t u r e r s ’ A s s o c i a t i o n ( A C E A ) h a s j u s t
p u b l i s h e d t h e industry’s strategy paper on connectivity , w h i c h
a d d r e s s e s i s s u e s s u c h a s d a t a p r o t e c t i o n a n d a c c e s s t o v e h ic l e
d a t a b y t h i r d p a r t i e s . . »
Automobile Law
Data Protection in the Car
• Geolocation Information, must be in the form of a
warrant or court order or applicable statutory
authority;
• Data Minimization, De-Identıification &
Retention (..Covered Information should retain no
longer than they determine necessary for
legitimate business purposes..)
• Data security (.. commit to implementing
reasonable measures to protect Covered
Information against loss and unauthorized access
or use..)
DATA: New Currency or New Headache ? -I
• COMPANIES ARE NOT TRANSPARENT OR RESPONSIVE
• Over half of the organizations surveyed (57%) are not transparent about what they do with
personal information collected.
• Most (%61) say they are not quick to respond to customer privacy complaints.
• COMPANIES ARE LAX ON REGULATORY COMPLIANCE
• Many companies struggle to comply with increasing and evolving regulatory requirements around the
globe.
• 6 out of 10 companies (61%) do not strictly enforce compliance regulations
DATA: New Currency or New Headache ? -II
• COMPANIES FAIL TO ENGAGE EMPLOYEES
• The ePRl found a majority of companies fail to address the potential risk presented by poor
employee education.
• Over half (57%) of companies think their employees do not understand the importance of
security and privacy.
• 2 out of 3 companies surveyed do not proactively educate employees on privacy and security
issues
• COMPANIES FAIL TO PRIORITIZE
• 53% Believe a data breach would not adversely impact company reputation
• 60% Do not consider privacy and protection of personal information a corporate priority
• 61% Don't have a high level executive managing privacy programs
The Current Situation in Turkey -I
The Current Situation in Turkey -II
Questions
Answers
Thank You !

More Related Content

What's hot

Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Three Faces of Information Governance
Three Faces of Information GovernanceThree Faces of Information Governance
Three Faces of Information GovernanceJohn Mancini
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
 
4 Reasons Finance Execs Should be Transformation Ninjas
4 Reasons Finance Execs Should be Transformation Ninjas4 Reasons Finance Execs Should be Transformation Ninjas
4 Reasons Finance Execs Should be Transformation NinjasJohn Mancini
 
Investments in Compliance and Legal Automation and the AI Factor
Investments in Compliance and Legal Automation and the AI FactorInvestments in Compliance and Legal Automation and the AI Factor
Investments in Compliance and Legal Automation and the AI FactorVladimir Vereskoun
 
Is IT Really the Villain? - Future of Technology in the Enterprise
Is IT Really the Villain? - Future of Technology in the EnterpriseIs IT Really the Villain? - Future of Technology in the Enterprise
Is IT Really the Villain? - Future of Technology in the EnterpriseJohn Mancini
 
How is Big Content Different From Big Data?
How is Big Content Different From Big Data?How is Big Content Different From Big Data?
How is Big Content Different From Big Data?John Mancini
 
Artificial Intelligence in FinTech
Artificial Intelligence in FinTechArtificial Intelligence in FinTech
Artificial Intelligence in FinTechSpotle.ai
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial servicesWhite & Case
 
Cognitive Sustainability Presentation for Berkeley
Cognitive Sustainability Presentation for Berkeley Cognitive Sustainability Presentation for Berkeley
Cognitive Sustainability Presentation for Berkeley Daryl Pereira
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information OpportunityJohn Mancini
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 

What's hot (20)

China's race to ai dominance
China's race to ai dominanceChina's race to ai dominance
China's race to ai dominance
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Three Faces of Information Governance
Three Faces of Information GovernanceThree Faces of Information Governance
Three Faces of Information Governance
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
 
4 Reasons Finance Execs Should be Transformation Ninjas
4 Reasons Finance Execs Should be Transformation Ninjas4 Reasons Finance Execs Should be Transformation Ninjas
4 Reasons Finance Execs Should be Transformation Ninjas
 
Investments in Compliance and Legal Automation and the AI Factor
Investments in Compliance and Legal Automation and the AI FactorInvestments in Compliance and Legal Automation and the AI Factor
Investments in Compliance and Legal Automation and the AI Factor
 
Is IT Really the Villain? - Future of Technology in the Enterprise
Is IT Really the Villain? - Future of Technology in the EnterpriseIs IT Really the Villain? - Future of Technology in the Enterprise
Is IT Really the Villain? - Future of Technology in the Enterprise
 
How is Big Content Different From Big Data?
How is Big Content Different From Big Data?How is Big Content Different From Big Data?
How is Big Content Different From Big Data?
 
Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15
 
Artificial Intelligence in FinTech
Artificial Intelligence in FinTechArtificial Intelligence in FinTech
Artificial Intelligence in FinTech
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
 
Cognitive Sustainability Presentation for Berkeley
Cognitive Sustainability Presentation for Berkeley Cognitive Sustainability Presentation for Berkeley
Cognitive Sustainability Presentation for Berkeley
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 

Viewers also liked

Smarter commerce partner presentation final
Smarter commerce partner presentation finalSmarter commerce partner presentation final
Smarter commerce partner presentation finalBen Andre Heyerdahl
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
Smarter commerce overview
Smarter commerce overviewSmarter commerce overview
Smarter commerce overviewHarikrishnan M
 
Case study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.comCase study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.comRodney Birch
 
Qrious about Insights -- Big Data in the Real World
Qrious about Insights -- Big Data in the Real WorldQrious about Insights -- Big Data in the Real World
Qrious about Insights -- Big Data in the Real WorldGuy K. Kloss
 
Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...
Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...
Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...Hortonworks
 
Real-Time Analytics for Industries
Real-Time Analytics for IndustriesReal-Time Analytics for Industries
Real-Time Analytics for IndustriesAvadhoot Patwardhan
 
Webinar | Using Hadoop Analytics to Gain a Big Data Advantage
Webinar | Using Hadoop Analytics to Gain a Big Data AdvantageWebinar | Using Hadoop Analytics to Gain a Big Data Advantage
Webinar | Using Hadoop Analytics to Gain a Big Data AdvantageCloudera, Inc.
 
IBM Smarter Commerce - A Strategic Analysis
IBM Smarter Commerce - A Strategic AnalysisIBM Smarter Commerce - A Strategic Analysis
IBM Smarter Commerce - A Strategic AnalysisMadhuranath R
 
IBM Smarter Commerce Order Management for Communications
IBM Smarter Commerce Order Management for CommunicationsIBM Smarter Commerce Order Management for Communications
IBM Smarter Commerce Order Management for CommunicationsChris Shaw
 
Big Data Analytics - From Generating Big Data to Deriving Business Value
Big Data Analytics - From Generating Big Data to Deriving Business ValueBig Data Analytics - From Generating Big Data to Deriving Business Value
Big Data Analytics - From Generating Big Data to Deriving Business ValuePiyush Malik
 
A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...
A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...
A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...Hortonworks
 
Driving digital transformation in Automotive industry
Driving digital transformation in Automotive industryDriving digital transformation in Automotive industry
Driving digital transformation in Automotive industryDebashis Majumder
 
Global Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use Cases
Global Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use CasesGlobal Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use Cases
Global Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use CasesSanjay Sharma
 
Big Data & Analytics in the Manufacturing Industry: The Vaasan Group
Big Data & Analytics in the Manufacturing Industry: The Vaasan GroupBig Data & Analytics in the Manufacturing Industry: The Vaasan Group
Big Data & Analytics in the Manufacturing Industry: The Vaasan GroupIBM Analytics
 
Digital Transformation in Automotive
Digital Transformation in AutomotiveDigital Transformation in Automotive
Digital Transformation in AutomotiveStradablog
 
Whitepaper - Transforming the Energy & Utilities Industry with Smart Analytics
Whitepaper - Transforming the Energy & Utilities Industry with Smart AnalyticsWhitepaper - Transforming the Energy & Utilities Industry with Smart Analytics
Whitepaper - Transforming the Energy & Utilities Industry with Smart AnalyticseInfochips (An Arrow Company)
 
MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...
MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...
MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...MongoDB
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewPietro Leo
 
Digital Transformation in Automotive Industry Chinese-German CAR Symposium
Digital Transformation in Automotive Industry Chinese-German CAR SymposiumDigital Transformation in Automotive Industry Chinese-German CAR Symposium
Digital Transformation in Automotive Industry Chinese-German CAR Symposiumaccenture
 

Viewers also liked (20)

Smarter commerce partner presentation final
Smarter commerce partner presentation finalSmarter commerce partner presentation final
Smarter commerce partner presentation final
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
Smarter commerce overview
Smarter commerce overviewSmarter commerce overview
Smarter commerce overview
 
Case study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.comCase study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.com
 
Qrious about Insights -- Big Data in the Real World
Qrious about Insights -- Big Data in the Real WorldQrious about Insights -- Big Data in the Real World
Qrious about Insights -- Big Data in the Real World
 
Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...
Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...
Accelerating the Value of Big Data Analytics for P&C Insurers with Hortonwork...
 
Real-Time Analytics for Industries
Real-Time Analytics for IndustriesReal-Time Analytics for Industries
Real-Time Analytics for Industries
 
Webinar | Using Hadoop Analytics to Gain a Big Data Advantage
Webinar | Using Hadoop Analytics to Gain a Big Data AdvantageWebinar | Using Hadoop Analytics to Gain a Big Data Advantage
Webinar | Using Hadoop Analytics to Gain a Big Data Advantage
 
IBM Smarter Commerce - A Strategic Analysis
IBM Smarter Commerce - A Strategic AnalysisIBM Smarter Commerce - A Strategic Analysis
IBM Smarter Commerce - A Strategic Analysis
 
IBM Smarter Commerce Order Management for Communications
IBM Smarter Commerce Order Management for CommunicationsIBM Smarter Commerce Order Management for Communications
IBM Smarter Commerce Order Management for Communications
 
Big Data Analytics - From Generating Big Data to Deriving Business Value
Big Data Analytics - From Generating Big Data to Deriving Business ValueBig Data Analytics - From Generating Big Data to Deriving Business Value
Big Data Analytics - From Generating Big Data to Deriving Business Value
 
A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...
A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...
A Comprehensive Approach to Building your Big Data - with Cisco, Hortonworks ...
 
Driving digital transformation in Automotive industry
Driving digital transformation in Automotive industryDriving digital transformation in Automotive industry
Driving digital transformation in Automotive industry
 
Global Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use Cases
Global Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use CasesGlobal Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use Cases
Global Big Data Conference Hyderabad-2Aug2013- Finance/Manufacturing Use Cases
 
Big Data & Analytics in the Manufacturing Industry: The Vaasan Group
Big Data & Analytics in the Manufacturing Industry: The Vaasan GroupBig Data & Analytics in the Manufacturing Industry: The Vaasan Group
Big Data & Analytics in the Manufacturing Industry: The Vaasan Group
 
Digital Transformation in Automotive
Digital Transformation in AutomotiveDigital Transformation in Automotive
Digital Transformation in Automotive
 
Whitepaper - Transforming the Energy & Utilities Industry with Smart Analytics
Whitepaper - Transforming the Energy & Utilities Industry with Smart AnalyticsWhitepaper - Transforming the Energy & Utilities Industry with Smart Analytics
Whitepaper - Transforming the Energy & Utilities Industry with Smart Analytics
 
MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...
MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...
MongoDB IoT CITY Tour EINDHOVEN: Bosch & Tech Mahindra: Industrial Internet, ...
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of View
 
Digital Transformation in Automotive Industry Chinese-German CAR Symposium
Digital Transformation in Automotive Industry Chinese-German CAR SymposiumDigital Transformation in Automotive Industry Chinese-German CAR Symposium
Digital Transformation in Automotive Industry Chinese-German CAR Symposium
 

Similar to Digital Transformation and Data Protection in Automotive Industry

Digital Transformation and Data Protection
Digital Transformation and Data ProtectionDigital Transformation and Data Protection
Digital Transformation and Data ProtectionSerter Ozturk
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Next Generation of the Previously Unthinkable
Next Generation of the Previously UnthinkableNext Generation of the Previously Unthinkable
Next Generation of the Previously Unthinkableqmatheson
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Brian Pichman
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
 
Oracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life InsuranceOracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life Insurancepyakurelsharad
 
Manuel van lijf CX insurance summit 9 december 2020 incl speaker notes
Manuel van lijf CX insurance summit 9 december 2020 incl speaker notesManuel van lijf CX insurance summit 9 december 2020 incl speaker notes
Manuel van lijf CX insurance summit 9 december 2020 incl speaker notesManuel van Lijf
 
Let’s Build a Smarter Planet: Re-thinking the way Insurance works!
Let’s Build aSmarter Planet: Re-thinking the way Insurance works!Let’s Build aSmarter Planet: Re-thinking the way Insurance works!
Let’s Build a Smarter Planet: Re-thinking the way Insurance works!IBMAsean
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityJoel Cardella
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) Evolver Inc.
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 

Similar to Digital Transformation and Data Protection in Automotive Industry (20)

Digital Transformation and Data Protection
Digital Transformation and Data ProtectionDigital Transformation and Data Protection
Digital Transformation and Data Protection
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Next Generation of the Previously Unthinkable
Next Generation of the Previously UnthinkableNext Generation of the Previously Unthinkable
Next Generation of the Previously Unthinkable
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
CII: Addressing Gender Bias in Artificial Intelligence
CII: Addressing Gender Bias in Artificial IntelligenceCII: Addressing Gender Bias in Artificial Intelligence
CII: Addressing Gender Bias in Artificial Intelligence
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
Oracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life InsuranceOracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life Insurance
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Manuel van lijf CX insurance summit 9 december 2020 incl speaker notes
Manuel van lijf CX insurance summit 9 december 2020 incl speaker notesManuel van lijf CX insurance summit 9 december 2020 incl speaker notes
Manuel van lijf CX insurance summit 9 december 2020 incl speaker notes
 
Let’s Build a Smarter Planet: Re-thinking the way Insurance works!
Let’s Build aSmarter Planet: Re-thinking the way Insurance works!Let’s Build aSmarter Planet: Re-thinking the way Insurance works!
Let’s Build a Smarter Planet: Re-thinking the way Insurance works!
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Machine Learning In Insurance
Machine Learning In InsuranceMachine Learning In Insurance
Machine Learning In Insurance
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

Recently uploaded

Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理e9733fc35af6
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书F La
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 

Recently uploaded (20)

Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 

Digital Transformation and Data Protection in Automotive Industry

  • 1. Digital Transformation and Data Protection in Automotive Industry Av. Özlem Kurt Karayürek, LL.M. – Av. Serter Öztürk, MCSE, MCT
  • 2. The Digital Enterprise Wave • Big Data & Analytics • Internet of Things • Artificial Intelligence • 3D Printers • Industry 4.0.. «..the "car of the future" will be intelligent, inter-connected and instrumented and will c o m m u n i c at e, s o c i a l i ze a n d c o l l ab or at e with other vehicles, traffic lights, parking bays, billboards, (self-tailored ads) and retailers..»
  • 3. Title and Content Layout with List • Add your first bullet point here • Add your second bullet point here • Add your third bullet point here • Adopting a new mindset @ • adding value means considering customer experience, connectivity & mobility benefits. • Age of Doing More with Less Less Time + Less Cost + Less Error = More..
  • 4. How the «Auto» Digitally Transforms • Digital Service Planning - Remote Diagnostics • Digital Showroom Experience – «Showrooming» • Customers are using smart apps & gadgets when visiting • «Info-tainment» : Customers expect their car to be an extension of their home, office, club etc. • «..the fear of OEMs is that a car will become a smartphone on wheels, with cars built around their entertainment value rather than their hardware value.. P. Fielden – IBM» • Augmented Reality glasses create new driving experience: • New Gadgets create a «Want to have and «Want to Use» feeling!
  • 5. Today Connected World Presents New Security Issues • significant new opportunities vs a set of security issues • requires new ways of thinking that can defend the customers against attackers and privacy abuses • Executives list cyber-attack vulnerability as their most important privacy concern • Previously closed & secure dosed systems now offer remote access and control • Press reports indicate hackers have already breached everything from major corporate databases to thousands of everyday consumer devices « . . F o r t h e i n d u s t r y t o s u c c e e d t h i s t r a n s f o r m a t i o n , o r g a n i za t i o n s a n d c o n s u m e r s n e e d t o b e l i e v e t h a t i t s b e n e f i t s o u t w e i g h i t s r i s k s . . »
  • 6. OEMs and dealers need to offer new consumer services « . . t h e f e a r o f O E M s i s t h a t a c a r w i l l b e c o m e a s m a r t p h o n e o n w h e e l s , w i t h c a r s b u i l t a r o u n d t h e i r e n t e r t a i n m e n t v a l u e r a t h e r t h a n t h e i r h a r d w a r e v a l u e . . » P. Fielden, IBM
  • 7. You are already connected ! 3 yet reported cases – OEMs have to adequetaly be prepared • Fiat Chrysler Automobiles recalled 1.4 million vehicles in US over a vulnerability in dashboard computers that allowed hackers to disable the vehicle • White hat hackers broke into General Motor's Onstar system • White hat hackers plugged into a Tesla Model S to implant malware into the car's central computer « . . e s t i m a t i o n s t r a n s p i r e s t h a t 1 0 4 m i l l i o n c a r s w i l l h a v e s o m e f o r m o f c o n n e c t i v i t y b y 2 0 2 5 . . »
  • 8. LAW : Updates are needed to secure the risks coming with the new revolution • This expedited timeline has created vehicles with advanced capabilities but few protections! • Governments are very sensitive about car safety and cyber security issues. For 2017, connectivity is already prioritized on lawmakers’ agendas. It is obvious that the automotive industry’s growth trajectory does not leave much time for reflection. • Data privacy and cybersecurity will become a strong selling point for car buyers. The key will be providing a smooth communication in an easy to understand way despite such protective features . N e w c a t e g o r i e s o f f i l e s w i l l f o r m i n l e g i s l a t i o n s ; D r i v e r le s s / A u t o n o m o u s Ve h i c l e s a n d C r a s h Av o i d a n c e Te c h n o l o g i e s - i n c a s e o f a n a c c i d e n t - w h o w i l l b e t h e f a u l t y, w h o w i l l b e p u n i s h e d : )
  • 9. Five Principles of Data Protection in-the-car to which the Industry will Adhere • Transparency • Customer Choice • ‘Privacy by Design’ • Data Security • Proportionate Use of Data « . . E u r o p e a n A u t o m o b i l e M a n u f a c t u r e r s ’ A s s o c i a t i o n ( A C E A ) h a s j u s t p u b l i s h e d t h e industry’s strategy paper on connectivity , w h i c h a d d r e s s e s i s s u e s s u c h a s d a t a p r o t e c t i o n a n d a c c e s s t o v e h ic l e d a t a b y t h i r d p a r t i e s . . »
  • 10. Automobile Law Data Protection in the Car • Geolocation Information, must be in the form of a warrant or court order or applicable statutory authority; • Data Minimization, De-Identıification & Retention (..Covered Information should retain no longer than they determine necessary for legitimate business purposes..) • Data security (.. commit to implementing reasonable measures to protect Covered Information against loss and unauthorized access or use..)
  • 11. DATA: New Currency or New Headache ? -I • COMPANIES ARE NOT TRANSPARENT OR RESPONSIVE • Over half of the organizations surveyed (57%) are not transparent about what they do with personal information collected. • Most (%61) say they are not quick to respond to customer privacy complaints. • COMPANIES ARE LAX ON REGULATORY COMPLIANCE • Many companies struggle to comply with increasing and evolving regulatory requirements around the globe. • 6 out of 10 companies (61%) do not strictly enforce compliance regulations
  • 12. DATA: New Currency or New Headache ? -II • COMPANIES FAIL TO ENGAGE EMPLOYEES • The ePRl found a majority of companies fail to address the potential risk presented by poor employee education. • Over half (57%) of companies think their employees do not understand the importance of security and privacy. • 2 out of 3 companies surveyed do not proactively educate employees on privacy and security issues • COMPANIES FAIL TO PRIORITIZE • 53% Believe a data breach would not adversely impact company reputation • 60% Do not consider privacy and protection of personal information a corporate priority • 61% Don't have a high level executive managing privacy programs
  • 13. The Current Situation in Turkey -I
  • 14. The Current Situation in Turkey -II