SlideShare a Scribd company logo
1 of 23
Download to read offline
1October 2, 2015CSC Proprietary and Confidential 1October 2, 2015CSC Proprietary and Confidential
FROM CONNECTED TO SELF-DRIVING
— SECURING THE AUTOMOTIVE
REVOLUTION
Dr. Alexander Schellong
General Manager, Cybersecurity Division
Central & Eastern Europe, Italy and Turkey
2October 2, 2015CSC Proprietary and Confidential
TRAVEL AND
TRANSPORTATION
INSURANCE
MANUFACTURING
BANKING AND
CAPITAL MARKETS
HEALTHCARE
ENERGY AND
NATURAL RESOURCES
PUBLIC
SECTOR
TECHNOLOGY AND
CONSUMER SERVICES
About CSC
CONSULTING
BIG DATA AND
ANALYTICS
BUSINESS PROCESS SERVICES
AND OUTSOURCING
INFRASTRUCTURE
SERVICES
APPLICATIONS
SERVICES SOFTWARE AND IP
CYBERSECURITYCLOUD
NEXT-GEN
OFFERINGS
3October 2, 2015CSC Proprietary and Confidential
CSC Cybersecurity
CYBER
CONSULTING
SERVICES
CLOUD INTERNET
OF
THINGS
MOBILITY
SOCIAL
MANUFACTURING
TRAVEL AND
TRANSPORTATION
MANAGED
SECURITY
SERVICES
BIG DATA
HEALTHCARE
RISK MANAGEMENT
CENTERS
TECHNOLOGY
AND CONSUMER
SERVICES
PUBLIC
SECTOR
INSURANCE
APPLICATIONS
BUSINESS
OUTSIDE-IN
BANKING AND
CAPITAL
MARKETS
ENERGY AND
NATURAL
RESOURCES
BUSINESS
CONTINUITY/
DISASTER
RECOVERY
Third Platform,
Consumerization
of IT
4October 2, 2015CSC Proprietary and Confidential
Global Cybersecurity Service Portfolio 09/2015
BUSINESS CONTINUITY &
DISASTER RECOVERY
(BC/DR) SERVICES
IDENTITY
MANAGEMENT
CONSULTING
MANAGED SECURITY
SERVICES (MSS)
APPLICATION &
SOFTWARE
SECURITY
Static/Dynamic/Mobile
Scans (HP Fortify)
Compliance / Security Support
(Account Security Managers)
Risk / Security Assessment
Strategy & Information
Security & Risk Management
STRATEGIC &
TECHNICAL SECURITY
CONSULTING
APT / Penetration tests
Social Engineering
Physical Security
Red Team
Data Protection
Network, Mobile & Cloud Security
BSI / ISO / PCI
Audits & Audit Preparation
SOC Planning & Setup
FW / IDS / SIEM Implementation
Industrial Control Systems
Data Loss Prevention
Trainings
RFI / RFP Support
Common Criteria
FIPS
24x7x365 Global IAM
Operations & Support
Application Security
Device & Endpoint Security
Network Security
Cloud Security
Mobile Security
Global Cyberthreat Intelligence
Risk Management Center
Security Operations Center
Risk & Business Impact Analysis
BC/DR Plans, Reviews & Tests
Crisis Management
Global Incident Response /
24x7 Forensics
Training & Simulation
Mergers & Acquisition (M&A)
security due diligence
Secure Code Reviews
SAP
CERTIFICATION
SERVICE (LAB)
SECURITY HARDWARE &
SOFTWARE RESELLING
(Next-Generation) Firewalls
Antivirus / SIEM / IDS / IPS / DLP
Mobile / Endpoint Security
20+ Product partnersCryptography
BSI Grundschutz /
IS-Revision
Secure Software
Development Lifecycle
IAM Consulting &
Solution Architecture
Identity and Access
Governance
RFI / RFP Support
IAM Implementation &
Customization
Cloud SSO &
Federation
IAM Solution
Engineering
Provisioning Solutions
5October 2, 2015CSC Proprietary and Confidential
GLOBAL CYBERSECURITY
PROFESSIONALS
1,700+
INTEGRATED
GLOBAL RISK
MANAGEMENT
CENTERS
5+
YEARS PROVIDING
CYBERSECURITY
SERVICES
40+
GLOBAL ALLIANCE
PARTNERS
PROVIDING SECURITY
EXPERTISE
15+
PUBLIC &
PRIVATE
SECTOR
EXPERTISE
UK
Noida
Kuala Lumpur
Sydney
Newark
Global Scalability
6October 2, 2015CSC Proprietary and Confidential
MOBILE
SECURITY
CLOUD
SECURITY
NETWORK
SECURITY
ENDPOINT
SECURITY
APPLICATION
SECURITY
IDENTITY AND
ACCESS
MANAGEMENT Our deep industry knowledge,
security specialists, and
end-to-end solutions for
traditional and next-generation
technologies enable you to
securely adapt as your business
and risks change.
End-to-End Managed Security Services
7October 2, 2015CSC Proprietary and Confidential
Six decades of safety development to protect us from the
biggest risk factor in car mobility
8October 2, 2015CSC Proprietary and Confidential
Not this one
Volkswagen
9October 2, 2015CSC Proprietary and Confidential
That one
10October 2, 2015CSC Proprietary and Confidential
Who is the biggest risk in the future?
Ex Machina / Universal Studios (2015)
11October 2, 2015CSC Proprietary and Confidential
Known automotive attack vectors
•  ODB-II
Direct connector, USB, WiFi
•  Controller Area Network (CAN) (broadcast nature, DoS vulnerability, network segregation)
•  Electronic Control Unit (ECU)
–  Engine Control Unit (ECU) (access, reflashing while driving, deviation from standards
–  Body Control Unit (BCM)
–  Elctronic Break Control Module (ECBM)
–  Telematics unit (access)
–  Radio / Entertainment system (malicious music files)
–  Bluetooth (pass through vulnerabilities)
–  Tire Pressure Monitoring Systems (TPMS)
•  Suppliers, OEM and Dealers
12October 2, 2015CSC Proprietary and Confidential
Spoofing the LIDAR
13October 2, 2015CSC Proprietary and Confidential
GPS jamming and spoofing
14October 2, 2015CSC Proprietary and Confidential
Volkswagen’s Automotive Cybercrime: Emission control
Daily use
ECU/ECM
Test
15October 2, 2015CSC Proprietary and Confidential
Human error speaks against precautionary approach
- Level of automation +
-humanerrorrisks+
16October 2, 2015CSC Proprietary and Confidential
From 1 billion to 2 billion cars
Infographic Wired Magazine 2012
2050
2 billion cars
9 billion people
2030
200+ million
connected cars
2018
20+ million
connected cars
100 million lines of code per car & 17 Petabyte of data p.a.
17October 2, 2015CSC Proprietary and Confidential
OEM VM vs. IT market entrant approach
SW
Car
Car
SW
- Level of automation +
-Levelofcapabilities+
- Level of automation +
-Levelofcapabilities+
18October 2, 2015CSC Proprietary and Confidential
From connected to autonomous to self-driving
http://www.leftlaneadvisors.com/project/nhtsa-levels-of-vehicle-autonomy-infographic/
Today
19October 2, 2015CSC Proprietary and Confidential
Today’s automotive ecosystem
OEM
VM
Tier 1
Tier 1
Tier 1
Tier 2
Tier 2
Tier 2
Suppliers Producer Retail
Tier 3
Tier 3
Tier 3
Aut. Dealers
Aftermarket
Direct Sales
OES repair
Independent car sharing
Ind. ES manufacturers
Car Sharing
Ind. Dealers
Logistics
Assembler
Ind. retailers
Telematics provider
Logistics
Direct sales suppliers
Independent repair
20October 2, 2015CSC Proprietary and Confidential
Future automotive ecosystem
OEM
VM
Tier 1
Tier 1
Tier 1
Tier 2
Tier 2
Tier 2
Suppliers Producer Retail
Tier 3
Tier 3
Tier 3
Auth. Dealers
Aftermarket
Direct Sales
OES repair
Ind. repair
Ind. suppliers
Car Sharing
Ind. Dealers
Logistics
Assembler
Ind. retailers
Telematics provider
Logistics
Software / Apps / Content provider
Fleet Mgt. & provision (AMaaS)
Infrastructure
Smart devices
Smart roads
IT infrastructure & analytics provider
Security & monitoring provider
Ind. car sharing & fleet provision
Smart grid
App Store
S Mobility objects
21October 2, 2015CSC Proprietary and Confidential
The Cyber Disruption Opportunity Moves Outside the Walls
•  Live and work “without wires”
•  Demand for universal access
•  Work everywhere with any device
•  Mix personal and corporate lives and information
•  Information is currency and everyone wants it –
especially thieves
•  Universal access creates dynamic boundaries that
are tougher to protect
•  Ever advancing adversaries outpace traditional,
passive cyber defenses
New technology changes expectations
New technology expands and changes risk
Cybersecurity must respond proactively
•  New business opportunities have moved outside the
“castle” walls
•  Defensible security perimeters no longer exist
•  Products and services must anticipate and
continuously manage risks
22October 2, 2015CSC Proprietary and Confidential
Recommended Actions
Hardware / Software / Communications Regulations Culture/Operations
ECU hardening AV & Sec. Proxy Testing requirements Awareness Training
ECU consolidation IPS Operator license req. Cont. Threat analysis
Sec. architecture Sec. architecture Operator training req. Secure Prod. Lifecycle
Black box Cryptography Data collection Patch Mgt.
Segregation Sandboxing Data usage transp. Pentesting
Fail-safe mode Secure bot loader Black box SOC (AC+Org)
Last FS state ident. IAM Open codes ISAC
Time stamps Data storage R&D processes
Sec. Governance
Billing relationship?
Bug rewards program
23October 2, 2015CSC Proprietary and Confidential 23October 2, 2015CSC Proprietary and Confidential
THANK YOU
aschellong@csc.com

More Related Content

What's hot

Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHBlock Armour
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...Block Armour
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Qian Li Jin
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014iotisrael
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuityBlock Armour
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 

What's hot (20)

Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
 
6. mr. sastry vns idrbt
6. mr. sastry   vns idrbt6. mr. sastry   vns idrbt
6. mr. sastry vns idrbt
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 

Viewers also liked

Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016Angelo Campanale
 
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
Megatrends 2013: Manage the AcceleratingAmount of Software in CarsMegatrends 2013: Manage the AcceleratingAmount of Software in Cars
Megatrends 2013: Manage the Accelerating Amount of Software in CarsRed Bend Software
 
Critical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics InitiativeCritical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics InitiativeSasken Technologies Ltd.
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
M2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M AdoptionM2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M AdoptionRed Bend Software
 
connected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudconnected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudJoe Speed
 
The Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardThe Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardHitReach
 
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"Alexander Much
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Iddan Halevy
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekCODE BLUE
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalNewellNYC
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Joseph Hennawy
 
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software
 
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupIoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupOpen Mobile Alliance
 
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
Connected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlightsConnected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlightsCambridge Mobile Telematics
 

Viewers also liked (20)

Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016
 
Digital Car Telematics
Digital Car TelematicsDigital Car Telematics
Digital Car Telematics
 
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
Megatrends 2013: Manage the AcceleratingAmount of Software in CarsMegatrends 2013: Manage the AcceleratingAmount of Software in Cars
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
 
Critical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics InitiativeCritical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics Initiative
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
M2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M AdoptionM2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M Adoption
 
connected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudconnected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloud
 
The Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardThe Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry Forward
 
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
 
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupIoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
 
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Connected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlightsConnected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlights
 

Similar to From Connected To Self-Driving - Securing the Automotive Revolution

Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systemsHongwenZhang4
 
RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle GuardianPeter Laitin
 
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Bill Harpley
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)Frank Chee-Da TSAI (蔡其達)
 
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...ambitlick
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car SecuritySuresh Mandava
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxbrigel529
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheValentin Scinteie
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015SenZations Summer School
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 

Similar to From Connected To Self-Driving - Securing the Automotive Revolution (20)

Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systems
 
A Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation SystemA Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation System
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle Guardian
 
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)
 
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
СОЕДИНЕННЫЙ МИР
СОЕДИНЕННЫЙ МИРСОЕДИНЕННЫЙ МИР
СОЕДИНЕННЫЙ МИР
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, Karlshruhe
 
Iot
IotIot
Iot
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 

Recently uploaded

Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...amitlee9823
 
design a four cylinder internal combustion engine
design a four cylinder internal combustion enginedesign a four cylinder internal combustion engine
design a four cylinder internal combustion enginepiyushsingh943161
 
Tata_Nexon_brochure tata nexon brochure tata
Tata_Nexon_brochure tata nexon brochure tataTata_Nexon_brochure tata nexon brochure tata
Tata_Nexon_brochure tata nexon brochure tataaritradey27234
 
Chapter-1.3-Four-Basic-Computer-periods.pptx
Chapter-1.3-Four-Basic-Computer-periods.pptxChapter-1.3-Four-Basic-Computer-periods.pptx
Chapter-1.3-Four-Basic-Computer-periods.pptxAnjieVillarba1
 
Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxzohiiimughal286
 
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办ezgenuh
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingBruce Cox Imports
 
如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一
如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一
如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一opyff
 
John Deere 335 375 385 435 Service Repair Manual
John Deere 335 375 385 435 Service Repair ManualJohn Deere 335 375 385 435 Service Repair Manual
John Deere 335 375 385 435 Service Repair ManualExcavator
 
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...lizamodels9
 
Delhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay Nagar9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay NagarGenuineGirls
 
Hyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai Motor Group
 
John Deere Tractors 6130M 6140M Diagnostic Manual
John Deere Tractors  6130M 6140M Diagnostic ManualJohn Deere Tractors  6130M 6140M Diagnostic Manual
John Deere Tractors 6130M 6140M Diagnostic ManualExcavator
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfAggregage
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryPooja Nehwal
 

Recently uploaded (20)

(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
 
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
 
design a four cylinder internal combustion engine
design a four cylinder internal combustion enginedesign a four cylinder internal combustion engine
design a four cylinder internal combustion engine
 
Tata_Nexon_brochure tata nexon brochure tata
Tata_Nexon_brochure tata nexon brochure tataTata_Nexon_brochure tata nexon brochure tata
Tata_Nexon_brochure tata nexon brochure tata
 
Chapter-1.3-Four-Basic-Computer-periods.pptx
Chapter-1.3-Four-Basic-Computer-periods.pptxChapter-1.3-Four-Basic-Computer-periods.pptx
Chapter-1.3-Four-Basic-Computer-periods.pptx
 
Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptx
 
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop Working
 
如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一
如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一
如何办理女王大学毕业证(QU毕业证书)成绩单原版一比一
 
Call Girls in Shri Niwas Puri Delhi 💯Call Us 🔝9953056974🔝
Call Girls in  Shri Niwas Puri  Delhi 💯Call Us 🔝9953056974🔝Call Girls in  Shri Niwas Puri  Delhi 💯Call Us 🔝9953056974🔝
Call Girls in Shri Niwas Puri Delhi 💯Call Us 🔝9953056974🔝
 
John Deere 335 375 385 435 Service Repair Manual
John Deere 335 375 385 435 Service Repair ManualJohn Deere 335 375 385 435 Service Repair Manual
John Deere 335 375 385 435 Service Repair Manual
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
 
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
 
Delhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Mayur Vihar 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay Nagar9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay Nagar
 
Hyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRC
 
John Deere Tractors 6130M 6140M Diagnostic Manual
John Deere Tractors  6130M 6140M Diagnostic ManualJohn Deere Tractors  6130M 6140M Diagnostic Manual
John Deere Tractors 6130M 6140M Diagnostic Manual
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
 

From Connected To Self-Driving - Securing the Automotive Revolution

  • 1. 1October 2, 2015CSC Proprietary and Confidential 1October 2, 2015CSC Proprietary and Confidential FROM CONNECTED TO SELF-DRIVING — SECURING THE AUTOMOTIVE REVOLUTION Dr. Alexander Schellong General Manager, Cybersecurity Division Central & Eastern Europe, Italy and Turkey
  • 2. 2October 2, 2015CSC Proprietary and Confidential TRAVEL AND TRANSPORTATION INSURANCE MANUFACTURING BANKING AND CAPITAL MARKETS HEALTHCARE ENERGY AND NATURAL RESOURCES PUBLIC SECTOR TECHNOLOGY AND CONSUMER SERVICES About CSC CONSULTING BIG DATA AND ANALYTICS BUSINESS PROCESS SERVICES AND OUTSOURCING INFRASTRUCTURE SERVICES APPLICATIONS SERVICES SOFTWARE AND IP CYBERSECURITYCLOUD NEXT-GEN OFFERINGS
  • 3. 3October 2, 2015CSC Proprietary and Confidential CSC Cybersecurity CYBER CONSULTING SERVICES CLOUD INTERNET OF THINGS MOBILITY SOCIAL MANUFACTURING TRAVEL AND TRANSPORTATION MANAGED SECURITY SERVICES BIG DATA HEALTHCARE RISK MANAGEMENT CENTERS TECHNOLOGY AND CONSUMER SERVICES PUBLIC SECTOR INSURANCE APPLICATIONS BUSINESS OUTSIDE-IN BANKING AND CAPITAL MARKETS ENERGY AND NATURAL RESOURCES BUSINESS CONTINUITY/ DISASTER RECOVERY Third Platform, Consumerization of IT
  • 4. 4October 2, 2015CSC Proprietary and Confidential Global Cybersecurity Service Portfolio 09/2015 BUSINESS CONTINUITY & DISASTER RECOVERY (BC/DR) SERVICES IDENTITY MANAGEMENT CONSULTING MANAGED SECURITY SERVICES (MSS) APPLICATION & SOFTWARE SECURITY Static/Dynamic/Mobile Scans (HP Fortify) Compliance / Security Support (Account Security Managers) Risk / Security Assessment Strategy & Information Security & Risk Management STRATEGIC & TECHNICAL SECURITY CONSULTING APT / Penetration tests Social Engineering Physical Security Red Team Data Protection Network, Mobile & Cloud Security BSI / ISO / PCI Audits & Audit Preparation SOC Planning & Setup FW / IDS / SIEM Implementation Industrial Control Systems Data Loss Prevention Trainings RFI / RFP Support Common Criteria FIPS 24x7x365 Global IAM Operations & Support Application Security Device & Endpoint Security Network Security Cloud Security Mobile Security Global Cyberthreat Intelligence Risk Management Center Security Operations Center Risk & Business Impact Analysis BC/DR Plans, Reviews & Tests Crisis Management Global Incident Response / 24x7 Forensics Training & Simulation Mergers & Acquisition (M&A) security due diligence Secure Code Reviews SAP CERTIFICATION SERVICE (LAB) SECURITY HARDWARE & SOFTWARE RESELLING (Next-Generation) Firewalls Antivirus / SIEM / IDS / IPS / DLP Mobile / Endpoint Security 20+ Product partnersCryptography BSI Grundschutz / IS-Revision Secure Software Development Lifecycle IAM Consulting & Solution Architecture Identity and Access Governance RFI / RFP Support IAM Implementation & Customization Cloud SSO & Federation IAM Solution Engineering Provisioning Solutions
  • 5. 5October 2, 2015CSC Proprietary and Confidential GLOBAL CYBERSECURITY PROFESSIONALS 1,700+ INTEGRATED GLOBAL RISK MANAGEMENT CENTERS 5+ YEARS PROVIDING CYBERSECURITY SERVICES 40+ GLOBAL ALLIANCE PARTNERS PROVIDING SECURITY EXPERTISE 15+ PUBLIC & PRIVATE SECTOR EXPERTISE UK Noida Kuala Lumpur Sydney Newark Global Scalability
  • 6. 6October 2, 2015CSC Proprietary and Confidential MOBILE SECURITY CLOUD SECURITY NETWORK SECURITY ENDPOINT SECURITY APPLICATION SECURITY IDENTITY AND ACCESS MANAGEMENT Our deep industry knowledge, security specialists, and end-to-end solutions for traditional and next-generation technologies enable you to securely adapt as your business and risks change. End-to-End Managed Security Services
  • 7. 7October 2, 2015CSC Proprietary and Confidential Six decades of safety development to protect us from the biggest risk factor in car mobility
  • 8. 8October 2, 2015CSC Proprietary and Confidential Not this one Volkswagen
  • 9. 9October 2, 2015CSC Proprietary and Confidential That one
  • 10. 10October 2, 2015CSC Proprietary and Confidential Who is the biggest risk in the future? Ex Machina / Universal Studios (2015)
  • 11. 11October 2, 2015CSC Proprietary and Confidential Known automotive attack vectors •  ODB-II Direct connector, USB, WiFi •  Controller Area Network (CAN) (broadcast nature, DoS vulnerability, network segregation) •  Electronic Control Unit (ECU) –  Engine Control Unit (ECU) (access, reflashing while driving, deviation from standards –  Body Control Unit (BCM) –  Elctronic Break Control Module (ECBM) –  Telematics unit (access) –  Radio / Entertainment system (malicious music files) –  Bluetooth (pass through vulnerabilities) –  Tire Pressure Monitoring Systems (TPMS) •  Suppliers, OEM and Dealers
  • 12. 12October 2, 2015CSC Proprietary and Confidential Spoofing the LIDAR
  • 13. 13October 2, 2015CSC Proprietary and Confidential GPS jamming and spoofing
  • 14. 14October 2, 2015CSC Proprietary and Confidential Volkswagen’s Automotive Cybercrime: Emission control Daily use ECU/ECM Test
  • 15. 15October 2, 2015CSC Proprietary and Confidential Human error speaks against precautionary approach - Level of automation + -humanerrorrisks+
  • 16. 16October 2, 2015CSC Proprietary and Confidential From 1 billion to 2 billion cars Infographic Wired Magazine 2012 2050 2 billion cars 9 billion people 2030 200+ million connected cars 2018 20+ million connected cars 100 million lines of code per car & 17 Petabyte of data p.a.
  • 17. 17October 2, 2015CSC Proprietary and Confidential OEM VM vs. IT market entrant approach SW Car Car SW - Level of automation + -Levelofcapabilities+ - Level of automation + -Levelofcapabilities+
  • 18. 18October 2, 2015CSC Proprietary and Confidential From connected to autonomous to self-driving http://www.leftlaneadvisors.com/project/nhtsa-levels-of-vehicle-autonomy-infographic/ Today
  • 19. 19October 2, 2015CSC Proprietary and Confidential Today’s automotive ecosystem OEM VM Tier 1 Tier 1 Tier 1 Tier 2 Tier 2 Tier 2 Suppliers Producer Retail Tier 3 Tier 3 Tier 3 Aut. Dealers Aftermarket Direct Sales OES repair Independent car sharing Ind. ES manufacturers Car Sharing Ind. Dealers Logistics Assembler Ind. retailers Telematics provider Logistics Direct sales suppliers Independent repair
  • 20. 20October 2, 2015CSC Proprietary and Confidential Future automotive ecosystem OEM VM Tier 1 Tier 1 Tier 1 Tier 2 Tier 2 Tier 2 Suppliers Producer Retail Tier 3 Tier 3 Tier 3 Auth. Dealers Aftermarket Direct Sales OES repair Ind. repair Ind. suppliers Car Sharing Ind. Dealers Logistics Assembler Ind. retailers Telematics provider Logistics Software / Apps / Content provider Fleet Mgt. & provision (AMaaS) Infrastructure Smart devices Smart roads IT infrastructure & analytics provider Security & monitoring provider Ind. car sharing & fleet provision Smart grid App Store S Mobility objects
  • 21. 21October 2, 2015CSC Proprietary and Confidential The Cyber Disruption Opportunity Moves Outside the Walls •  Live and work “without wires” •  Demand for universal access •  Work everywhere with any device •  Mix personal and corporate lives and information •  Information is currency and everyone wants it – especially thieves •  Universal access creates dynamic boundaries that are tougher to protect •  Ever advancing adversaries outpace traditional, passive cyber defenses New technology changes expectations New technology expands and changes risk Cybersecurity must respond proactively •  New business opportunities have moved outside the “castle” walls •  Defensible security perimeters no longer exist •  Products and services must anticipate and continuously manage risks
  • 22. 22October 2, 2015CSC Proprietary and Confidential Recommended Actions Hardware / Software / Communications Regulations Culture/Operations ECU hardening AV & Sec. Proxy Testing requirements Awareness Training ECU consolidation IPS Operator license req. Cont. Threat analysis Sec. architecture Sec. architecture Operator training req. Secure Prod. Lifecycle Black box Cryptography Data collection Patch Mgt. Segregation Sandboxing Data usage transp. Pentesting Fail-safe mode Secure bot loader Black box SOC (AC+Org) Last FS state ident. IAM Open codes ISAC Time stamps Data storage R&D processes Sec. Governance Billing relationship? Bug rewards program
  • 23. 23October 2, 2015CSC Proprietary and Confidential 23October 2, 2015CSC Proprietary and Confidential THANK YOU aschellong@csc.com