In this presentation, analysts from Kelley Blue Book’s Automotive Industry Insights will illustrate how the connected car is quickly becoming an unrestricted playground for cyberthreats and how the next generation of in-car technology will intensify already-present vehicle vulnerabilities.
(Source: RSA USA 2016-San Francisco)
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
at Market Research in the Mobile World Europe
23 - 26 September 2014, Belin, Germany
This event is proudly organised by Merlien Institute
Check out our upcoming events by visiting http://www.mrmw.net
Lukas Neckermann's Presentation at the Dubai World Congress for Self Driving Vehicles 2019.
Presentation of the study results: Being Driven.
Neckermann Strategic Advisors
Being Driven
Connected Drivers: Public opinion and what it meansIpsos UK
According to research by Ipsos MORI for the RAC Foundation, the majority of drivers are interested in connected driving technologies, but both they and the wider public recognise how connections to the outside world have the potential to cause distractions and impact on safe driving.
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
Over the past few years, automotive security threats have gone from theory to reality. Tech-savvy thieves have stolen cars throughout Europe and North America. Online videos show hackers remotely hitting the brakes on cars in ways that can endanger drivers and passengers. Hackers can exploit some of these vulnerabilities from an adjacent lane without forewarning to the driver.
Other vulnerabilities are open to attack over the cellular network—from halfway around the world—and for large numbers of cars simultaneously.
Even though technology exists to solve many of these security problems, the challenges of deploying such technology in cars loom far larger than similar challenges do in traditional information technology (IT) systems. In traditional IT systems, most problems can be solved with a quick install, update, or configuration change—or at worst, restoring from a backup, executing a failover to a disaster recovery site, or calling in a breach response team to tackle the most sophisticated threats.
However, cars don’t work like that. Multi-year safety certification processes to meet Federal Motor Vehicle Safety Standards (FMVSS) requirements don’t engender the weekly, daily, and real-time security updates that IT teams enjoy. Nobody can call in a breach response team to investigate the millions of cars you’ve built, now happily garaged in millions of homes. A car can’t safely fail over to another car. Companies often use redundancies at critical IT layers to keep high-volume web services running reliably, but few, if any, carmakers can afford the NASA-like investment of doing this for every vehicle.
Protecting cars against such threats has to be done in a context that works both within the car, and at scale for carmakers. The responsibility doesn’t stop at the assembly line: It extends all the way from the carmakers to the full breadth, depth, and complexity of auto supplier relationships. Security is a concern at each tier of the value chain, and attackers seek the weakest links.
[Report] Decoding Sedan industry on social mediaSocial Samosa
The automobile industry has been speeding on social media and otherwise. With the massive consumer base residing on Facebook and Twitter, these brands choose to take this platform seriously.
A report by Konnect Insights showcases an analysis of the online presence and popularity of automobile brands. The report focuses on Sedan models of popular brands and how they’re performing on social media platforms.
The report suggests that audience discussing automobile brands on social platforms are overwhelmingly male - 70.42% overall. Audience analysis clearly defines that Hyundai (75.53%), Nissan (73.94%) and Skoda’s (73.29%) are the most male while Fiat Motors (35.45%), Honda (33.71%) and Chevrolet’s (32.16%) are the most female.
Toyota with 18% and Honda with 13% rejoice the major share of Twitter engagement, followed by Ford and Volkswagen both standing at 12% and Nissan at 11%, respectively. Maruti Suzuki and Fiat Motors have a poor engagement on the micro blogging platform with 1% and 2% engagement.
The story on Facebook is a tad bit different; Volkswagen with 42% grabbed the maximum attention of fans, followed by Nisaan with 25%, Chevrolet with 7%, Honda with 7%, and so on. The graphics clearly represent that Maruti's Facebook engagement was the lowest compared to the rest with only 0.011%.
Take a look at the report to understand the performance of automobile brands on social media.
Developing a Comprehensive Safe-Driving Program for TeensCognizant
A comprehensive teen safe-driving program should benefit teens, parents, and insurers. It can use mobile apps and telematics devices to monitor teen driving behavior, provide real-time alerts to parents if teens exceed speed limits or drive outside set areas, and give insurers meaningful data to reduce losses through predictive analytics. Cognizant's GeoLocus solution provides an integrated platform insurers can use to build such a program and create a win-win-win for all stakeholders through safer driving and lower insurance costs.
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
at Market Research in the Mobile World Europe
23 - 26 September 2014, Belin, Germany
This event is proudly organised by Merlien Institute
Check out our upcoming events by visiting http://www.mrmw.net
Lukas Neckermann's Presentation at the Dubai World Congress for Self Driving Vehicles 2019.
Presentation of the study results: Being Driven.
Neckermann Strategic Advisors
Being Driven
Connected Drivers: Public opinion and what it meansIpsos UK
According to research by Ipsos MORI for the RAC Foundation, the majority of drivers are interested in connected driving technologies, but both they and the wider public recognise how connections to the outside world have the potential to cause distractions and impact on safe driving.
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
Over the past few years, automotive security threats have gone from theory to reality. Tech-savvy thieves have stolen cars throughout Europe and North America. Online videos show hackers remotely hitting the brakes on cars in ways that can endanger drivers and passengers. Hackers can exploit some of these vulnerabilities from an adjacent lane without forewarning to the driver.
Other vulnerabilities are open to attack over the cellular network—from halfway around the world—and for large numbers of cars simultaneously.
Even though technology exists to solve many of these security problems, the challenges of deploying such technology in cars loom far larger than similar challenges do in traditional information technology (IT) systems. In traditional IT systems, most problems can be solved with a quick install, update, or configuration change—or at worst, restoring from a backup, executing a failover to a disaster recovery site, or calling in a breach response team to tackle the most sophisticated threats.
However, cars don’t work like that. Multi-year safety certification processes to meet Federal Motor Vehicle Safety Standards (FMVSS) requirements don’t engender the weekly, daily, and real-time security updates that IT teams enjoy. Nobody can call in a breach response team to investigate the millions of cars you’ve built, now happily garaged in millions of homes. A car can’t safely fail over to another car. Companies often use redundancies at critical IT layers to keep high-volume web services running reliably, but few, if any, carmakers can afford the NASA-like investment of doing this for every vehicle.
Protecting cars against such threats has to be done in a context that works both within the car, and at scale for carmakers. The responsibility doesn’t stop at the assembly line: It extends all the way from the carmakers to the full breadth, depth, and complexity of auto supplier relationships. Security is a concern at each tier of the value chain, and attackers seek the weakest links.
[Report] Decoding Sedan industry on social mediaSocial Samosa
The automobile industry has been speeding on social media and otherwise. With the massive consumer base residing on Facebook and Twitter, these brands choose to take this platform seriously.
A report by Konnect Insights showcases an analysis of the online presence and popularity of automobile brands. The report focuses on Sedan models of popular brands and how they’re performing on social media platforms.
The report suggests that audience discussing automobile brands on social platforms are overwhelmingly male - 70.42% overall. Audience analysis clearly defines that Hyundai (75.53%), Nissan (73.94%) and Skoda’s (73.29%) are the most male while Fiat Motors (35.45%), Honda (33.71%) and Chevrolet’s (32.16%) are the most female.
Toyota with 18% and Honda with 13% rejoice the major share of Twitter engagement, followed by Ford and Volkswagen both standing at 12% and Nissan at 11%, respectively. Maruti Suzuki and Fiat Motors have a poor engagement on the micro blogging platform with 1% and 2% engagement.
The story on Facebook is a tad bit different; Volkswagen with 42% grabbed the maximum attention of fans, followed by Nisaan with 25%, Chevrolet with 7%, Honda with 7%, and so on. The graphics clearly represent that Maruti's Facebook engagement was the lowest compared to the rest with only 0.011%.
Take a look at the report to understand the performance of automobile brands on social media.
Developing a Comprehensive Safe-Driving Program for TeensCognizant
A comprehensive teen safe-driving program should benefit teens, parents, and insurers. It can use mobile apps and telematics devices to monitor teen driving behavior, provide real-time alerts to parents if teens exceed speed limits or drive outside set areas, and give insurers meaningful data to reduce losses through predictive analytics. Cognizant's GeoLocus solution provides an integrated platform insurers can use to build such a program and create a win-win-win for all stakeholders through safer driving and lower insurance costs.
This document discusses road safety initiatives related to mobile phone use while driving. It notes that distracted driving is a leading cause of road accidents and outlines statistics showing increased risks associated with handheld and hands-free phone use. The document reviews UK laws banning handheld use and notes employers can face prosecution for employees' phone use while driving. A proposed solution involves software that automatically disables mobile phones when a vehicle is moving to increase safety and compliance.
These slides were presented at the Personalisation versus privacy event held by Ipsos MORI and King's college London, 11th February 2014. Full poll: http://www.ipsos-mori.com/researchpublications/researcharchive/3342/Three-in-four-Britons-are-worried-about-companies-collecting-information-about-them.aspx
The document discusses usage-based automobile insurance and consumer sentiment regarding insurance policies and telematics programs. It finds that consumers are most positively engaged when discussing savings from insurance discounts. However, they often complain about the process of shopping for insurance and poor customer service. The document also examines discussions around Progressive's Snapshot program, finding that while consumers like potential discounts, many are concerned about rates increasing or privacy issues. Overall consumers express a need for more education around usage-based insurance models.
VNG is Vietnam's largest social media and digital media company. It owns Zalo, Vietnam's most popular messaging app, similar to Line, WeChat, and Kakao. Vietnam has a rapidly growing mobile market and smartphone user base, with smartphone penetration expected to reach 70% by 2019. The mobile game market in Vietnam is also growing quickly and is expected to reach over $100 million by 2015. VNG aims to build up its mobile game publishing on Zalo to take advantage of these trends in the Vietnamese market.
Taking a look into the growing app economy throughout the Middle East & North Africa region, we examine who the typical consumer is, what they are looking for and how they find it.
A recent ABI Research global survey sponsored by the NFC Forum shows that contactless technologies like near field communication (NFC) are surging as consumers look for convenient and secure ways to pay, unlock and connect with the world around them.
Metromile is expanding its pay-per-mile auto insurance model to California after launching in other states. Their insurance targets the two-thirds of drivers who drive under 12,000 miles per year and they say customers save an average of 50-60% or $500 per year on their policies. Traditionally, auto insurers make more money from low-mileage drivers whose premiums subsidize high-mileage drivers, but Metromile aims to have equal margins across all customers. Along with the California expansion, Metromile also debuted a mobile app to track vehicle data and provide alerts to help drivers.
This document summarizes a consulting project report on Tesla. It identifies Tesla's strategic issues as the lack of charging infrastructure making long distance travel inconvenient and the high price of its vehicles limiting its market. Recommendations include cutting costs through economies of scale, creating state incentive programs, partnering to increase charging infrastructure, and increasing lobbying spending to allow direct sales.
The document discusses the connected car ecosystem and opportunities. It begins with an introduction and agenda that separates autonomous from connected cars and outlines connected car applications and the ecosystem. It then discusses rules and regulations governing the space. The document provides an overview of key players in the connected car industry, including automakers investing heavily in telematics and embedding these systems in most new vehicles by 2018. It also discusses the strategies of telecom companies to become end-to-end providers in the connected car value chain.
Autonomous cars, car sharing and electric vehiclesAnandRaoPwC
Talk presented at the second Autonomous Cars conference hosted by SwissRe in Armonk, NY on September 24, 2015. The talk covers the interaction between car sharing, autonomous cars and electric vehicles and how the feedback between these three areas will propel greater consumer adoption.
Hacking your Connected Car: What you need to know NOWKapil Kanugo
Cars these days are 90% controlled by electronics and 10% using mechanics. The average new car already contains around 20 individual processors to monitor and control various functions — everything from the transmission’s shift points to the operation of the defroster — with about 60 megabytes of software code.
Many new cars are as “wired” as a home office — with onboard GPS navigation and wireless communications networks including Bluetooth, Wi-Fi or Internet run on Embedded OS's which run on converged Electronics to control these actions.
What if modern car’s onboard electronics be “hacked” or infected by a computer virus introduced through a wireless device that might corrupt or disable or controlled by a Hacker sitting at home?
The software does come with built in security but this is not enough and there is a need to offer a full Security package along with Car to guarantee Car's security. Life of people is more important than a gadget and people will pay and buy this package with a new car or upgrade to ensure that their car is not hacked by Hackers to malfunction or be used for other pervert interests.
This document discusses cyber security challenges for connected cars. It notes connected cars have multiple attack surfaces through the internet, cloud, communication with other cars, and in-car systems. The document advocates for a layered security approach, including boundary security, transport-level security, and fine-grained data-centric security. It describes using Real-Time Innovation's Connext DDS Secure product to implement fine-grained security at the individual data topic level to control access and ensure proper system operation in a secure manner.
This document discusses connected car security threats and potential mitigation strategies. It provides an overview of hacks that have targeted connected vehicle systems. It also summarizes the SPY Car Act legislation which aims to establish cybersecurity and privacy standards for connected vehicles. Finally, it discusses some strategies for securing connected vehicle systems, such as implementing vehicle system security, vulnerability testing, data security, and attack mitigation capabilities.
Infographic under the hood of a connected car hackIBM Security
The document discusses security vulnerabilities in connected cars. Modern vehicles contain over 100 processors controlling critical systems, essentially making them computers on wheels. This presents multiple points of vulnerability, with primary attack points being the OBD2 port located under the dashboard and mobile applications interfacing with vehicle systems. Hackers can extract binary code from these systems, reverse engineer the software, and tamper with code to deploy malicious software affecting systems like the engine, brakes, or airbags. The infotainment system is also vulnerable due to hosting sensitive apps.
This document discusses automotive networks and control units. It explores how to communicate with and inject data into the CAN bus of different vehicles. Various attacks are demonstrated, including manipulating vehicle speed, braking, steering and reprogramming firmware. Both normal and diagnostic CAN packets are examined for the Ford Escape and Toyota Prius. The document concludes by discussing detecting such attacks and includes an appendix with a diagnostic ECU map.
The car industry is now at the exact same point the IT industry was decades ago. The problem is security has not been built into those system rather is has been bolted on. It is saddening to see all the past failures of the software industry have to be repeated by the car industry.
This document discusses the risks of hype around autonomous vehicles (AVs) undermining efforts to implement a "Safe Systems Approach" to road safety. It argues that AVs will have no impact on road injury prevention by 2030 due to major technological challenges. Near-term priority should be accelerating technologies already available like electronic stability control and autonomous emergency braking that can significantly reduce crashes and deaths according to studies. Waiting for perfect AVs is like hoping for a vaccine instead of using known prevention methods for an epidemic that can already be controlled.
Telefónica published a report in July 2014 titled "Connected Car Report 2014" which provided insights into the connected car market, challenges, and consumer awareness and demand for connected car products and services based on a survey of over 5,000 drivers in 5 countries. The report found that 71% of drivers were interested in or already using connected car services, with safety, diagnostics, and navigation features being the most important. It also found that 35% of consumers expected to use car sharing services rather than own a car by 2034. Telefónica is involved in connected car initiatives through its global M2M alliance, fleet management partnerships, providing connectivity for Tesla, and a telematics-based motor insurance policy
1. The document discusses autonomous vehicles and defines 5 levels of vehicle autonomy according to the NHTSA, ranging from level 0 with no automation to level 4 with full self-driving automation where the vehicle performs all driving functions and can operate without a human driver.
2. It provides an overview of the technologies that enable autonomous driving functions as well as the complex software and hardware required, including sensors, radar, lidar, GPS and advanced artificial intelligence systems.
3. The document discusses some of the impacts of increased autonomous vehicle adoption, such as changes to insurance markets, transportation infrastructure needs, and impacts on real estate including less demand for parking spaces.
The document discusses global demand for connected cars based on a survey conducted across 5 countries. Some key findings:
- 71% of drivers are interested in or already using connected car services.
- Drivers prefer safety/diagnostic features (73%) and want live traffic/navigation services.
- Over 40% see usage-based insurance as desirable.
- While demand is high, challenges remain around ownership cycles and business models for connectivity.
Automotive social media platform market research Street Formation.comSlideSigma
Street Formation is undoubtedly , the most game changing platform being introduced into the automotive industry. This platform will be released globally, fully laced with various innovative features and concepts to make our adrenaline filled passion a much more interesting one to be apart of. Street Formation is using modern day technologies to their full potential, allowing us to experience things that are currently nonexistent. We have built this platform with unmatched creativity. The automotive niche is one with many colors, personalities, and characters, many of these being displayed through out vehicle. The goal is to unite the industry on a global scale. While also connecting users near each other. We are bringing the emotion back that once roamed the car scene, and creating new ones in ways you can not even imagine.
Tracxn Research - Smart Cars Landscape, January 2017Tracxn
With most self-driving car makers expected to rollout fully autonomous versions by 2021, funding into vision-based technologies (a crucial component of smart cars) has gathered steam.
This document discusses road safety initiatives related to mobile phone use while driving. It notes that distracted driving is a leading cause of road accidents and outlines statistics showing increased risks associated with handheld and hands-free phone use. The document reviews UK laws banning handheld use and notes employers can face prosecution for employees' phone use while driving. A proposed solution involves software that automatically disables mobile phones when a vehicle is moving to increase safety and compliance.
These slides were presented at the Personalisation versus privacy event held by Ipsos MORI and King's college London, 11th February 2014. Full poll: http://www.ipsos-mori.com/researchpublications/researcharchive/3342/Three-in-four-Britons-are-worried-about-companies-collecting-information-about-them.aspx
The document discusses usage-based automobile insurance and consumer sentiment regarding insurance policies and telematics programs. It finds that consumers are most positively engaged when discussing savings from insurance discounts. However, they often complain about the process of shopping for insurance and poor customer service. The document also examines discussions around Progressive's Snapshot program, finding that while consumers like potential discounts, many are concerned about rates increasing or privacy issues. Overall consumers express a need for more education around usage-based insurance models.
VNG is Vietnam's largest social media and digital media company. It owns Zalo, Vietnam's most popular messaging app, similar to Line, WeChat, and Kakao. Vietnam has a rapidly growing mobile market and smartphone user base, with smartphone penetration expected to reach 70% by 2019. The mobile game market in Vietnam is also growing quickly and is expected to reach over $100 million by 2015. VNG aims to build up its mobile game publishing on Zalo to take advantage of these trends in the Vietnamese market.
Taking a look into the growing app economy throughout the Middle East & North Africa region, we examine who the typical consumer is, what they are looking for and how they find it.
A recent ABI Research global survey sponsored by the NFC Forum shows that contactless technologies like near field communication (NFC) are surging as consumers look for convenient and secure ways to pay, unlock and connect with the world around them.
Metromile is expanding its pay-per-mile auto insurance model to California after launching in other states. Their insurance targets the two-thirds of drivers who drive under 12,000 miles per year and they say customers save an average of 50-60% or $500 per year on their policies. Traditionally, auto insurers make more money from low-mileage drivers whose premiums subsidize high-mileage drivers, but Metromile aims to have equal margins across all customers. Along with the California expansion, Metromile also debuted a mobile app to track vehicle data and provide alerts to help drivers.
This document summarizes a consulting project report on Tesla. It identifies Tesla's strategic issues as the lack of charging infrastructure making long distance travel inconvenient and the high price of its vehicles limiting its market. Recommendations include cutting costs through economies of scale, creating state incentive programs, partnering to increase charging infrastructure, and increasing lobbying spending to allow direct sales.
The document discusses the connected car ecosystem and opportunities. It begins with an introduction and agenda that separates autonomous from connected cars and outlines connected car applications and the ecosystem. It then discusses rules and regulations governing the space. The document provides an overview of key players in the connected car industry, including automakers investing heavily in telematics and embedding these systems in most new vehicles by 2018. It also discusses the strategies of telecom companies to become end-to-end providers in the connected car value chain.
Autonomous cars, car sharing and electric vehiclesAnandRaoPwC
Talk presented at the second Autonomous Cars conference hosted by SwissRe in Armonk, NY on September 24, 2015. The talk covers the interaction between car sharing, autonomous cars and electric vehicles and how the feedback between these three areas will propel greater consumer adoption.
Hacking your Connected Car: What you need to know NOWKapil Kanugo
Cars these days are 90% controlled by electronics and 10% using mechanics. The average new car already contains around 20 individual processors to monitor and control various functions — everything from the transmission’s shift points to the operation of the defroster — with about 60 megabytes of software code.
Many new cars are as “wired” as a home office — with onboard GPS navigation and wireless communications networks including Bluetooth, Wi-Fi or Internet run on Embedded OS's which run on converged Electronics to control these actions.
What if modern car’s onboard electronics be “hacked” or infected by a computer virus introduced through a wireless device that might corrupt or disable or controlled by a Hacker sitting at home?
The software does come with built in security but this is not enough and there is a need to offer a full Security package along with Car to guarantee Car's security. Life of people is more important than a gadget and people will pay and buy this package with a new car or upgrade to ensure that their car is not hacked by Hackers to malfunction or be used for other pervert interests.
This document discusses cyber security challenges for connected cars. It notes connected cars have multiple attack surfaces through the internet, cloud, communication with other cars, and in-car systems. The document advocates for a layered security approach, including boundary security, transport-level security, and fine-grained data-centric security. It describes using Real-Time Innovation's Connext DDS Secure product to implement fine-grained security at the individual data topic level to control access and ensure proper system operation in a secure manner.
This document discusses connected car security threats and potential mitigation strategies. It provides an overview of hacks that have targeted connected vehicle systems. It also summarizes the SPY Car Act legislation which aims to establish cybersecurity and privacy standards for connected vehicles. Finally, it discusses some strategies for securing connected vehicle systems, such as implementing vehicle system security, vulnerability testing, data security, and attack mitigation capabilities.
Infographic under the hood of a connected car hackIBM Security
The document discusses security vulnerabilities in connected cars. Modern vehicles contain over 100 processors controlling critical systems, essentially making them computers on wheels. This presents multiple points of vulnerability, with primary attack points being the OBD2 port located under the dashboard and mobile applications interfacing with vehicle systems. Hackers can extract binary code from these systems, reverse engineer the software, and tamper with code to deploy malicious software affecting systems like the engine, brakes, or airbags. The infotainment system is also vulnerable due to hosting sensitive apps.
This document discusses automotive networks and control units. It explores how to communicate with and inject data into the CAN bus of different vehicles. Various attacks are demonstrated, including manipulating vehicle speed, braking, steering and reprogramming firmware. Both normal and diagnostic CAN packets are examined for the Ford Escape and Toyota Prius. The document concludes by discussing detecting such attacks and includes an appendix with a diagnostic ECU map.
The car industry is now at the exact same point the IT industry was decades ago. The problem is security has not been built into those system rather is has been bolted on. It is saddening to see all the past failures of the software industry have to be repeated by the car industry.
This document discusses the risks of hype around autonomous vehicles (AVs) undermining efforts to implement a "Safe Systems Approach" to road safety. It argues that AVs will have no impact on road injury prevention by 2030 due to major technological challenges. Near-term priority should be accelerating technologies already available like electronic stability control and autonomous emergency braking that can significantly reduce crashes and deaths according to studies. Waiting for perfect AVs is like hoping for a vaccine instead of using known prevention methods for an epidemic that can already be controlled.
Telefónica published a report in July 2014 titled "Connected Car Report 2014" which provided insights into the connected car market, challenges, and consumer awareness and demand for connected car products and services based on a survey of over 5,000 drivers in 5 countries. The report found that 71% of drivers were interested in or already using connected car services, with safety, diagnostics, and navigation features being the most important. It also found that 35% of consumers expected to use car sharing services rather than own a car by 2034. Telefónica is involved in connected car initiatives through its global M2M alliance, fleet management partnerships, providing connectivity for Tesla, and a telematics-based motor insurance policy
1. The document discusses autonomous vehicles and defines 5 levels of vehicle autonomy according to the NHTSA, ranging from level 0 with no automation to level 4 with full self-driving automation where the vehicle performs all driving functions and can operate without a human driver.
2. It provides an overview of the technologies that enable autonomous driving functions as well as the complex software and hardware required, including sensors, radar, lidar, GPS and advanced artificial intelligence systems.
3. The document discusses some of the impacts of increased autonomous vehicle adoption, such as changes to insurance markets, transportation infrastructure needs, and impacts on real estate including less demand for parking spaces.
The document discusses global demand for connected cars based on a survey conducted across 5 countries. Some key findings:
- 71% of drivers are interested in or already using connected car services.
- Drivers prefer safety/diagnostic features (73%) and want live traffic/navigation services.
- Over 40% see usage-based insurance as desirable.
- While demand is high, challenges remain around ownership cycles and business models for connectivity.
Automotive social media platform market research Street Formation.comSlideSigma
Street Formation is undoubtedly , the most game changing platform being introduced into the automotive industry. This platform will be released globally, fully laced with various innovative features and concepts to make our adrenaline filled passion a much more interesting one to be apart of. Street Formation is using modern day technologies to their full potential, allowing us to experience things that are currently nonexistent. We have built this platform with unmatched creativity. The automotive niche is one with many colors, personalities, and characters, many of these being displayed through out vehicle. The goal is to unite the industry on a global scale. While also connecting users near each other. We are bringing the emotion back that once roamed the car scene, and creating new ones in ways you can not even imagine.
Tracxn Research - Smart Cars Landscape, January 2017Tracxn
With most self-driving car makers expected to rollout fully autonomous versions by 2021, funding into vision-based technologies (a crucial component of smart cars) has gathered steam.
Connected Car - Ian Beavis, EVP at Nielsen Global Automotivewipjam
The document discusses findings from the 2014 Harris Poll AutoTECHCAST survey regarding consumer awareness and interest in connected car technologies. Some key findings include:
- Most consumers have heard of a "Connected Car" but are not very familiar with the term. Interest in owning a Connected Car in the future is moderate.
- Consumers prefer an integrated "built-in" Connected Car system to one that is brought in via smartphone. However, many have privacy concerns about data collection.
- OnStar is the most recognized Connected Car brand name. Awareness of specific Connected Car features is moderate but interest in having them in future vehicles is higher.
Over-The-Air Care @ Connected Car Expo.Mahbubul Alam
The autonomous vehicle faces many challenges on the road to full autonomy. While semiautonomous features are beginning to appear, fully driverless cars will take time due to the difficulty of teaching vehicles to safely handle complex traffic situations. Updating vehicles continuously via over-the-air software will also be critical. Startups are helping to advance connectivity and mobility solutions in new ways, with 10 highlighted for their innovative potential to transform the industry.
IS20G14 - There are No Shortcuts: Stop Chasing Shiny Objects! Be Brilliant wi...Sean Bradley
1. The document discusses how focusing on the basics rather than chasing shiny new objects leads to better results for sales. It emphasizes delivering an excellent customer experience, especially over the phone, to convert more browsers into callers and close more deals.
2. Data shows that most car shopping is done online and on mobile now, so digital advertising and phone systems that can capture calls are critical. Call tracking and agent performance monitoring help plug leaks and ensure quality service.
3. A consultative sales process, responsive support, and consistent training are emphasized as ways to improve the customer experience and increase sales through the lifetime of the customer relationship.
Cars with access to the Internet, also known as connected cars, are gaining popularity in the automobile industry. Download the Special Report by Aranca here!
Connected cars a rising trend in the global automobile sectorAranca
Connected cars with internet access are gaining popularity, expected to account for 75% of new car shipments by 2020. Connected cars provide benefits like entertainment, navigation, and safety features through technologies installed by automakers in collaboration with mobile networks. However, cybersecurity concerns around unauthorized access and privacy issues present challenges to adoption of connected cars.
The document summarizes findings from a 2020 global automotive consumer study conducted in India. Key findings include:
- Consumers are willing to pay more for vehicles with advanced technologies like connectivity and autonomous features.
- Consumers are comfortable sharing their data with automakers and third parties if they receive significant benefits.
- While interested in connectivity, consumers have concerns about data privacy and autonomous vehicle safety.
- Younger consumers are more open to new mobility options like ridesharing and congestion pricing.
- Consumers see improved public transit and vehicle-to-vehicle connectivity as the best ways to reduce traffic.
The document discusses the connected car market and opportunities for investment. It defines connected cars as vehicles that use technologies like telematics, artificial intelligence, and connectivity to provide safety, comfort and entertainment features. Today's connected cars allow for infotainment, navigation, device connectivity and roadside assistance. The market is evolving to include vehicle-to-vehicle and vehicle-to-infrastructure connectivity, partial autonomy, and future fully autonomous vehicles. While consumer willingness to pay for connected services is low, the enterprise market around fleet management, insurance telematics, and automotive software provides more promising investment opportunities, as seen in recent funding deals and exits that have targeted the enterprise.
Artificial Intelligence Computing for Automotive 2019 Report by Yole Développ...Yole Developpement
Artificial Intelligence for automotive: why you should care.
More information on that report at: https://www.i-micronews.com/produit/artificial-intelligence-computing-for-automotive-2019/
Women Edition: 5. World Automotive ConferenceErsin KARA
The document summarizes interviews conducted with several women speakers who will participate in the 2018 World Automotive Conference.
Özlem Engindeniz from Mercedes-Benz Turk discusses how technologies like artificial intelligence, IoT, and smart security can benefit the automotive industry through increased connectivity and improved safety. Ahu Serter from Arya Women Investment Platform discusses opportunities for data monetization and the importance of understanding customer needs. Demet Yavuz from Garanti Bank discusses how digital technologies have changed consumer behavior and the car buying process, and will continue to transform consumer finance tools and concepts of transportation ownership.
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
The integration of wireless interfaces into vehicles has posed some challenges for the automotive industry over the years. While manufacturers strive to impress consumers with cutting-edge features, these features also bring security risks that cannot be ignored. To prevent potentially fatal incidents, a thorough protocol must be established to address system vulnerabilities. As the modern century moves towards an era of autonomous vehicles, security must be a top priority to avoid compliance breaches and delays in feature development. The significance of vehicle interfaces in the modern automotive industry cannot be overstated.
The present study aims to explore the prospective advantages and challenges associated with the integration of wireless interfaces in the automotive industry. This analysis will primarily focus on the latest technological advancements in vehicle technology and the critical need to secure against possible cyber-attacks. A wide range of topics will be covered in this paper, from the evolution of vehicle interfaces to the industry’s hurdles and strategies to minimize the risks associated with cyber threats. The objective of this study is to provide a comprehensive understanding of wireless interfaces in the automotive sector, including the benefits of implementing such technology, the challenges that it poses, and the measures needed to maintain the security and safety of vehicles, as well as the passengers.
The document discusses the shifting focus of the auto industry towards digital connectivity and electric vehicles. It notes that millennials now make up the second largest group of new car buyers in the US, and that this group is more interested in internet-enabled, hybrid, and electric vehicles. The document analyzes the digital marketing performance of 53 auto brands across the US, UK, and Germany based on their website, mobile, social media, and other digital presences. It finds that brands with higher digital IQ scores, like Nissan and Dodge, tended to see higher sales growth in 2015. German brands generally had higher scores than other regions. The analysis aims to help auto companies improve their digital strategies and return on digital investments.
SANS - Developments car hacking - 36607Felipe Prado
The document discusses developments in car hacking and vulnerabilities in modern automotive systems. It notes that as vehicles have become increasingly computerized, their attack surface has also increased. Recent security research has demonstrated vulnerabilities that could allow an attacker to remotely control certain vehicle functions. The field of automotive security is still young, and manufacturers have not sufficiently prioritized developing secure systems. The document analyzes the interconnected nature of modern vehicles and how the centralized Controller Area Network (CAN) bus could provide a potential entry point for attackers.
This document discusses the key components that enable autonomous vehicle technology: sensors, semiconductors, and software. Sensors like LiDAR, radar, and cameras are used together to help vehicles see their surroundings in different conditions. Semiconductors process sensor data to make driving decisions in real time. Machine learning and mapping software provide tools to improve vehicle operation and decision making. The document outlines U.S. company involvement across these autonomous vehicle components and notes opportunities for both new entrants and cross-sector collaboration among vehicle manufacturers, suppliers, and tech companies.
Similar to Braking the Connected Car: The Future of Vehicle Vulnerabilities (20)
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
Key Discussion Pointers:
1. Introduction to Data Privacy
- What is data privacy
- Privacy laws around the globe
- DPDPA Journey
2. Understanding the New Indian DPDPA 2023
- Objectives
- Principles of DPDPA
- Applicability
- Rights & Duties of Individuals
- Principals
- Legal implications/penalties
3. A practical approach to DPDPA compliance
- Personal data Inventory
- DPIA
- Risk treatment
The Verizon Breach Investigation Report (VBIR) is an annual report analyzing cybersecurity incidents based on real-world data. It categorizes incidents and identifies emerging trends, threat actors, motivations, attack vectors, affected industries, common attack patterns, and recommendations. Each report provides the latest insights and data to give organizations a global perspective on evolving cyber threats.
The document summarizes the top 10 cybersecurity risks presented to the board of directors of a manufacturing company. It discusses each risk such as insider threats, cloud security, ransomware attacks, third party risks, and data security. For each risk, it provides the current posture in terms of controls, compliance level, and planned improvements. The CISO and other leaders such as the managing director, finance director, and chief risk officer attended the presentation.
Simplifying data privacy and protection.pdfPriyanka Aash
1) Data is growing exponentially which increases the risk and impact of data breaches, while compliance requirements are also becoming more stringent.
2) IBM Security Guardium helps customers address this by discovering, classifying, and protecting sensitive data across platforms and simplifying compliance.
3) It detects threats in real-time, increases data security accuracy, and reduces the time spent on audits and issue remediation, helping customers minimize the impact of potential data breaches and address local compliance requirements.
Generative AI and Security (1).pptx.pdfPriyanka Aash
Generative AI and Security Testing discusses generative AI, including its definition as a subset of AI focused on generating content similar to human creations. The document outlines the evolution of generative AI from artificial neural networks to modern models like GPT, GANs, and VAEs. It provides examples of different types of generative AI like text, image, audio, and video generation. The document proposes potential uses of generative AI like GPT for security testing tasks such as malware generation, adversarial attack simulation, and penetration testing assistance.
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
The document discusses shifting the focus in cybersecurity from vulnerability management to weakness management and attack surface management. It argues that attacks persist because approaches focus only on software vulnerabilities, while ignoring other weaknesses like technological, people and process weaknesses that expand the potential attack surface. A new approach is needed that takes a holistic view of all weaknesses and continuously monitors the entire attack surface to better prevent attacks.
The document summarizes key aspects of the proposed Digital Personal Data Protection Act 2023 in India, including its scope, definitions, obligations of data fiduciaries, grounds for processing personal data, notice requirements for data principals, and penalties for non-compliance. It outlines categories of entities that would be considered significant data fiduciaries and the additional obligations that would apply to them. The summary also compares some aspects of the proposed Indian law to the General Data Protection Regulation (GDPR) in the European Union.
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
This document discusses cybersecurity threats and SentinelOne's solutions. It begins with questions about an organization's cyber preparedness and budget. It then discusses the cat-and-mouse game between attackers and defenders. The document highlights growing ransomware threats and payments. It argues SentinelOne provides a unified security solution that lowers costs, risks, and complexity while improving detection and response. It shares industry recognition for SentinelOne and concludes by thanking the audience.
An IT systems outage and distributed denial of service (DDoS) attack impacted an organization called XYZ Ltd. This was followed by a ransom demand email from an anonymous sender threatening to release sensitive project data. When the ransom deadline passed, anonymous hackers released a video on social media and the data breach began receiving media coverage. A customer then contacted XYZ to inquire about the data leak and if their content was impacted. The document outlines discussions between teams at XYZ on responding to the cyber incident and lessons learned.
The CISO Platform is a 10+ year old dedicated social platform for CISOs and senior IT security leaders that has grown to over 40,000 members across 20+ countries. Through sharing and collaboration, the community has created over 500 checklists, frameworks, and playbooks that are available for free to members. The platform also hosts an annual security conference with over 100 speakers and 20 workshops attended by 20,000 people. The goal of the CISO Platform is to build tangible community goods and resources through open sharing and collaboration among security professionals.
This document provides updates from the Chennai Chapter of the CISO Platform for 2021. It discusses the following:
1. The Breach and Attack Summit held in December which included panel discussions, presentations, task forces, and workshops despite natural disasters, with over 200 attendees.
2. Chapter meetings focused on ransomware trends and lessons learned from attacks.
3. A kids initiative to promote cybersecurity awareness through sessions for students, parents and teachers at local schools.
4. The task forces focused on topics like cyber risk quantification, quantum computing, cyber insurance and privacy.
It covers popular IaaS/PaaS attack vectors, list them, and map to other relevant projects such as STRIDE & MITRE. Security professionals can better understand what are the common attack vectors that are utilized in attacks, examples for previous events, and where they should focus their controls and security efforts.
Discuss Security Incidents & Business Use Case, Understanding Web 3 Pros
and Web 3 Cons. Prevention mechanism and how to make sure that it doesn’t happen to you?
Lessons Learned From Ransomware AttacksPriyanka Aash
The document summarizes a ransomware attack experienced by the author's organization and the lessons learned. It describes how the ransomware encrypted files and powered off virtual machines. It then details the recovery process over several days, including bringing in an incident response firm, rebuilding infrastructure, and restoring service for customers. Key lessons included having stronger access controls, backups stored separately, and implementing security tools like EDR, centralized logging, and identity management best practices.
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
Round Table Discussion On "Emerging New Threats And Top CISO Priorities In 2022"_ Bangalore
Date - 28 September, 2022. Decision Makers of different organizations joined this discussion and spoke on New Threats & Top CISO Priorities
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
Cloud Security Groups are the firewalls of the cloud. They are built-in and provide basic access control functionality as part of the shared responsibility model. However, Cloud Security Groups do not provide the same protection or functionality that enterprises have come to expect with on-premises deployments. In this talk we will discuss the top cloud risks in 2020, why perimeters are a concept of the past and how in the world of no perimitiers do Cloud Security groups, the "Cloud FIrewalls", fit it. We will practically explore Cloud Security Group limitations across different cloud setups from a single vNet to multi-cloud
Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems. However, once the policies are signed by senior leadership and distributed throughout the organization, significant cybersecurity governance challenges remain. In this workshop I will explain the transforming organizational security to strengthen defenses and integrate cybersecurity with the overall approach toward security governance, risk management and compliance.
The Internet is home to seemingly infinite amounts of confidential and personal information. As a result of this mass storage of information, the system needs to be constantly updated and enforced to prevent hackers from retrieving such valuable and sensitive data. This increasing number of cyber-attacks has led to an increasing importance of Ethical Hacking. So Ethical hackers' job is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weakness or loopholes in a computer, web applications or network and reports them to the organization. It requires a thorough knowledge of Networks, web servers, computer viruses, SQL (Structured Query Language), cryptography, penetration testing, Attacks etc. In this session, you will learn all about ethical hacking. You will understand the what ethical hacking, Cyber- attacks, Tools and some hands-on demos. This session will also guide you with the various ethical hacking certifications available today.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Braking the Connected Car: The Future of Vehicle Vulnerabilities
1. SESSION ID:
#RSAC
Akshay Anand
Braking the Connected Car:
The Future of Vehicle
Vulnerabilities
HT-T11
Manager
Commercial Insights
Kelley Blue Book
Karl Brauer
Senior Director
Automotive Industry Insights
Kelley Blue Book
2. #RSAC
Vehicle hacking & the “Hindenburg Moment”
Happens whenever technology takes a leap forward
◼ Cars already becoming connected
◼ Cars will be autonomous in 5 years
◼ Vehicle hacking almost inevitable
Not yet worried about vehicle hacking? You should be.
3. #RSAC
Innovation S-Curve & “The Slip”
Innovation S-Curve
I
1960
I
1970
I
1980
I
1990
I
2000
I
20160
InnovationalFeature
Mechanical Electrical SW/Internet Cloud/Business/E2,E1
4. #RSAC
Topics that will be addressed today
◼ Examples of high-profile hacks and the variance in techniques
(remote access, physical access and through supporting mobile
phone software)
◼ A high-level analysis of Kelley Blue Book research to illustrate vehicle
hacking vulnerabilities and consumer perceptions
◼ A future-casting of how in-car technology will evolve over the next 10
years with a focus on the potential to hack multiple devices (mobile
phones, wearables, etc.) by hacking a car, or vice versa
◼ Mitigating risk by providing incentives for security researchers to
share their vulnerability findings
6. #RSAC
There were several high-profile hacks in 2015
“Anthemsays hack may affect
more than 8.8 million other BCBS
members”
“Ashley Madison
hack is not only real, it’s worse than
we thought”
“OPMhack: Government finally
starts notifying 21.5 Million victims”
“One of the biggest
security firms in the world
admits it was hacked”
“Hack brief: Hackers steal 15M
T-Mobile customers’ data from
Experian”
7. #RSAC
There are more vehicle hacking entry points
than ever before
“OnStar hack remotely starts
cars, GM working on a fix”
“FCA issues Uconnect
software update amid hacking
fears”
“Hackers cut a Corvette’s brakes
via a common car
gadget”
“Two researchers said they
were able to take control of a
Tesla Model S by hacking into
the car's entertainment
system”
“Hacker uses smartphone to hack a
connected car”
8. #RSAC
8
And technology is a make-or-break factor for many
consumers – but with technology comes potential issues
66%
Any Technology That Comes in the Car
is an Added Bonus
Technology Features in the Car Will
Make or Break My Decision
1In 3People
When Choosing The Car I Will Purchase
Q: When choosing the car I will purchase… In-Vehicle Technology Survey, August 2015 (N=2076)
9. #RSAC
9
Over 40 % of consumers support connected
vehicles – this number jumps for Millennials
42% support
vehicles becoming
more connected
Millennials are more supportive of
vehicles becoming more connected
vs. other generations. For example,
the majority (60%) are supportive!
Q: How do you feel about vehicles becoming more connected, basically the “Internet on Wheels”? Vehicle Hacking Vulnerability Survey, January 2016 (N=813)
10. #RSAC
10
But as of now, most consumers are hesitant about autonomous
vehicles, though we expect this to change in the future
51%
24%
15% 10%
Extremely reluctant to
get one
Reluctant to get one Eager to get one Extremely eager to get
one
Feeling towards autonomous vehicles
Q: How do you feel about autonomous or self-driving vehicles? Vehicle Hacking Vulnerability Survey, January 2016 (N=813)
11. #RSAC
11
As such, most consumers are worried about cars being
hacked in the future
I Fear Cars in The Future Will Be Easily Hacked
62% AGREE
12%Neutral
26%Disagree
Q: I fear cars in the future will be easily hacked. In-Vehicle Technology Survey, August 2015 (N=2076)
12. #RSAC
12
And well over half of consumers think hacking will
be a moderate or serious issue in the future
33% 32%
35% 41%
26% 21%
7% 6%
July 2015 January 2016
Vehicle hacking in the future
Not at all a problem
Slight problem
Moderate problem
Serious problem
Q: How big of a problem do you feel vehicle hacking will be in the future? Vehicle Hacking Vulnerability Surveys, July 2015 (N=1134) and January 2016 (N=813)
13. #RSAC
13
While concerns about future hacking exist, consumers
don’t list hacking as a top safety concern right now
2%
4%
6%
17%
19%
24%
41%
45%
58%
84%
2%
3%
5%
16%
15%
37%
25%
29%
74%
94%
Carjackers
Car vulnerability to hackers
Injured by air bags
Animal-related problems (e.g., hitting an animal)
Tire-related problems (e.g., getting a flat tire)
Road rage
Weather-related problems (e.g., snow, hurricanes, etc.)
Mechanical-related problems (e.g., engine dies, brakes fail, etc.)
Impaired drivers (e.g., drunk drivers)
Distracted drivers (e.g., people texting or talking on cell phones)
Top 3 safety concerns while driving a vehicle
July 2015 January 2016
Q: Based on the list below, what are your top 3 safety concerns while driving a vehicle? Vehicle Hacking Vulnerability Surveys, July 2015 (N=1134) and January 2016 (N=813)
Car vulnerability to hackers 4%3%
14. #RSAC
14
Even though consumers are aware of the ability to be hacked
through mobile apps, most wouldn’t be willing to sacrifice the
convenience factor
16%
66%
58%
82%
84%
34%
42%
18%
“You must have physical access to hack a vehicle.”
“A vehicle is more likely to be hacked through its internal devices (i.e. OnStar
or Uconnect).”
“Any vehicle can be hacked remotely.”
“A vehicle is more likely to be hacked though a mobile app (i.e. Google’s
Android Auto or Apple CarPlay) connected to its internal devices.”
Agreement with statements
Agree Disagree
Q: To what extent do you agree or disagree with the following statements…? Vehicle Hacking Vulnerability Survey, January 2016 (N=813)
16. #RSAC
16
Awareness of the Jeep hacking incident has dropped
Yes
26%
No
74%
Aware of any vehicles being hacked in the past
year
13%
17%
17%
18%
21%
32%
Chevrolet
Chrysler
Toyota
BMW
Honda
Jeep
Brands you are aware of that were hacked
[Top 5 listed]
Q: Are you aware of any vehicles being hacked in the past year? If so, which of the following brands are you aware of that were hacked in the past year? (Select all that apply.)
Vehicle Hacking Vulnerability Survey, January 2016 (N=813)
17. #RSAC
17
Consumers feel the vehicle manufacturer is most
responsible for securing a vehicle from hacking
2%
4%
4%
15%
30%
44%
Dealerships
Government
Wireless providers (i.e. Verizon Wireless, T-Mobile, Sprint)
Myself
Manufacturers of mobile software/apps (i.e. Google’s
Android Auto or Apple CarPlay)
Vehicle manufacturers (i.e. Ford, Toyota, etc.)
Most responsible to secure a vehicle from hacking
[% who ranked #1]
Q: Who do you think is responsible to secure your vehicle from hacking? (Please rank in order of responsibility with 1 being most responsible.) Vehicle Hacking Vulnerability Survey, January
2016 (N=813)
)
18. #RSAC
18
Consumers still view vehicle manufacturers as partially
responsible even if hacked through a mobile phone!
33%
38%
29%
Google/Apple Neutral Vehicle MFG
Responsibility if vehicle is hacked through mobile phone software/apps
Q: If a vehicle manufacturer is supporting Google or Apple’s mobile phone software/apps in a particular vehicle, who should be held more responsible if that vehicle is hacked? Vehicle
Hacking Vulnerability Survey, January 2016 (N=813)
19. #RSAC
19
Almost half say they would bring their vehicle into a
dealership immediately for hacking protection
47%
31%
17%
3% 1%
36% 34%
24%
4% 2%
Immediately Within a week Within a month More than a month Never
Reacting to a vehicle hacking recall
July 2015 January 2016
Q: If you knew that you had to go into the dealership in order to install a security patch for your vehicle to protect from hacking, when would you do it? Vehicle Hacking Vulnerability Surveys,
July 2015 (N=1134) and January 2016 (N=813)
21. #RSAC
21
Current and future landscape…
Current
◼ Average car on the road is over 11 years old, so most cars currently remain
unconnected
◼ “Dumb” cars can, however, become connected as a result of aftermarket
additions
◼ To our knowledge, no vehicle hacks have occurred in a non-controlled
environment
◼ Most autonomous features are driver-assist vs. fully autonomous
◼ While the financial gains for hacking remain unclear at this point, the
potential exists in the future (through ransomware, etc.)
◼ Adversarial gains are possible
22. #RSAC
22
A decent chunk of consumers are in fact willing to
pay for anti-hacking software
Monthly
subscription
(mean) = $8.98
Monthly
subscription
(mean) = $9.31
Yes
48%
No
52%
Pay for software that would prevent
vehicle hacking (i.e. an antivirus)
Yes
56%
No
44%
Pay for insurance to cover any losses
incurred by vehicle hacking
Q: Would you pay for a monthly subscription for each of the following…? If so, how much would you pay for each? Vehicle Hacking Vulnerability Survey, January 2016 (N=813)
23. #RSAC
23
And consumers feel vehicle manufacturers should
offer these subscriptions
Q: Who do you think should primarily offer each? Vehicle Hacking Vulnerability Survey, January 2016 (N=813)
56% 50%
29%
22%
2%
10%
5% 9%
8% 8%
Software that would prevent vehicle hacking (i.e. an
antivirus)
Insurance to cover any losses incurred by vehicle
hacking
Who do you think should primarily offer each?
Wireless providers
Other
Dealerships
Manufacturers of mobile software/apps
Vehicle manufacturers
24. #RSAC
24
Cars are becoming connected at a rate which will
only increase
Vehicle Models with Internet Access
2011 2012 2013 2014 2015 2016
Vehicles with Internet Access as
STANDARD 2 14 53 89 151 133
Vehicles with Internet Access as
OPTIONAL 1 10 37 67 93 69
Vehicles WITHOUT Internet
Access 369 359 346 323 291 173
Source: Kelley Blue Book® Insights data
25. #RSAC
The future landscape – everything is
connected!
Future
Volkswagen BUDD-e – Mobile device on
wheels
Internet of Things connections to home,
phone, work and infrastructure
Potential to become a new form of
cyberterrorism
Difficult for consumers to know if a car
has been hacked (if they’re not paying
attention)
27. #RSAC
Applied – How to get ahead of this issue
◼ Consumers’ vigilance whenever connected with any device, including
phone, IoT devices and car
◼ We are all assuming a certain level of risk for convenience
◼ Automakers should (if they haven’t already):
◼ Develop research teams
◼ Crowd source vulnerabilities & collect information on every hack
◼ Government only now focusing on this issue
◼ The process to create a standard is slow, however basic standards do need to be
established similar to existing standards for crash tests, fuel efficiency, etc.
◼ The tech industry and automakers need to work together instead of
viewing each other as competitors in regards to connected vehicles
28. #RSAC
What manufacturers and organizations are
doing NOW to mitigate risks
◼ Tesla – cash for those who find vulnerabilities
◼ NHTSA – partnering with automotive and research firms to
understand more about exploits, etc.
◼ Auto ISAC (Information Sharing and Analysis Center)– created
by automobile OEMs as a central hub for intelligence analysis
◼ Hackathons such as Battelle-SAE CyberAuto Challenge, Black
Hat, etc.
31. #RSAC
31
Q: Will You Ever Own A Self-Driving Car? Q: What is the primary reason you don’t think you will own a self-driving car? In-Vehicle Technology Survey, August 2015
(N=1552)
Baby Boomers and the Silent Generation do not
believe they’ll own a self-driving car
Will You Ever Own A Self-Driving Car?
No
60% 66%
Gen X
35–55 years old
Millennials
15–35 years old
Baby Boomer
51–69 years old
77%
Silent Generation
70–90 years old
88%
32. #RSAC
32
Majority think vehicle hacking will be a frequent
problem within the next 3 years
76% 69%
July 2015 January 2016
Timeframe when vehicle hacking will be a frequent
problem [Within the next 3 years]
Q: In what timeframe do you think vehicle hacking will be a frequent problem? [% who indicated “Right now” to “Within the next 3 years]
Vehicle Hacking Vulnerability Surveys, July 2015 (N=1134) and January 2016 (N=813)
33. #RSAC
33
“In-person at the dealership” would be the preferred
method to get a security patch installed
64% 70%
24% 19%
12% 11%
July 2015 January 2016
How would you prefer to get your security patch installed?
Software mailed to me to
install myself
Wirelessly
In-person at the dealership
Q: How would you prefer to get your security patch installed? Vehicle Hacking Vulnerability Surveys, July 2015 (N=1134) and January 2016 (N=813)
34. #RSAC
34
NOTE: In January's survey, we did not mention the
Jeep vehicle hack specifically by name
6%
7%
12%
14%
15%
16%
17%
19%
19%
20%
21%
27%
35%
2%
3%
8%
9%
11%
4%
11%
10%
12%
18%
30%
70%
47%
Fuji Heavy Industries (e.g., Subaru)
Mazda Motor Corporation
Nissan Motor Corporation (e.g., Nissan, Infiniti)
Honda Motor Company (e.g., Honda, Acura)
Hyundai Motor Company (e.g., Hyundai, Kia)
Volkswagen Group (e.g., Volkswagen, Audi, Porsche)
Tesla Motors
BMW Group (e.g., BMW, MINI)
Daimler (Mercedes-Benz) (e.g., Mercedes-Benz, Smart)
Toyota Motor Corporation (e.g., Toyota, Lexus, Scion)
Ford Motor Company (e.g., Ford, Lincoln)
Fiat Chrysler Automobiles (e.g., FIAT, Chrysler, Jeep, Dodge, RAM)
General Motors Corporation (e.g., GMC, Cadillac, Chevrolet, Buick)
Auto MFG companies with vehicles that are more susceptible to hacking [You
can select up to 3 answers]
July 2015 January 2016
Q: Which of the following automobile manufacturing companies do you think have vehicles that are more susceptible to hacking? (You can select up to 3 answers.) Vehicle Hacking
Vulnerability Surveys, July 2015 (N=1134) and January 2016 (N=813)
35. #RSAC
35
About half would pay a monthly subscription to
completely protect their vehicle from hacking
52%48%
Would you pay for a monthly subscription to
ensure that your vehicle would be completely
protected from hacking?
Yes
No
What amount would you be willing to pay? [N=591]
Monthly
Subscription ($)
Monthly subscription amount - MEAN $8
Monthly subscription amount - MEDIAN $5
Q: If you had to pay for a monthly subscription to ensure that your vehicle would be completely protected from hacking, what amount would you be willing to pay?
Vehicle Hacking Vulnerability Survey, July 2015 (N=1134)
36. #RSAC
36
Consumers do not trust companies with their data
Who Do You Trust With Your Data?
68%
32%
Large
Companies
I Don’t Trust Any
Entity With My
Private Data
44% 46% 10%
AppleGoogle OEMs
(i.e. Toyota, Honda, Etc.)
Q: If the car you own has Android Auto or CarPlay (Apple’s Infotainment system), who do you trust most with your data?
In-Vehicle Technology Survey, August 2015 (N=2076)