SlideShare a Scribd company logo
1October 2, 2015CSC Proprietary and Confidential 1October 2, 2015CSC Proprietary and Confidential
FROM CONNECTED TO SELF-DRIVING
— SECURING THE AUTOMOTIVE
REVOLUTION
Dr. Alexander Schellong
General Manager, Cybersecurity Division
Central & Eastern Europe, Italy and Turkey
2October 2, 2015CSC Proprietary and Confidential
TRAVEL AND
TRANSPORTATION
INSURANCE
MANUFACTURING
BANKING AND
CAPITAL MARKETS
HEALTHCARE
ENERGY AND
NATURAL RESOURCES
PUBLIC
SECTOR
TECHNOLOGY AND
CONSUMER SERVICES
About CSC
CONSULTING
BIG DATA AND
ANALYTICS
BUSINESS PROCESS SERVICES
AND OUTSOURCING
INFRASTRUCTURE
SERVICES
APPLICATIONS
SERVICES SOFTWARE AND IP
CYBERSECURITYCLOUD
NEXT-GEN
OFFERINGS
3October 2, 2015CSC Proprietary and Confidential
CSC Cybersecurity
CYBER
CONSULTING
SERVICES
CLOUD INTERNET
OF
THINGS
MOBILITY
SOCIAL
MANUFACTURING
TRAVEL AND
TRANSPORTATION
MANAGED
SECURITY
SERVICES
BIG DATA
HEALTHCARE
RISK MANAGEMENT
CENTERS
TECHNOLOGY
AND CONSUMER
SERVICES
PUBLIC
SECTOR
INSURANCE
APPLICATIONS
BUSINESS
OUTSIDE-IN
BANKING AND
CAPITAL
MARKETS
ENERGY AND
NATURAL
RESOURCES
BUSINESS
CONTINUITY/
DISASTER
RECOVERY
Third Platform,
Consumerization
of IT
4October 2, 2015CSC Proprietary and Confidential
Global Cybersecurity Service Portfolio 09/2015
BUSINESS CONTINUITY &
DISASTER RECOVERY
(BC/DR) SERVICES
IDENTITY
MANAGEMENT
CONSULTING
MANAGED SECURITY
SERVICES (MSS)
APPLICATION &
SOFTWARE
SECURITY
Static/Dynamic/Mobile
Scans (HP Fortify)
Compliance / Security Support
(Account Security Managers)
Risk / Security Assessment
Strategy & Information
Security & Risk Management
STRATEGIC &
TECHNICAL SECURITY
CONSULTING
APT / Penetration tests
Social Engineering
Physical Security
Red Team
Data Protection
Network, Mobile & Cloud Security
BSI / ISO / PCI
Audits & Audit Preparation
SOC Planning & Setup
FW / IDS / SIEM Implementation
Industrial Control Systems
Data Loss Prevention
Trainings
RFI / RFP Support
Common Criteria
FIPS
24x7x365 Global IAM
Operations & Support
Application Security
Device & Endpoint Security
Network Security
Cloud Security
Mobile Security
Global Cyberthreat Intelligence
Risk Management Center
Security Operations Center
Risk & Business Impact Analysis
BC/DR Plans, Reviews & Tests
Crisis Management
Global Incident Response /
24x7 Forensics
Training & Simulation
Mergers & Acquisition (M&A)
security due diligence
Secure Code Reviews
SAP
CERTIFICATION
SERVICE (LAB)
SECURITY HARDWARE &
SOFTWARE RESELLING
(Next-Generation) Firewalls
Antivirus / SIEM / IDS / IPS / DLP
Mobile / Endpoint Security
20+ Product partnersCryptography
BSI Grundschutz /
IS-Revision
Secure Software
Development Lifecycle
IAM Consulting &
Solution Architecture
Identity and Access
Governance
RFI / RFP Support
IAM Implementation &
Customization
Cloud SSO &
Federation
IAM Solution
Engineering
Provisioning Solutions
5October 2, 2015CSC Proprietary and Confidential
GLOBAL CYBERSECURITY
PROFESSIONALS
1,700+
INTEGRATED
GLOBAL RISK
MANAGEMENT
CENTERS
5+
YEARS PROVIDING
CYBERSECURITY
SERVICES
40+
GLOBAL ALLIANCE
PARTNERS
PROVIDING SECURITY
EXPERTISE
15+
PUBLIC &
PRIVATE
SECTOR
EXPERTISE
UK
Noida
Kuala Lumpur
Sydney
Newark
Global Scalability
6October 2, 2015CSC Proprietary and Confidential
MOBILE
SECURITY
CLOUD
SECURITY
NETWORK
SECURITY
ENDPOINT
SECURITY
APPLICATION
SECURITY
IDENTITY AND
ACCESS
MANAGEMENT Our deep industry knowledge,
security specialists, and
end-to-end solutions for
traditional and next-generation
technologies enable you to
securely adapt as your business
and risks change.
End-to-End Managed Security Services
7October 2, 2015CSC Proprietary and Confidential
Six decades of safety development to protect us from the
biggest risk factor in car mobility
8October 2, 2015CSC Proprietary and Confidential
Not this one
Volkswagen
9October 2, 2015CSC Proprietary and Confidential
That one
10October 2, 2015CSC Proprietary and Confidential
Who is the biggest risk in the future?
Ex Machina / Universal Studios (2015)
11October 2, 2015CSC Proprietary and Confidential
Known automotive attack vectors
•  ODB-II
Direct connector, USB, WiFi
•  Controller Area Network (CAN) (broadcast nature, DoS vulnerability, network segregation)
•  Electronic Control Unit (ECU)
–  Engine Control Unit (ECU) (access, reflashing while driving, deviation from standards
–  Body Control Unit (BCM)
–  Elctronic Break Control Module (ECBM)
–  Telematics unit (access)
–  Radio / Entertainment system (malicious music files)
–  Bluetooth (pass through vulnerabilities)
–  Tire Pressure Monitoring Systems (TPMS)
•  Suppliers, OEM and Dealers
12October 2, 2015CSC Proprietary and Confidential
Spoofing the LIDAR
13October 2, 2015CSC Proprietary and Confidential
GPS jamming and spoofing
14October 2, 2015CSC Proprietary and Confidential
Volkswagen’s Automotive Cybercrime: Emission control
Daily use
ECU/ECM
Test
15October 2, 2015CSC Proprietary and Confidential
Human error speaks against precautionary approach
- Level of automation +
-humanerrorrisks+
16October 2, 2015CSC Proprietary and Confidential
From 1 billion to 2 billion cars
Infographic Wired Magazine 2012
2050
2 billion cars
9 billion people
2030
200+ million
connected cars
2018
20+ million
connected cars
100 million lines of code per car & 17 Petabyte of data p.a.
17October 2, 2015CSC Proprietary and Confidential
OEM VM vs. IT market entrant approach
SW
Car
Car
SW
- Level of automation +
-Levelofcapabilities+
- Level of automation +
-Levelofcapabilities+
18October 2, 2015CSC Proprietary and Confidential
From connected to autonomous to self-driving
http://www.leftlaneadvisors.com/project/nhtsa-levels-of-vehicle-autonomy-infographic/
Today
19October 2, 2015CSC Proprietary and Confidential
Today’s automotive ecosystem
OEM
VM
Tier 1
Tier 1
Tier 1
Tier 2
Tier 2
Tier 2
Suppliers Producer Retail
Tier 3
Tier 3
Tier 3
Aut. Dealers
Aftermarket
Direct Sales
OES repair
Independent car sharing
Ind. ES manufacturers
Car Sharing
Ind. Dealers
Logistics
Assembler
Ind. retailers
Telematics provider
Logistics
Direct sales suppliers
Independent repair
20October 2, 2015CSC Proprietary and Confidential
Future automotive ecosystem
OEM
VM
Tier 1
Tier 1
Tier 1
Tier 2
Tier 2
Tier 2
Suppliers Producer Retail
Tier 3
Tier 3
Tier 3
Auth. Dealers
Aftermarket
Direct Sales
OES repair
Ind. repair
Ind. suppliers
Car Sharing
Ind. Dealers
Logistics
Assembler
Ind. retailers
Telematics provider
Logistics
Software / Apps / Content provider
Fleet Mgt. & provision (AMaaS)
Infrastructure
Smart devices
Smart roads
IT infrastructure & analytics provider
Security & monitoring provider
Ind. car sharing & fleet provision
Smart grid
App Store
S Mobility objects
21October 2, 2015CSC Proprietary and Confidential
The Cyber Disruption Opportunity Moves Outside the Walls
•  Live and work “without wires”
•  Demand for universal access
•  Work everywhere with any device
•  Mix personal and corporate lives and information
•  Information is currency and everyone wants it –
especially thieves
•  Universal access creates dynamic boundaries that
are tougher to protect
•  Ever advancing adversaries outpace traditional,
passive cyber defenses
New technology changes expectations
New technology expands and changes risk
Cybersecurity must respond proactively
•  New business opportunities have moved outside the
“castle” walls
•  Defensible security perimeters no longer exist
•  Products and services must anticipate and
continuously manage risks
22October 2, 2015CSC Proprietary and Confidential
Recommended Actions
Hardware / Software / Communications Regulations Culture/Operations
ECU hardening AV & Sec. Proxy Testing requirements Awareness Training
ECU consolidation IPS Operator license req. Cont. Threat analysis
Sec. architecture Sec. architecture Operator training req. Secure Prod. Lifecycle
Black box Cryptography Data collection Patch Mgt.
Segregation Sandboxing Data usage transp. Pentesting
Fail-safe mode Secure bot loader Black box SOC (AC+Org)
Last FS state ident. IAM Open codes ISAC
Time stamps Data storage R&D processes
Sec. Governance
Billing relationship?
Bug rewards program
23October 2, 2015CSC Proprietary and Confidential 23October 2, 2015CSC Proprietary and Confidential
THANK YOU
aschellong@csc.com

More Related Content

What's hot

Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
Block Armour
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
Block Armour
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
Christian Miranda Moreira
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
Block Armour
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
Ronald Bartels
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
Qian Li Jin
 
6. mr. sastry vns idrbt
6. mr. sastry   vns idrbt6. mr. sastry   vns idrbt
6. mr. sastry vns idrbt
EthioTelecom_Getahun Biratu
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
iotisrael
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Block Armour
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Block Armour
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Block Armour
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 

What's hot (20)

Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
 
6. mr. sastry vns idrbt
6. mr. sastry   vns idrbt6. mr. sastry   vns idrbt
6. mr. sastry vns idrbt
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 

Viewers also liked

Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016
Angelo Campanale
 
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
Megatrends 2013: Manage the AcceleratingAmount of Software in CarsMegatrends 2013: Manage the AcceleratingAmount of Software in Cars
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
Red Bend Software
 
Critical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics InitiativeCritical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics Initiative
Sasken Technologies Ltd.
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
Sasken Technologies Ltd.
 
M2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M AdoptionM2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M Adoption
Red Bend Software
 
connected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudconnected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloud
Joe Speed
 
The Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardThe Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardHitReach
 
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
Alexander Much
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Iddan Halevy
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
CODE BLUE
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalNewellNYC
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Joseph Hennawy
 
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software
 
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupIoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
Open Mobile Alliance
 
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
CODE BLUE
 
Connected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlightsConnected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlights
Cambridge Mobile Telematics
 

Viewers also liked (20)

Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016Forum Riassicurativo Munich Re Italia 14 aprile 2016
Forum Riassicurativo Munich Re Italia 14 aprile 2016
 
Digital Car Telematics
Digital Car TelematicsDigital Car Telematics
Digital Car Telematics
 
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
Megatrends 2013: Manage the AcceleratingAmount of Software in CarsMegatrends 2013: Manage the AcceleratingAmount of Software in Cars
Megatrends 2013: Manage the Accelerating Amount of Software in Cars
 
Critical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics InitiativeCritical Success Factors for A Data Analytics Initiative
Critical Success Factors for A Data Analytics Initiative
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
M2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M AdoptionM2M Workshop: How FOTA can increase M2M Adoption
M2M Workshop: How FOTA can increase M2M Adoption
 
connected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudconnected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloud
 
The Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardThe Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry Forward
 
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
 
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupIoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
 
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
Arynga CEO, Walter Buga at Automotive Linux Summit, 5/2013
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Connected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlightsConnected Insurance Analytics: report highlights
Connected Insurance Analytics: report highlights
 

Similar to From Connected To Self-Driving - Securing the Automotive Revolution

Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systems
HongwenZhang4
 
A Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation SystemA Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation System
Center for Transportation Research - UT Austin
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle GuardianPeter Laitin
 
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Bill Harpley
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)
Frank Chee-Da TSAI (蔡其達)
 
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
ambitlick
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
European Services Institute
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
IJCI JOURNAL
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
Suresh Mandava
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
Security Innovation
 
СОЕДИНЕННЫЙ МИР
СОЕДИНЕННЫЙ МИРСОЕДИНЕННЫЙ МИР
СОЕДИНЕННЫЙ МИР
startupvillage2014
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
brigel529
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, Karlshruhe
Valentin Scinteie
 
Iot
IotIot
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
SenZations Summer School
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
raymurphy9533
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
Security Innovation
 

Similar to From Connected To Self-Driving - Securing the Automotive Revolution (20)

Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systems
 
A Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation SystemA Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation System
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle Guardian
 
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?
 
2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)2009-04-04 Telematics Technology and Its Market Trend (FCU)
2009-04-04 Telematics Technology and Its Market Trend (FCU)
 
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
СОЕДИНЕННЫЙ МИР
СОЕДИНЕННЫЙ МИРСОЕДИНЕННЫЙ МИР
СОЕДИНЕННЫЙ МИР
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, Karlshruhe
 
Iot
IotIot
Iot
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 

Recently uploaded

Strategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls RoyceStrategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls Royce
SadmanFuad1
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdfPARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
eduarddorda1010
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Vic Auto Collision & Repair
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
Bertini's German Motors
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
European Service Center
 
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
Import Motorworks
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
Hyundai Motor Group
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
mymwpc
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
kshamashah95
 
Skoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda PerthSkoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda Perth
Perth City Skoda
 
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
eygkup
 
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
ahmedendrise81
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
jennifermiller8137
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
Antique Plastic Traders
 
What Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop WorkingWhat Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop Working
Lancer Service
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
Autohaus Service and Sales
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Precious Mvulane CA (SA),RA
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
coc7987515756
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
jennifermiller8137
 

Recently uploaded (20)

Strategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls RoyceStrategic Management - Strategies of Rolls Royce
Strategic Management - Strategies of Rolls Royce
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdfPARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
PARTS MANUAL tackeuschi TL150 BT7Z011-2.pdf
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
 
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
What Are The Immediate Steps To Take When The VW Temperature Light Starts Fla...
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
 
Skoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda PerthSkoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda Perth
 
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
 
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
 
What Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop WorkingWhat Could Cause The Headlights On Your Porsche 911 To Stop Working
What Could Cause The Headlights On Your Porsche 911 To Stop Working
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
 

From Connected To Self-Driving - Securing the Automotive Revolution

  • 1. 1October 2, 2015CSC Proprietary and Confidential 1October 2, 2015CSC Proprietary and Confidential FROM CONNECTED TO SELF-DRIVING — SECURING THE AUTOMOTIVE REVOLUTION Dr. Alexander Schellong General Manager, Cybersecurity Division Central & Eastern Europe, Italy and Turkey
  • 2. 2October 2, 2015CSC Proprietary and Confidential TRAVEL AND TRANSPORTATION INSURANCE MANUFACTURING BANKING AND CAPITAL MARKETS HEALTHCARE ENERGY AND NATURAL RESOURCES PUBLIC SECTOR TECHNOLOGY AND CONSUMER SERVICES About CSC CONSULTING BIG DATA AND ANALYTICS BUSINESS PROCESS SERVICES AND OUTSOURCING INFRASTRUCTURE SERVICES APPLICATIONS SERVICES SOFTWARE AND IP CYBERSECURITYCLOUD NEXT-GEN OFFERINGS
  • 3. 3October 2, 2015CSC Proprietary and Confidential CSC Cybersecurity CYBER CONSULTING SERVICES CLOUD INTERNET OF THINGS MOBILITY SOCIAL MANUFACTURING TRAVEL AND TRANSPORTATION MANAGED SECURITY SERVICES BIG DATA HEALTHCARE RISK MANAGEMENT CENTERS TECHNOLOGY AND CONSUMER SERVICES PUBLIC SECTOR INSURANCE APPLICATIONS BUSINESS OUTSIDE-IN BANKING AND CAPITAL MARKETS ENERGY AND NATURAL RESOURCES BUSINESS CONTINUITY/ DISASTER RECOVERY Third Platform, Consumerization of IT
  • 4. 4October 2, 2015CSC Proprietary and Confidential Global Cybersecurity Service Portfolio 09/2015 BUSINESS CONTINUITY & DISASTER RECOVERY (BC/DR) SERVICES IDENTITY MANAGEMENT CONSULTING MANAGED SECURITY SERVICES (MSS) APPLICATION & SOFTWARE SECURITY Static/Dynamic/Mobile Scans (HP Fortify) Compliance / Security Support (Account Security Managers) Risk / Security Assessment Strategy & Information Security & Risk Management STRATEGIC & TECHNICAL SECURITY CONSULTING APT / Penetration tests Social Engineering Physical Security Red Team Data Protection Network, Mobile & Cloud Security BSI / ISO / PCI Audits & Audit Preparation SOC Planning & Setup FW / IDS / SIEM Implementation Industrial Control Systems Data Loss Prevention Trainings RFI / RFP Support Common Criteria FIPS 24x7x365 Global IAM Operations & Support Application Security Device & Endpoint Security Network Security Cloud Security Mobile Security Global Cyberthreat Intelligence Risk Management Center Security Operations Center Risk & Business Impact Analysis BC/DR Plans, Reviews & Tests Crisis Management Global Incident Response / 24x7 Forensics Training & Simulation Mergers & Acquisition (M&A) security due diligence Secure Code Reviews SAP CERTIFICATION SERVICE (LAB) SECURITY HARDWARE & SOFTWARE RESELLING (Next-Generation) Firewalls Antivirus / SIEM / IDS / IPS / DLP Mobile / Endpoint Security 20+ Product partnersCryptography BSI Grundschutz / IS-Revision Secure Software Development Lifecycle IAM Consulting & Solution Architecture Identity and Access Governance RFI / RFP Support IAM Implementation & Customization Cloud SSO & Federation IAM Solution Engineering Provisioning Solutions
  • 5. 5October 2, 2015CSC Proprietary and Confidential GLOBAL CYBERSECURITY PROFESSIONALS 1,700+ INTEGRATED GLOBAL RISK MANAGEMENT CENTERS 5+ YEARS PROVIDING CYBERSECURITY SERVICES 40+ GLOBAL ALLIANCE PARTNERS PROVIDING SECURITY EXPERTISE 15+ PUBLIC & PRIVATE SECTOR EXPERTISE UK Noida Kuala Lumpur Sydney Newark Global Scalability
  • 6. 6October 2, 2015CSC Proprietary and Confidential MOBILE SECURITY CLOUD SECURITY NETWORK SECURITY ENDPOINT SECURITY APPLICATION SECURITY IDENTITY AND ACCESS MANAGEMENT Our deep industry knowledge, security specialists, and end-to-end solutions for traditional and next-generation technologies enable you to securely adapt as your business and risks change. End-to-End Managed Security Services
  • 7. 7October 2, 2015CSC Proprietary and Confidential Six decades of safety development to protect us from the biggest risk factor in car mobility
  • 8. 8October 2, 2015CSC Proprietary and Confidential Not this one Volkswagen
  • 9. 9October 2, 2015CSC Proprietary and Confidential That one
  • 10. 10October 2, 2015CSC Proprietary and Confidential Who is the biggest risk in the future? Ex Machina / Universal Studios (2015)
  • 11. 11October 2, 2015CSC Proprietary and Confidential Known automotive attack vectors •  ODB-II Direct connector, USB, WiFi •  Controller Area Network (CAN) (broadcast nature, DoS vulnerability, network segregation) •  Electronic Control Unit (ECU) –  Engine Control Unit (ECU) (access, reflashing while driving, deviation from standards –  Body Control Unit (BCM) –  Elctronic Break Control Module (ECBM) –  Telematics unit (access) –  Radio / Entertainment system (malicious music files) –  Bluetooth (pass through vulnerabilities) –  Tire Pressure Monitoring Systems (TPMS) •  Suppliers, OEM and Dealers
  • 12. 12October 2, 2015CSC Proprietary and Confidential Spoofing the LIDAR
  • 13. 13October 2, 2015CSC Proprietary and Confidential GPS jamming and spoofing
  • 14. 14October 2, 2015CSC Proprietary and Confidential Volkswagen’s Automotive Cybercrime: Emission control Daily use ECU/ECM Test
  • 15. 15October 2, 2015CSC Proprietary and Confidential Human error speaks against precautionary approach - Level of automation + -humanerrorrisks+
  • 16. 16October 2, 2015CSC Proprietary and Confidential From 1 billion to 2 billion cars Infographic Wired Magazine 2012 2050 2 billion cars 9 billion people 2030 200+ million connected cars 2018 20+ million connected cars 100 million lines of code per car & 17 Petabyte of data p.a.
  • 17. 17October 2, 2015CSC Proprietary and Confidential OEM VM vs. IT market entrant approach SW Car Car SW - Level of automation + -Levelofcapabilities+ - Level of automation + -Levelofcapabilities+
  • 18. 18October 2, 2015CSC Proprietary and Confidential From connected to autonomous to self-driving http://www.leftlaneadvisors.com/project/nhtsa-levels-of-vehicle-autonomy-infographic/ Today
  • 19. 19October 2, 2015CSC Proprietary and Confidential Today’s automotive ecosystem OEM VM Tier 1 Tier 1 Tier 1 Tier 2 Tier 2 Tier 2 Suppliers Producer Retail Tier 3 Tier 3 Tier 3 Aut. Dealers Aftermarket Direct Sales OES repair Independent car sharing Ind. ES manufacturers Car Sharing Ind. Dealers Logistics Assembler Ind. retailers Telematics provider Logistics Direct sales suppliers Independent repair
  • 20. 20October 2, 2015CSC Proprietary and Confidential Future automotive ecosystem OEM VM Tier 1 Tier 1 Tier 1 Tier 2 Tier 2 Tier 2 Suppliers Producer Retail Tier 3 Tier 3 Tier 3 Auth. Dealers Aftermarket Direct Sales OES repair Ind. repair Ind. suppliers Car Sharing Ind. Dealers Logistics Assembler Ind. retailers Telematics provider Logistics Software / Apps / Content provider Fleet Mgt. & provision (AMaaS) Infrastructure Smart devices Smart roads IT infrastructure & analytics provider Security & monitoring provider Ind. car sharing & fleet provision Smart grid App Store S Mobility objects
  • 21. 21October 2, 2015CSC Proprietary and Confidential The Cyber Disruption Opportunity Moves Outside the Walls •  Live and work “without wires” •  Demand for universal access •  Work everywhere with any device •  Mix personal and corporate lives and information •  Information is currency and everyone wants it – especially thieves •  Universal access creates dynamic boundaries that are tougher to protect •  Ever advancing adversaries outpace traditional, passive cyber defenses New technology changes expectations New technology expands and changes risk Cybersecurity must respond proactively •  New business opportunities have moved outside the “castle” walls •  Defensible security perimeters no longer exist •  Products and services must anticipate and continuously manage risks
  • 22. 22October 2, 2015CSC Proprietary and Confidential Recommended Actions Hardware / Software / Communications Regulations Culture/Operations ECU hardening AV & Sec. Proxy Testing requirements Awareness Training ECU consolidation IPS Operator license req. Cont. Threat analysis Sec. architecture Sec. architecture Operator training req. Secure Prod. Lifecycle Black box Cryptography Data collection Patch Mgt. Segregation Sandboxing Data usage transp. Pentesting Fail-safe mode Secure bot loader Black box SOC (AC+Org) Last FS state ident. IAM Open codes ISAC Time stamps Data storage R&D processes Sec. Governance Billing relationship? Bug rewards program
  • 23. 23October 2, 2015CSC Proprietary and Confidential 23October 2, 2015CSC Proprietary and Confidential THANK YOU aschellong@csc.com