SlideShare a Scribd company logo
The Race to Autonomous
Compliance
May 25, 2022
Stutay Monga
Director
Schellman & Company
Autonomous Vehicles Are Here To Stay
20M
10Y
$24B
∞
Autonomous
Vehicles (AVs) on
the road by 2025
AVs will be a common, if
not preferred, option
within the auto industry
Potential Cost to
the Auto Industry
from Cyber Hacks
Techniques and
ways to hack AVs
Security Standards for AVs
ISO 21434 UNECE WP.29
Road Vehicles – Cybersecurity Vehicle Cybersecurity
The path to compliance and thereby speed to market requires:
Strategy: Are automotive organizations making cybersecurity one of their primary objectives?
Process: What is the process to become ISO 21434 compliant and the use of the Cybersecurity Assurance
Level (CAL)?
Design: What are the components of an autonomous vehicle that will benefit from enhanced security?
Today, AV Cybersecurity compliance is primarily governed by these two standards:
ISO 21434: Top Management
The most critical component to Cybersecurity Management System (CSMS)
compliance is Top Management.
Governance
Components of
CSMS
ISO 21434: Threat Analysis & Risk Assessment
Threat Scenarios
Frequency of Assessment: Continuous Monitoring or
Periodic Assessments
Risk Mitigation and Treatment Scenarios
Risk Identification and Impact Ratings
Vulnerabilities & Attack Paths
ISO 21434: Cybersecurity Incident Response
Major Components of the Incident Response Process
Communication Plan &
Roles and Responsibilities
Measurement Metrics
Identification and Remedial
Actions
Key Decision Makers and
Closure Criteria
ISO 21434: Product Development
Maintaining a high level of security throughout the entire product development
process is paramount.
Product
Development
Lifecycle: V-Model
Workflow
Design and
Testing
Component Level
Requirements
Key
Components of
Product
Development
Process
Evaluating Post
Deployment/
After Market
Performance
In order to keep pace with the evolution
in the AV industry, its imperative that
organizations begin to look at
compliance in conjunction with vehicle
design and development.
Thank You
www.schellman.com
info@schellman.com
1.866.254.0000
Int’l +1.813.288.8833

More Related Content

Similar to THE RACE TO AUTONOMOUS COMPLIANCE

Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
Ankit Singh
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
Tonex
 
TRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENT
TRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENTTRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENT
TRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENT
wle-ss
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
Security Innovation
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
OnBoard Security, Inc. - a Qualcomm Company
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief SummarySandeep Kar
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
 
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Dimitrios Platis
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
DorleControls
 
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
SEAA 2022
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
devvsandy
 
Future mobile networks connected and autonomous cars
Future mobile networks  connected and autonomous carsFuture mobile networks  connected and autonomous cars
Future mobile networks connected and autonomous cars
lammya aa
 
Connectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff HannahConnectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff Hannah
HARMAN Connected Services
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
Gilad Bandel
 
SI Accelerators for delivering IVI systems
SI Accelerators for delivering IVI systemsSI Accelerators for delivering IVI systems
SI Accelerators for delivering IVI systemsNepolian Rajarathinam
 
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
apidays
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
OnBoard Security, Inc. - a Qualcomm Company
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
Embitel Technologies (I) PVT LTD
 
The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020
Mirror Review
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf

Similar to THE RACE TO AUTONOMOUS COMPLIANCE (20)

Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
TRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENT
TRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENTTRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENT
TRENDS IN AUTONOMOUS VEHICLES AND MARKET DEPLOYMENT
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief Summary
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
 
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
 
Future mobile networks connected and autonomous cars
Future mobile networks  connected and autonomous carsFuture mobile networks  connected and autonomous cars
Future mobile networks connected and autonomous cars
 
Connectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff HannahConnectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff Hannah
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
 
SI Accelerators for delivering IVI systems
SI Accelerators for delivering IVI systemsSI Accelerators for delivering IVI systems
SI Accelerators for delivering IVI systems
 
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
 
The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 

More from wle-ss

SITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTING
SITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTINGSITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTING
SITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTING
wle-ss
 
IMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONS
IMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONSIMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONS
IMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONS
wle-ss
 
THE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLES
THE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLESTHE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLES
THE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLES
wle-ss
 
AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC...
 AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC... AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC...
AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC...
wle-ss
 
BREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AV
BREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AVBREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AV
BREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AV
wle-ss
 
WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?
WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?
WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?
wle-ss
 
OPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORT
OPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORTOPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORT
OPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORT
wle-ss
 
DISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATION
DISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATIONDISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATION
DISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATION
wle-ss
 
REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S...
 REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S... REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S...
REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S...
wle-ss
 
OPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRY
OPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRYOPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRY
OPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRY
wle-ss
 
TOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVE
TOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVETOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVE
TOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVE
wle-ss
 
ENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATA
ENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATAENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATA
ENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATA
wle-ss
 
OPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGY
OPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGYOPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGY
OPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGY
wle-ss
 
MEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCE
MEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCEMEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCE
MEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCE
wle-ss
 
BUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROL
BUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROLBUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROL
BUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROL
wle-ss
 
USING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITY
USING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITYUSING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITY
USING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITY
wle-ss
 
LEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENT
LEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENTLEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENT
LEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENT
wle-ss
 
CONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRY
CONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRYCONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRY
CONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRY
wle-ss
 
CALIFORNIA AND THE WATER CRISIS – HOW AMI HELPS
CALIFORNIA AND THE WATER CRISIS – HOW AMI HELPSCALIFORNIA AND THE WATER CRISIS – HOW AMI HELPS
CALIFORNIA AND THE WATER CRISIS – HOW AMI HELPS
wle-ss
 
SMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISE
SMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISESMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISE
SMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISE
wle-ss
 

More from wle-ss (20)

SITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTING
SITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTINGSITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTING
SITUATIONAL AWARENESS - THROUGH CONNECTIVITY AND EDGE COMPUTING
 
IMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONS
IMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONSIMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONS
IMPROVED SAFETY WITH 3D THERMAL RANGING FOR ADAS APPLICATIONS
 
THE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLES
THE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLESTHE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLES
THE CHALLENGES OF IMAGE QUALITY IN THE RACE FOR AUTONOMOUS VEHICLES
 
AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC...
 AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC... AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC...
AUTONOMOUS VEHICLES - THE RIGHT SOLUTIONS TO AVERT THE CRISIS OF MOTOR VEHIC...
 
BREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AV
BREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AVBREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AV
BREAKING THE FUNDAMENTAL ROBUST PERCEPTION GAPS FOR ADAS/ AV
 
WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?
WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?
WHAT WILL BE THE IN-VEHICLE CONNECTIVITY ‘GOLD STANDARD’ FOR ADAS AND AD?
 
OPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORT
OPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORTOPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORT
OPTIMIZING PIPELINES WITH MACHINE LEARNING DECISION SUPPORT
 
DISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATION
DISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATIONDISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATION
DISCUSSION ON DIGITAL OILFIELD FULL-FIELD OPTIMIZATION
 
REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S...
 REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S... REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S...
REMOTE MONITORING & APPLICATION OF NON-TRADITIONAL ENERGY METHODS TO POWER S...
 
OPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRY
OPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRYOPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRY
OPTIMIZATION OF THE END-TO-END OIL & GAS VALUE CHAIN FOR UPSTREAM INDUSTRY
 
TOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVE
TOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVETOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVE
TOWARDS AN AUTONOMOUS SELF-CONTAINED SURFACE SAFETY VALVE
 
ENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATA
ENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATAENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATA
ENTERPRISE ASSET MANAGEMENT SYSTEMS APPLICATION TO OPTIMIZE OILFIELD ASSET DATA
 
OPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGY
OPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGYOPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGY
OPERATOR ANALYTICS FROM IMPLEMENTING AN OPERATE BY EXCEPTION STRATEGY
 
MEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCE
MEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCEMEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCE
MEASUREMENT & REPORTING DATA ANALYSIS FOR COMPLIANCE
 
BUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROL
BUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROLBUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROL
BUILDING SMART UTILITY NETWORKS ENABLING REAL-TIME WATER LOSS CONTROL
 
USING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITY
USING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITYUSING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITY
USING NEAR-REAL TIME MONITORING TO IMPROVE EQUIPMENT RELIABILITY
 
LEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENT
LEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENTLEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENT
LEVERAGING BIG DATA FOR INTELLIGENT WATER MANAGEMENT
 
CONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRY
CONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRYCONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRY
CONTROLLING DATA TO IMPROVE SAFETY AND PRODUCTIVITY IN THE WATER INDUSTRY
 
CALIFORNIA AND THE WATER CRISIS – HOW AMI HELPS
CALIFORNIA AND THE WATER CRISIS – HOW AMI HELPSCALIFORNIA AND THE WATER CRISIS – HOW AMI HELPS
CALIFORNIA AND THE WATER CRISIS – HOW AMI HELPS
 
SMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISE
SMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISESMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISE
SMART WATER THROUGH THE OPERATOR’S LENS: COLLECT, CONNECT, OPTIMIZE, AND ADVISE
 

Recently uploaded

Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
jamalseoexpert1978
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 

Recently uploaded (20)

Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 

THE RACE TO AUTONOMOUS COMPLIANCE

  • 1. The Race to Autonomous Compliance May 25, 2022
  • 3. Autonomous Vehicles Are Here To Stay 20M 10Y $24B ∞ Autonomous Vehicles (AVs) on the road by 2025 AVs will be a common, if not preferred, option within the auto industry Potential Cost to the Auto Industry from Cyber Hacks Techniques and ways to hack AVs
  • 4. Security Standards for AVs ISO 21434 UNECE WP.29 Road Vehicles – Cybersecurity Vehicle Cybersecurity The path to compliance and thereby speed to market requires: Strategy: Are automotive organizations making cybersecurity one of their primary objectives? Process: What is the process to become ISO 21434 compliant and the use of the Cybersecurity Assurance Level (CAL)? Design: What are the components of an autonomous vehicle that will benefit from enhanced security? Today, AV Cybersecurity compliance is primarily governed by these two standards:
  • 5. ISO 21434: Top Management The most critical component to Cybersecurity Management System (CSMS) compliance is Top Management. Governance Components of CSMS
  • 6. ISO 21434: Threat Analysis & Risk Assessment Threat Scenarios Frequency of Assessment: Continuous Monitoring or Periodic Assessments Risk Mitigation and Treatment Scenarios Risk Identification and Impact Ratings Vulnerabilities & Attack Paths
  • 7. ISO 21434: Cybersecurity Incident Response Major Components of the Incident Response Process Communication Plan & Roles and Responsibilities Measurement Metrics Identification and Remedial Actions Key Decision Makers and Closure Criteria
  • 8. ISO 21434: Product Development Maintaining a high level of security throughout the entire product development process is paramount. Product Development Lifecycle: V-Model Workflow Design and Testing Component Level Requirements Key Components of Product Development Process Evaluating Post Deployment/ After Market Performance
  • 9. In order to keep pace with the evolution in the AV industry, its imperative that organizations begin to look at compliance in conjunction with vehicle design and development.