Day 1: June 23, 2020

12:00 pm - 12:30 pm SECURING SOFTWARE DOWNLOADS AND OPEN VEHICLE APPLICATION PLATFORMS

Monica Mitchell - Chief Engineer of Cybersecurity, Polaris

• Identifying all of the connection points of a connected vehicle

• Hardening those points to protect the vehicle

• Futureproofing connected vehicles through communications security development

img

Monica Mitchell

Chief Engineer of Cybersecurity
Polaris

12:30 pm - 1:00 pm RECOGNIZING THE INTERSECTION OF SAFETY AND SECURITY ACROSS THE SOFTWARE LIFECYCLE

Mark Hermeling - Senior Director of Product Marketing, GrammaTech

• Learn with applicable use cases, how to address safety and security throughout the software lifecycle

• Understand how the benefits of static analysis expand beyond coding standards and guidelines

• Measure the impact of static analysis, and software composition analysis on increasing speed to market


img

Mark Hermeling

Senior Director of Product Marketing
GrammaTech

1:00 pm - 1:30 pm UNDERSTANDING THE RISK AND LIABILITIES ASSOCIATED WITH CYBERSECURITY AND PROTECTING YOUR ORGANIZATION

Jennifer Dukarski - Shareholder, Butzel Long

• Understand the responsibility and accountability of legal car applications

• Who has access to the data and vehicle monitoring data collected

• Developing a model of thinking that proves protecting the consumer is protecting yourself

img

Jennifer Dukarski

Shareholder
Butzel Long

1:30 pm - 2:00 pm THE ROAD TO SECURE CONNECTED VEHICLES

Matt Clemens - Director of Security Engineering, Arxan Technologies

Without the right protection, auto apps are vulnerable to reverse engineering attacks designed to steal code, personally identifiable information (PII), or give cybercriminals an entrance to an organization’s back office systems. Compounding this issue is the on-going struggle for many enterprises to incorporate application security into their software development lifecycles. Balancing speed and innovation with security is a challenge that even the most sophisticated technology companies have difficulty solving.


In this session, we’ll discuss:


• Common security challenges with connected automotive applications

• Best practices for app protection, including key and data encryption, code obfuscation, and real-time threat analytics

• Minimizing the impact of incorporating app protection into existing DevSecOps processes

img

Matt Clemens

Director of Security Engineering
Arxan Technologies

2:00 pm - 2:30 pm SECURING VEHICLE INTERNAL AND EXTERNAL COMMUNICATION - CHALLENGES AND CONSIDERATIONS

Venkata Kishore Kajuluri - In-Vehicle Cybersecurity Engineer, Ford Motor Company

• Harnessing new mindsets around security and safety in a connected world

• Securing vehicle internal/external communications

• Overcoming the hurdles of applying cybersecurity in a hardware world

img

Venkata Kishore Kajuluri

In-Vehicle Cybersecurity Engineer
Ford Motor Company

1. JOURNEY MAPPING PRODUCT SECURITY UNDER NEW FRAMEWORK

2:30 pm - 3:00 pm ROUNDTABLE 1: JOURNEY MAPPING PRODUCT SECURITY UNDER NEW FRAMEWORK
Sam Abbott-McCune - Principal Product IT Security Specialist, ZF Group
img

Sam Abbott-McCune

Principal Product IT Security Specialist
ZF Group

2. SECURING AUTONOMOUS VEHICLES AND COMPLEX EMBEDDED SYSTEMS

2:30 pm - 3:00 pm ROUNDTABLE 2: SECURING AUTONOMOUS VEHICLES AND COMPLEX EMBEDDED SYSTEMS
Ryan Gerdes - Assistant Professor, Virginia Tech
img

Ryan Gerdes

Assistant Professor
Virginia Tech