Day Two | March 19, 2026

8:00 am - 8:50 am REGISTRATION & REFRESHMENTS

8:50 am - 9:00 am CHAIRPERSON’S OPENING REMARKS

AUTONOMOUS VEHICLES & AUTONOMOUS DRIVING CYBER SECURITY

9:00 am - 9:30 am NIST POST-QUANTUM CRYPTOGRAPHY: OFFICIAL STANDARDS, BEST PRACTICES AND RECOMMENDATIONS: KEYNOTE PRESENTATION LED BY NIST REPRESENTATIVE


9:30 am - 10:00 am PRESENTATION: POST-QUANTUM CRYPTOGRAPHY: FUTURE-PROOF VEHICLES WITH AN EXTRA LAYER OF PROTECTION WITHOUT COMPROMISING PERFORMANCE OR EFFICIENCY


10:00 am - 10:30 am PQC PRESENTATION LED BY EVENT PARTNER


10:30 am - 11:00 am MORNING REFRESHMENT BREAK

CYBERSECURITY FOR SOFTWARE-DEFINED VEHICLES

11:00 am - 11:30 am KEYNOTE PANEL DISCUSSION: WHAT MEASURES ARE AUTOMOTIVE COMPANIES TAKING TO COMPLY WITH THE DEPARTMENT OF COMMERCE’S RULE TO SECURE VEHICLE SUPPLY CHAINS FROM FOREIGN ADVERSARY THREATS

Kristie Pfosi - Global Chief Information Security Officer (CISO), Marelli
Tyson Benson - Senior Cybersecurity Product Analyst, ZF Group
Supriya Suravarjhala - Product Cybersecurity Specialist, AUMOVIO


img

Kristie Pfosi

Global Chief Information Security Officer (CISO)
Marelli

img

Tyson Benson

Senior Cybersecurity Product Analyst
ZF Group

img

Supriya Suravarjhala

Product Cybersecurity Specialist
AUMOVIO

11:30 am - 12:00 pm SBOM & HBOM PRESENTATION: UNDERSTAND SPECIFIC REQUIREMENTS THAT NEED TO BE MET WHEN PREPARING & PRESENTING LIST OF COMPONENTS AND SUB-COMPONENTS


12:00 pm - 12:30 pm PANEL DISCUSSION: UNDERSTAND THE CYBER RESILIENCE ACT & WHAT AUTOMOTIVE COMPANIES NEED TO DO TO COMPLY WITH CRA IF THEY WANT TO SELL VEHICLES IN A GLOBALIZED ECONOMY

Falgun Dave - Manager – Electrical Systems Engineering (Functional Safety and Cybersecurity), Polaris
Supriya Suravarjhala - Product Cybersecurity Specialist, AUMOVIO
img

Falgun Dave

Manager – Electrical Systems Engineering (Functional Safety and Cybersecurity)
Polaris

img

Supriya Suravarjhala

Product Cybersecurity Specialist
AUMOVIO

12:30 pm - 1:30 pm LUNCH BREAK

LIFETIME/LONG-TERM CYBERSECURITY MANAGING SECURITY VULNERABILITIES FOR TIMELINE OF 12-20+ YEARS

1:30 pm - 2:00 pm PRESENTATION LED BY EVENT PARTNER


2:00 pm - 2:30 pm PRESENTATION: EVOLUTION OF AGENTIC AI: HOW CYBERSECURITY IS BEING RE-SHAPED BY AGENTIC AI AND HOW AI AGENTS ARE BEING USED FOR THREAT MODELLING

2:30 pm - 3:25 pm USE CASE PRESENTATIONS: SHOWCASING PROS, CONS & LIMITATIONS OF LLM AND METHODS TO TAKE ADVATANGE OF LARGE LANGUAGE MODELS FOR: 1) CREATING RISK PROFILES OF NEW VULNERABILITIES 2) GENERATING & DEPLOYING SECURITY PATCHES SAFELY & QUICKLY


3:30 pm - 4:00 pm DEVSECOPS IN AUTOMOTIVE APPLICATION SECURITY: HOW CAN WE LEARN FROM TRADITIONAL IT PRINCIPLES AND BRING THEM TO DEVELOPMENT


4:00 pm - 4:00 pm CHAIRPERSON’S CLOSING REMARKS & END OF CONFERENCE