24 - 26 October, 2016
San Francisco

Media Center

Featured Download

Fast Track Your AttendanceFast Track Your Attendance

  • Current Attendee SnapshotCurrent Attendee Snapshot
    Curious as to whom you'll run into on the show floor this year? Take a look, these industry leaders have already signed up.
  • Post Show Report - Automotive Cyber Security Detroit 2015Post Show Report - Automotive Cyber Security Detroit 2015
    Automotive IQ's Automotive Cyber Security Summit surpassed all expectations - so we have raised them. Highlights from the past event are illustrated in this Post Show Report, and include an overview of the companies in attendance, a glance at what our audience had to say, and more!
  • Registration FormRegistration Form
    Interested in attending? Please fill out this registration form and email it to Carrie.Simon@iqpc.com.
  • Past Attendee SnapshotPast Attendee Snapshot
    CEOs, General Managers, and cybersecurity specialists representing top brands in the industry are already signing up to join us at the summit. Take a look at this past attendee document to see whom you might run into on the show floor this year.
  • Boss LetterBoss Letter
    Present your boss with this customizable letter detailing the reasons why you should attend the upcoming Automotive Cyber Security Summit this March in Detroit and you'll be sure to receive permission to join us.

Exclusive ContentExclusive Content

  • Interview with a HackerInterview with a Hacker
    What is your position on vigilante hackers? You will have a chance to meet one in March. Chris Valasek, Security Lead at Uber's Advanced Technologies Center, and famed Jeep hacker, will be speaking at the 3rd Automotive Cyber Security Summit. We tracked him down in advance of his session to ask him about his motivations, which arm of the auto industry was responsible for the openings he expolited, and his experience as a white hat.
  • In the DriverIn the Driver's Seat to Cyber Security
    This interactive experience puts you in the driver's seat towards cyber security. Skirt the vulnerabilities, view the facts, and hear from our expert summit speakers. Who will win the race to a secure infrastructure? It could be you!
  • Top 10 Automotive Cyber Security StoriesTop 10 Automotive Cyber Security Stories
    A regulatory rumble on capitol hill. White hats breaking into cars with effortless abandon. New commissions and boards springing up. Yet another Lear acquisition. A lot is happening in the automotive cyber sec space as we head into 2016. We’ve taken the liberty of rounding up the most relevant news stories of the past few months.
  • Interactive Post Show ReportInteractive Post Show Report
    This interactive post show report, illustrates the highlights from the Automotive Cyber Security East Summit. Take a look to see an overview of the companies in attendance, a glance at what our audience had to say, and more!

Whitepapers

  • WhiteboxCRYPTO Strength of SecurityWhiteboxCRYPTO Strength of Security
    This white paper, courtesy of Microsemi, describes the company's white-box cryptography product, WhiteboxCRYPTO™. Further, it also describes the structure of the white-box algorithms, how this structure differentiates white-box cryptography from classical algorithms, and why these structures are far more secure than classical software crypto implementations.
  • Remote Exploitation of an Unaltered Passenger VehicleRemote Exploitation of an Unaltered Passenger Vehicle
    You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.
  • Car Cybersecurity: What do the automakers really think?Car Cybersecurity: What do the automakers really think?
    The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and Tier One suppliers. Find out the key findings of the developer survey within!
  • Automotive Cyber Security: Industry PerspectivesAutomotive Cyber Security: Industry Perspectives
    Executives and industry experts from Kia, Hyundai, the University of Michigan and IOActive chime in on the industry's most pressing cybersecurity issues and how to resolve them in this exclusive report.

Exclusive Presentations

Video

  • Chris Valasek Hacks an SUVChris Valasek Hacks an SUV
    Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit, discusses how he breached a vehicle on the highway to expose its cyber security vulnerabilities in this exclusive video interview.
  • Past Speaker Interview: Chris ValasekPast Speaker Interview: Chris Valasek
    Chris Valasek, Director of Vehicle Security Research at IOActive, and past speaker at our summit, broaches safety technologies and intrusion detection systems in this exclusive on-site video interview.
  • Past Speaker Interview: Henry BzeihPast Speaker Interview: Henry Bzeih
    Henry Bzeih, CTO & Head of Connected Car at KIA Motors America, and past speaker at our summit, discusses the main challenges that OEMS and Tier 1 companies are experiencing in in the automotive security space, in this exclusive on-site video interview.
  • Past Speaker Interview: Josh CormanPast Speaker Interview: Josh Corman
    Josh Corman, Founder of I am the Cavalry, and returning speaker at the approaching summit, goes into industry challenges, and makes predictions for where automotive security is going in the next few years, in this exclusive on-site video interview.
  • Past Speaker Interview: Matthew CarpenterPast Speaker Interview: Matthew Carpenter
    Matthew Carpenter, Principal Security Researcher at Grimm, and past speaker at our summit, talks industry challenges, and what it would take to overhaul cyber security incident mapping, in this exclusive on-site video interview.

Sponsorship Information

Presentations

  • Challenges to Make Cars SecureChallenges to Make Cars Secure
    Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.
  • Cyber Security - OEM Point of ViewCyber Security - OEM Point of View
    Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.
  • PANEL: Automotive Retail and the Connected CarPANEL: Automotive Retail and the Connected Car
    Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation. 
  • Practical Real-Time Frame Authentication for In-Vehicle NetworksPractical Real-Time Frame Authentication for In-Vehicle Networks
    Summit speaker Kyusuk Han of the University of Michigan was kind enough to share this in-depth presentation about the need for in-vehicle security and a proposed protocol to help solve the major security problems.

Exclusive Content

  • Carmakers Fail to Protect Drivers From Hackers, Senator SaysCarmakers Fail to Protect Drivers From Hackers, Senator Says
    (Bloomberg) -- Automakers are adding wireless technologies into vehicles without enough protections to keep hackers from interfering with the operation of a car or stealing personal information, according to a report by U.S. Senator Edward Markey.

    Cars are now being built with Bluetooth, Wi-Fi, navigation systems and keyless entry systems that collect information about drivers -- such as where they travel and park -- and the data is being kept by car companies without any privacy standards, said Markey, a Massachusetts Democrat.

    This article talks about the need for cyber security prevention and the report by Senator Edward Markey.
    Source: Bloomberg
  • Chris Valasek Hacks an SUV: TranscriptChris Valasek Hacks an SUV: Transcript
    For your convenience, we've provided a transcript of our exclusive interview with Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit. Within he discusses how he breached a vehicle on the highway last month to expose its cyber security vulnerabilities.
  • Tracking & Hacking: Security & Privacy Gaps Put American Drivers at RiskTracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
    New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected.
  • The Future of Automotive Network Solution - BUS Systems and EthernetThe Future of Automotive Network Solution - BUS Systems and Ethernet
    Automotive IQ recently spoke with Florian Netter of Audi Electronics Venture about the current state of Automotive BUS Systems and Ethernet. Cyber security is a real challenge within BUS systems. Cyber security is and will ever be a challenge for the E/E architecture. And the more holistic the driver-supporting software interacts, the more important cyber security is.

Articles

  • AT&T to Link Connected Cars and Home Technologies ServicesAT&T to Link Connected Cars and Home Technologies Services
    The US telecommunications company, according to a Reuters news article, wishes to strengthen its position on the market for internet-connected devices. This way, it could provide a competitive platform against other internet and communications companies, such as Verizon and Google Inc. AT&T’s products, ‘Digital Life’ for the home security and automation service and ‘Drive’ for the connected car service, will operate as one, users being able to control various home functions from the car’s dashboard.
  • Using wireless technology to make cars better?Using wireless technology to make cars better?
    Wireless applications have had a fast evolution in the past few years. From the age of laptops to being used on smartphones and tablets, this new and fast-evolving technology is moving towards the automotive industry. Connected cars are already on the road, with even more to come in the next years. As these innovations become less expensive and easier to implement, more and more automotive applications could be seen. So, what are some of the uses for wireless… cars?
  • Automotive Cybersecurity for In-Vehicle CommunicationAutomotive Cybersecurity for In-Vehicle Communication
    Automotive cybersecurity issues have emerged as information technologies are increasingly deployed in modern vehicles, and security researchers have already demonstrated the associated threats and risks. Although many security protocols have been proposed, they have not considered the threats posed by denial-of-service (DoS) attacks and external connectivity vulnerabilities.

    Summit speakers Kyusuk Han and Andre Weimerskirch of the University of Michigan Transportation Research Institute co-wrote this article for IQT Quarterly in the Summer of 2014 that discusses a new in-vehicle protocol called IA-CAN.