Presented at
BSidesLV 2017,
July 25, 2017, 6:30 p.m.
(55 minutes).
It's been almost a year since the DMCA exemption made hacking your own car legal and 3 years since I Am The Cavalry launched our 5 Star Automotive Cyber Safety Framework. We've had demonstrations of vehicle hacks, research on secure over the air updates, and new open source hardware projects to simplify RE'ing your vehicle. Has there been a wave of vuls in vehicle systems? What are automakers doing to secure connected vehicles? What about that whole Vehicle-to-Vehicle communication mandate? Where is automotive security is going, what has the impact of policy been, and, most importantly - how can more researchers get involved in helping to find solutions to all this? This session will have guest speakers bringing some exciting "inside" perspective to these questions and more.
Presenters:
-
Chris King
- Cyber Defense Manager - Rockwell Automation
Chris is a member of I am the Cavalry and a security researcher focusing on cyber-physical systems, vulnerability disclosure issues, and security policy. At his day job, Chris is the Cyber Defense manager at Rockwell Automation, a leading industrial automation company. He manages global incident response operations, vulnerability management, and digital forensics for IT and OT systems. Prior to Rockwell, Chris was a member of the Vulnerability Analysis team at the non-profit CERT Coordination Center (CERT/CC), part of the Software Engineering Institute at Carnegie Mellon University.
-
Kevin Tierney
- Director - Product Cybersecurity - General Motors
Kevin is a Director of Product Cybersecurity at GM and leads the team focused on in-vehicle security architecture, red team, governance and risk management, and advanced development.
-
Abe Chen
- Head of Product Security - NIO
Abe T. Chen is a recognized security leader in end-to-end digital and physical investigations, advanced layered security architectures, compliance/risk mitigation methodologies, and product security.
Abe has made a career of successfully bringing bleeding-edge security techniques to the enterprise across the software, technology, automotive, finance, manufacturing, retail, telecommunications, and education sectors. He is recognized across the industry for leading teams and architecting innovative security programs.
Links:
Similar Presentations: