Highlights of the Program
2 days business program:
Learn from real-world case studies by industry leaders.
SHOWCASING INNOVATION:
Discover the latest technology and techniques from across the industry.
leaders talk:
Hear from top-level experts about how to stay ahead in a fast-changing industry.
MULTIPLE STREAMS:
A business program that is multi-disciplinary, giving you a broad view of the industry.
SMART TECHNOLOGIES:
Explore the latest smart and AI-driven solutions, and see how they can be used in your business.
roundtable discussion:
Join talks with industry peers. Share ideas, make connections, and find new partners.
Program
Day 1 :
WEDNESDAY, JULY 29, 2026
08:30 - 09:30
REGISTRATION AND MORNING REFRESHMENTS
09:30 - 09:40
OPENING ADDRESS
09:40 - 10:05
NAVIGATING THE CYBER SECURITY PITFALLS FOR EU PASSENGER CARS


Bodo Seifert
TÜV Rheinland
- Providing an overview of R155 scope and its mandatory implementation for new vehicles in the EU from July 2024
- Highlighting key agencies and associations involved in automotive cybersecurity standards and regulations
- Examining consequences of non-compliance with cybersecurity regulations in the automotive industry
- Summarizing relevant cybersecurity standards, including ISO/IEC 27001, ISO 31000, and ISO 21434
10:05 - 10:10
Q&A SESSION ON THE CYBER SECURITY PITFALLS IN AUTOMOTIVE
10:10 - 10:40
SPEED NETWORKING SESSION
- Exchange business cards and get connected in short one-to-one meetings
- Start the conversation to arrange a more formal meeting later on in the conference
- Share your professional background and discuss your biggest business issues – don't forget your business cards!
10:40 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:30
PANEL DISCUSSION ON SECURING THE SOFTWARE-DEFINED VEHICLES - CHALLENGES AND SOLUTIONS
- What are the dynamics of cyber threat uncertainties in integrated positioning and navigation systems for autonomous vehicles?·
- What are the most critical cybersecurity vulnerabilities unique to SDVs?
- Given the complexity of AI-based threat analysis in modern vehicles, are standards like ISO/SAE 21434 evolving fast enough?
- How are the principles of zero trust applied in the design and operation of SDVs?
- What strategies can be implemented to ensure that cyberattacks remain contained within a single vehicle or subsystem?
| The University of Alabama
| VicOne
| Matrickz Inc.
| Aeris
| International Motors LLC
11:30 - 11:55
AUTOMATED ASSURANCE – AI STRATEGIES FOR CYBERSECURITY IN SOFTWARE-DEFINED VEHICLES


Javier Mendoza
AVL Software and Functions
- Exploring how the software-defined vehicle is reshaping the cybersecurity risk landscape
- Understanding how AI ensures continuous security across the vehicle lifecycle
- Discovering proactive and generative AI methods shaping the future of automotive defense
11:55 - 12:00
Q&A SESSION ON AI STRATEGIES FOR SOFTWARE-DEFINED VEHICLE SECURITY
12:00 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
AN AUTO ARCHITECTURAL APPROACH FOR SECURE CONNECTIVITY


Wladimir Araujo
Aeris
- Learning how a network-anchored architecture strengthens in-vehicle connectivity security
- Exploring how this model compares technically and economically to agent and firewall-based setups
- Understanding how this approach reduces complexity and lowers operational costs effectively
13:55 - 14:00
Q&A SESSION ON AUTO ARCHITECTURE FOR SECURE CONNECTIVITY
14:00 - 14:25
CYBERSECURITY ASSURANCE CASES USING STRUCTURED ARGUMENTATION


Jeff Joyce
Critical Systems Labs
- Building evidence-based arguments to show connected vehicles are secure for automakers
- Integrating KPIs and data analytics into assurance cases to help monitor cybersecurity
- Supporting decision-making about cybersecurity risks and compliance through assurance cases
14:25 - 14:30
Q&A SESSION ON THE CYBERSECURITY ASSURANCE CASES
14:30 - 15:00
AFTERNOON COFFEE BREAK IN THE EXHIBIT AREA
15:00 - 15:25
AI-ENABLED ACCELERATED CYBERSECURITY ENGINEERING IN AUTOMOTIVE


Hasan Akram
Matrickz
- Examining how AI is transforming the landscape of engineering in the automotive industry
- Accelerating cybersecurity engineering processes with advanced AI technologies
- Showcasing case studies of accelerated development cycles and potential risks
15:25 - 15:30
Q&A SESSION ON AI CYBERSECURITY ENGINEERING
15:30 - 15:55
HOW TO MEET GLOBAL SECURITY STANDARDS WHILE REDUCING COST


Andre Weimerskirch
Block Harbor Cybersecurity
- Understanding how evolving global cybersecurity regulations are reshaping the automotive industry
- Exploring cost-effective strategies for compliance, including AI-driven automation and smart toolchains
- Learning how to implement scalable cybersecurity management systems across a vehicle's lifecycle
15:55 - 16:00
Q&A SESSION ON MEETING GLOBAL SECURITY STANDARDS AT A LOWER COST
16:00 - 16:25
SECURING AUTOMOTIVE SYSTEMS AGAINST 'HARVEST NOW, DECRYPT LATER' ATTACKS


Abdulrahman Yacoob
Valeo
- Exploring how harvest now, decrypt later (HNDL) attacks pose long-term risks to connected vehicles
- Understanding how threat modeling is evolving to assess quantum-resilient cybersecurity measures
- Learning why early post-quantum cryptography (PQC) adoption is crucial for automotive system security
16:25 - 16:30
Q&A SESSION ON SECURING AUTOMOTIVE SYSTEMS AGAINST HNDL ATTACKS
16:30 - 17:30
NETWORKING DRINKS RECEPTION
Day 2 :
THURSDAY, JULY 30, 2026
09:00 - 09:30
MORNING REFRESHMENTS
09:30 - 09:40
OPENING ADDRESS
09:40 - 10:05
CYBERSECURITY FOR AUTOMOBILES – RE-INVENTING THE WHEEL?


Nishant Jadhav
Woodside Capital Partners
- Examining the key drivers for enhanced user and device security in connected vehicles
- Exploring cybersecurity trends mapped to the evolution of autonomous automobiles
- Understanding the rapid growth of the automotive cybersecurity market over the next decade
10:05 - 10:10
Q&A SESSION ON RISK-BASED VULNERABILITY MANAGEMENT STRATEGIES
10:10 - 10:35
THE CRUCIAL ROLE OF RISK-BASED VULNERABILITY MANAGEMENT


Amadou Kane
VicOne
- Learning how focusing on high-risk vulnerabilities helps reduce incidents and cut remediation costs
- Exploring strategic approaches like risk scoring and threat intelligence for smarter prioritization
- Understanding how continuous monitoring keeps risk management effective and up-to-date
10:35 - 10:40
Q&A SESSION ON RISK-BASED VULNERABILITY MANAGEMENT STRATEGIES
10:40 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:25
CYBER-RESILIENT GNSS-BASED AUTONOMOUS VEHICLE NAVIGATION


Mizanur Rahman
The University of Alabama
- Examining the increasing range and complexity of cyber threats targeting GNSS navigation systems
- Discussing innovative models that help detect and analyze GNSS spoofing attempts in real time
- Exploring practical mitigation approaches to maintain navigation reliability under cyber compromise
11:25 - 11:30
Q&A SESSION ON GNSS-BASED VEHICLE NAVIGATION SECURITY STRATEGIES
11:30 - 11:55
NANO CYBERSECURITY FOR LAW ENFORCEMENT, FIRST RESPONDERS, FLEET, AND TRUCKING


Micki Boland
Check Point Software
- Exploring key vulnerabilities of the CAN bus system, with a focus on authentication gaps and risks
- Examining the broader challenges around SDV and OTA security, privacy, and operational safety
- Presenting a conceptual use case for a vehicle-based cybersecurity device enabling secure data flow
11:55 - 12:00
Q&A SESSION ON NANO CYBERSECURITY USE CASES FOR VEHICLE COMMUNICATION
12:00 - 12:30
RESERVED PRESENTATION
12:30 - 12:45
FEEDBACK AND RAFFLE DRAW
12:45 - 14:00
NETWORKING LUNCH
Become a Speaker & Join the Conversation
SUBSCRIBE FOR UPDATES
By submitting, you agree to receive email communications from the event organizers, including upcoming promotions and discounted tickets, news, and access to related events.