Highlights of the Program
2 days business program:
Learn from real-world case studies by industry leaders.
SHOWCASING INNOVATION:
Discover the latest technology and techniques from across the industry.
leaders talk:
Hear from top-level experts about how to stay ahead in a fast-changing industry.
MULTIPLE STREAMS:
A business program that is multi-disciplinary, giving you a broad view of the industry.
SMART TECHNOLOGIES:
Explore the latest smart and AI-driven solutions, and see how they can be used in your business.
roundtable discussion:
Join talks with industry peers. Share ideas, make connections, and find new partners.
Program
Day 1 :
WEDNESDAY, JULY 29, 2026
08:00 - 08:50
REGISTRATION AND MORNING REFRESHMENTS
08:50 - 09:00
OPENING ADDRESS
09:00 - 09:25
STRENGTHENING AUTOMOTIVE CYBERSECURITY IN THE DIGITAL ERA


Venkata Krishna Cheemalakonda
ZF Group
- Embedding cybersecurity into software-defined vehicles and secure OTA update architectures
- Leveraging real-time monitoring and AI-driven detection to protect connected fleets
- Navigating global standards and regulations shaping modern automotive cybersecurity programs
09:25 - 09:30
Q&A SESSION ON ADVANCING CYBER RESILIENCE IN DIGITAL VEHICLES
09:30 - 09:55
BIOMETRICS AND GEOLOCATION RISKS IN CONNECTED VEHICLES
- Analyzing emerging federal and state privacy laws governing connected vehicle data
- Assessing legal and cybersecurity risks tied to biometrics, geolocation, and sensitive telemetry
- Applying privacy-by-design principles and V2I security practices to reduce enforcement exposure
09:55 - 10:00
Q&A SESSION ON MANAGING PRIVACY ENFORCEMENT IN CONNECTED MOBILITY
10:00 - 10:25
PRIVACY, SECURITY, AND STANDARDS IN CONNECTED VEHICLES


Shormin Chowdhury
Ford Motor Company
- Examining the evolving landscape of connected and automated vehicle technologies
- Applying privacy-by-design principles including data minimization and user consent
- Implementing secure SDLC practices aligned with ISO/SAE 21434 and UNECE R155
10:25 - 10:30
Q&A SESSION ON BALANCING PRIVACY AND SECURITY IN CONNECTED CARS
10:30 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:30
PANEL DISCUSSION ON SECURING THE SOFTWARE-DEFINED VEHICLES - CHALLENGES AND SOLUTIONS
- What are the dynamics of cyber threat uncertainties in integrated positioning and navigation systems for autonomous vehicles?·
- What are the most critical cybersecurity vulnerabilities unique to SDVs?
- Given the complexity of AI-based threat analysis in modern vehicles, are standards like ISO/SAE 21434 evolving fast enough?
- How are the principles of zero trust applied in the design and operation of SDVs?
- What strategies can be implemented to ensure that cyberattacks remain contained within a single vehicle or subsystem?
| The University of Alabama
| VicOne
| Matrickz Inc.
| Aeris
| International Motors LLC
11:30 - 11:55
WHEN SAFETY MEETS CYBERSECURITY IN SDVS
- Exploring the convergence of functional safety and cybersecurity in autonomous vehicle systems
- Analyzing how cyber vulnerabilities can create real-world risks in safety-critical systems
- Integrating safety engineering with secure SDLC practices early in vehicle development
11:55 - 12:00
Q&A SESSION ON ALIGNING SAFETY AND CYBERSECURITY IN AUTONOMOUS VEHICLES
12:00 - 12:25
AN AUTO ARCHITECTURAL APPROACH FOR SECURE CONNECTIVITY


Wladimir Araujo
Aeris
- Learning how a network-anchored architecture strengthens in-vehicle connectivity security
- Exploring how this model compares technically and economically to agent and firewall-based setups
- Understanding how this approach reduces complexity and lowers operational costs effectively
12:25 - 12:30
Q&A SESSION ON AUTO ARCHITECTURE FOR SECURE CONNECTIVITY
12:30 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
ZERO TRUST FOR SOFTWARE-DEFINED VEHICLES


Robert Kaster
Robert Bosch LLC
- Reframing zero trust from static models to dynamic, adaptive architectures for SDVs
- Evaluating trust decisions based on physical impact of ECU actions in vehicle systems
- Designing nuanced trust models addressing safety, behavior, and real-world consequences
13:55 - 14:00
Q&A SESSION ON APPLYING ZERO TRUST IN SOFTWARE-DEFINED VEHICLES
14:00 - 14:25
CYBERSECURITY DOESN’T STOP AT SOP - EXTENDING ISO/SAE 21434


Vincent Besselat
CS GROUP - Canada
- Exploring how ISO/SAE 21434 cybersecurity requirements extend into vehicle production
- Aligning engineering cybersecurity frameworks with TISAX and enterprise security practices
- Highlighting best practices for integrating cybersecurity across engineering and manufacturing
14:25 - 14:30
Q&A SESSION ON INTEGRATING CYBERSECURITY INTO VEHICLE MANUFACTURING
14:30 - 14:55
AI-ENABLED ACCELERATED CYBERSECURITY ENGINEERING IN AUTOMOTIVE
14:55 - 15:00
Q&A SESSION ON AI CYBERSECURITY ENGINEERING
15:00 - 15:20
AFTERNOON COFFEE BREAK IN THE EXHIBIT AREA
15:20 - 15:45
HOW TO MEET GLOBAL SECURITY STANDARDS WHILE REDUCING COST


Andre Weimerskirch
Block Harbor Cybersecurity
- Understanding how evolving global cybersecurity regulations are reshaping the automotive industry
- Exploring cost-effective strategies for compliance, including AI-driven automation and smart toolchains
- Learning how to implement scalable cybersecurity management systems across a vehicle's lifecycle
15:45 - 15:50
Q&A SESSION ON MEETING GLOBAL SECURITY STANDARDS AT A LOWER COST
15:50 - 16:15
SECURING AUTOMOTIVE SYSTEMS AGAINST 'HARVEST NOW, DECRYPT LATER' ATTACKS


Abdulrahman Yacoob
Valeo
- Exploring how harvest now, decrypt later (HNDL) attacks pose long-term risks to connected vehicles
- Understanding how threat modeling is evolving to assess quantum-resilient cybersecurity measures
- Learning why early post-quantum cryptography (PQC) adoption is crucial for automotive system security
16:15 - 16:20
Q&A SESSION ON SECURING AUTOMOTIVE SYSTEMS AGAINST HNDL ATTACKS
16:20 - 16:45
CYBERSECURITY RISKS IN RESIDENTIAL EV CHARGING ECOSYSTEMS


Manoj Karwa
Ampure
- Examining home network intrusion risks introduced by connected EV chargers
- Protecting sensitive data including VINs, credentials, and payment information
- Mitigating malware injection and grid disruption risks from compromised chargers
16:45 - 16:50
Q&A SESSION ON SECURING RESIDENTIAL EV CHARGING NETWORKS
16:50 - 17:15
DYNAMIC CYBERSECURITY VALIDATION FOR SDVS IN MOTION


Sushanta Das
American Center for Mobility
- Transitioning from static testing to real-world validation under dynamic driving conditions
- Enabling continuous validation across OTA updates, ADAS, and automated driving systems
- Generating evidence-based assurance aligned with standards and operational risk reduction
17:15 - 17:20
Q&A SESSION ON VALIDATING CYBERSECURITY IN REAL-WORLD VEHICLE OPERATIONS
17:20 - 18:20
NETWORKING DRINKS RECEPTION
Day 2 :
THURSDAY, JULY 30, 2026
08:00 - 08:30
MORNING REFRESHMENTS
08:30 - 08:40
OPENING ADDRESS
08:40 - 09:10
PANEL DISCUSSION ON AUTOMOTIVE CYBERSECURITY
09:10 - 09:35
INTEGRATING ISO 26262 AND ISO 21434 IN SDLC


Manikandan Menon
Lucid Motors
- Establishing an integrated SDLC aligning ISO 26262 functional safety with ISO 21434 cybersecurity
- Implementing verification and validation processes to ensure robust automotive software
- Managing controlled CI/CD pipelines and secure release governance for vehicle platforms
09:35 - 09:40
Q&A SESSION ON ALIGNING SAFETY AND CYBERSECURITY DEVELOPMENT
09:40 - 10:05
MEETING U.S. CONNECTED VEHICLE RULE ORIGIN REQUIREMENTS
- Explaining the BIS connected vehicle rule introducing origin requirements and annual Declarations of Conformity
- Identifying gaps where traditional software composition analysis fails to prove proprietary component provenance
- Demonstrating how SBOMs and build-time analysis enable compliance while strengthening overall vehicle cybersecurity
10:05 - 10:10
Q&A SESSION ON PROVING SOFTWARE ORIGIN AND VEHICLE COMPLIANCE
10:10 - 10:30
MORNING COFFEE BREAK IN THE EXHIBIT AREA
10:30 - 11:00
PANEL DISCUSSION ON AUTOMOTIVE CYBERSECURITY
11:00 - 11:25
THE CRUCIAL ROLE OF RISK-BASED VULNERABILITY MANAGEMENT


Amadou Kane
VicOne
- Learning how focusing on high-risk vulnerabilities helps reduce incidents and cut remediation costs
- Exploring strategic approaches like risk scoring and threat intelligence for smarter prioritization
- Understanding how continuous monitoring keeps risk management effective and up-to-date
11:25 - 11:30
Q&A SESSION ON RISK-BASED VULNERABILITY MANAGEMENT STRATEGIES
11:30 - 11:55
CYBER-RESILIENT GNSS-BASED AUTONOMOUS VEHICLE NAVIGATION
- Examining the increasing range and complexity of cyber threats targeting GNSS navigation systems
- Discussing innovative models that help detect and analyze GNSS spoofing attempts in real time
- Exploring practical mitigation approaches to maintain navigation reliability under cyber compromise
11:55 - 12:00
Q&A SESSION ON GNSS-BASED VEHICLE NAVIGATION SECURITY STRATEGIES
12:00 - 12:25
NANO CYBERSECURITY FOR LAW ENFORCEMENT, FIRST RESPONDERS, FLEET, AND TRUCKING
- Exploring key vulnerabilities of the CAN bus system, with a focus on authentication gaps and risks
- Examining the broader challenges around SDV and OTA security, privacy, and operational safety
- Presenting a conceptual use case for a vehicle-based cybersecurity device enabling secure data flow
12:25 - 12:30
Q&A SESSION ON NANO CYBERSECURITY USE CASES FOR VEHICLE COMMUNICATION
12:30 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
BUILDING AUTONOMOUS VULNERABILITY INTELLIGENCE FOR AUTOMOTIVE CYBERSECURITY
- Exploring why manual CVE impact analysis across complex automotive supply chains is no longer sustainable
- Learning how vector search enables semantic matching between vulnerabilities and diverse software inventories
- Seeing how agentic AI automates detection prioritization and remediation planning for safety-critical systems
13:55 - 14:00
Q&A SESSION ON AUTONOMOUS VULNERABILITY INTELLIGENCE IN AUTOMOTIVE SYSTEMS
14:00 - 14:25
TISAX AT SCALE - CUTTING CERTIFICATION TIME BY 50 % WITHOUT ADDED RISK
- Exploring why slow TISAX certification creates supply chain delays and risk across OEM projects
- Outlining practical frameworks that cut certification effort and timelines by more than half
- Showing how OEMs and Tier 1s scale TISAX readiness using tools AI and repeatable playbooks
14:25 - 14:30
Q&A SESSION ON SCALING TISAX CERTIFICATION WITHOUT RISK
14:30 - 14:55
DRIVING CYBER RESILIENCE THROUGH AUTO-ISAC COLLABORATION


Heather Wagner
Auto-ISAC
- Tracing the evolution of Auto-ISAC and its role in automotive cybersecurity collaboration
- Establishing trusted information sharing models across OEMs, suppliers, and partners
- Evaluating Auto-ISAC’s global impact and its role in future cyber resilience strategies
14:55 - 15:00
Q&A SESSION ON ADVANCING INDUSTRY COLLABORATION IN CYBERSECURITY
15:00 - 15:15
FEEDBACK AND RAFFLE DRAW
15:15 - 15:30
CLOSING REMARKS
Become a Speaker & Join the Conversation
SUBSCRIBE FOR UPDATES
By submitting, you agree to receive email communications from the event organizers, including upcoming promotions and discounted tickets, news, and access to related events.
















