SUMS & CSMS: How to implement new cybersecurity and software update infrastructures in the transition to becoming UN ECE R155 compliant?
SBOM & Supply Chain: What role does a “Software Bill of Materials” play in mitigating software supply chain risks?
Design: How can we apply “Security by Design” principles when developing new software & architectures for securing new applications, like highly-automated and autonomous vehicles, electric vehicles, big data in automotive, backend-and cloud-infrastructures, CCAM, domain controller, vehicle computer & more?
SOTIF & ISO26262: What are the best approaches to handle interactions between SOTIF & functional safety & cybersecurity?
Compliancy: How does the WP.29 regulation approach cyber threats, vulnerabilities, and mitigations?
Operating Systems: What role does your operating system play in your cybersecurity strategy? Common systems vs. in-house OS?
Testing: What are the latest security testing methods beyond penetration- and fuzzing, & how can we automate security testing? Roles of IAST. SAST & SCA?
Advancements: What is the next big thing in security technologies & role in automotive e.g., distributed ledger technology, AI, post-quantum cryptography, crypto agility, data management infrastructure, trusted execution environments, blockchain, machine learning?
5G & V2X: What are the security implications of future networking tech for CAVs?
IDS: What is the future of intrusion detection systems & protecting vehicles against unauthorized access? How to integrate IDPS with AUTOSAR?
Future Risks: Are we ready for new risks from enhanced SW from CASE features?
Mitigation: What can we learn from mitigations in the end-to-end exploit of an automotive ECU?
Culture: How to foster a cyber security culture, awareness especially for HADs?