Preliminary Agenda

Note: Subject to change.

Driving the Future Securely -- An Overview of EV & Connected Vehicle Cybersecurity

  • The convergence of EV and telematics systems and their shared cyber-risk profile

  • How vehicle electrification changes traditional threat models

  • Core pillars of a robust mobility cybersecurity strategy

  • The broader socio-economic impacts of vehicle cyber incidents

Navigating Today’s Threat Landscape: EV & CV Attack Vectors

  • Top five EV/CV attack vectors observed in recent penetration tests

  • How independent researchers are uncovering multi-stage exploits

  • The role of the wider mobility ecosystem (chargers, apps, cloud) in introducing risk

  • Defensive countermeasures tailored to each attack class

Secure by Design: Building Resilient EV Architectures

  • Zonal and domain controller approaches from a security standpoint

  • Hardware root-of-trust and secure boot in EV control systems

  • Fail-safe mechanisms for detecting and isolating compromised modules

  • Balancing security controls with performance, cost, and usability constraints

  • Designing security in from Day 1

Over-the-Air Updates & Supply Chain Integrity

  • Mapping an end-to-end OTA update workflow with integrated code signing and attestation

  • Deploying mechanisms to ensure firmware integrity and authenticity in the field

  • Mitigating risks posed by third-party and open-source dependencies

  • Establishing rollback and “fail-safe” policies to prevent bricked vehicles

Incident Response & Forensics for EVs

  • Incident response playbook specific to EV/CV scenarios

  • Instrument vehicles and backend services for effective logging and telemetry

  • Forensic extraction from in-vehicle networks and ECUs

  • Coordinating with legal, regulatory, and PR stakeholders post-incident

Securing In-Vehicle Networks & Telematics

  • Message authentication and anomaly detection on CAN and FlexRay

  • Segmenting high-risk domains using automotive Ethernet VLANs and firewalls

  • Hardening telematics gateways against protocol-level exploits

  • Integrating network-level security with ECU-level protections

AI & Machine Learning for Real-Time Threat Detection

  • Appropriate ML algorithms for automotive anomaly detection

  • Gathering and curating training data from diverse sensor and network sources

  • Model performance under adversarial conditions

  • Lightweight inference engines for resource-constrained ECUs

Case Studies & Lessons Learned

  • Best practices from recent EV/CV security incidents

  • Common organizational pain points in security rollout

  • Cross-team collaboration to accelerate remediation

  • Translating lessons learned into actionable policy and process improvements

Regulatory & Standards Roadmap

  • UNECE WP.29, ISO/SAE 21434, and regional regulations

  • Integrating CSMS requirements into existing quality and safety processes

  • Future regulatory trends in EV and CV security

  • Preparing audit-ready documentation to demonstrate compliance

Roadmap to Resilience: Charting the Next Decade

  • Next-gen R&D themes: V2X, zero-trust, quantum-safe cryptography

  • Cross-industry collaboration for end-to-end ecosystem security

  • Aligning enterprise roadmaps with anticipated regulatory shifts

  • Continuous improvement through red-teaming and threat intelligence