Preliminary Agenda
Note: Subject to change.
Driving the Future Securely -- An Overview of EV & Connected Vehicle Cybersecurity
The convergence of EV and telematics systems and their shared cyber-risk profile
How vehicle electrification changes traditional threat models
Core pillars of a robust mobility cybersecurity strategy
The broader socio-economic impacts of vehicle cyber incidents
Navigating Today’s Threat Landscape: EV & CV Attack Vectors
Top five EV/CV attack vectors observed in recent penetration tests
How independent researchers are uncovering multi-stage exploits
The role of the wider mobility ecosystem (chargers, apps, cloud) in introducing risk
Defensive countermeasures tailored to each attack class
Secure by Design: Building Resilient EV Architectures
Zonal and domain controller approaches from a security standpoint
Hardware root-of-trust and secure boot in EV control systems
Fail-safe mechanisms for detecting and isolating compromised modules
Balancing security controls with performance, cost, and usability constraints
Designing security in from Day 1
Over-the-Air Updates & Supply Chain Integrity
Mapping an end-to-end OTA update workflow with integrated code signing and attestation
Deploying mechanisms to ensure firmware integrity and authenticity in the field
Mitigating risks posed by third-party and open-source dependencies
Establishing rollback and “fail-safe” policies to prevent bricked vehicles
Incident Response & Forensics for EVs
Incident response playbook specific to EV/CV scenarios
Instrument vehicles and backend services for effective logging and telemetry
Forensic extraction from in-vehicle networks and ECUs
Coordinating with legal, regulatory, and PR stakeholders post-incident
Securing In-Vehicle Networks & Telematics
Message authentication and anomaly detection on CAN and FlexRay
Segmenting high-risk domains using automotive Ethernet VLANs and firewalls
Hardening telematics gateways against protocol-level exploits
Integrating network-level security with ECU-level protections
AI & Machine Learning for Real-Time Threat Detection
Appropriate ML algorithms for automotive anomaly detection
Gathering and curating training data from diverse sensor and network sources
Model performance under adversarial conditions
Lightweight inference engines for resource-constrained ECUs
Case Studies & Lessons Learned
Best practices from recent EV/CV security incidents
Common organizational pain points in security rollout
Cross-team collaboration to accelerate remediation
Translating lessons learned into actionable policy and process improvements
Regulatory & Standards Roadmap
UNECE WP.29, ISO/SAE 21434, and regional regulations
Integrating CSMS requirements into existing quality and safety processes
Future regulatory trends in EV and CV security
Preparing audit-ready documentation to demonstrate compliance
Roadmap to Resilience: Charting the Next Decade
Next-gen R&D themes: V2X, zero-trust, quantum-safe cryptography
Cross-industry collaboration for end-to-end ecosystem security
Aligning enterprise roadmaps with anticipated regulatory shifts
Continuous improvement through red-teaming and threat intelligence
Contact Us
Use this form to reach out with your questions or comments. We will get back to you asap.
Thanks for your interest in the Forum.
Copyright 2025 Smart Grid Observer. All rights reserved