Risks and Challanges
- TYPE: Combined Session DATE: Thursday, May 14, 2020 TIME: 17:00-18:00 LOCATION: AMMERSEE II
Modern cars contain hundreds of SoCs (System on Chips). A car typically runs thirty to fifty million lines of code and produces over ten thousands of data messages per second. Most of those SoCs are very specialized and embed only limited resources. They communicate on multiple specialized and non-compatible networks (CAN, Lin, Ethernet, MOST, ...). Nevertheless, the software they run must be secured, regardless of where the applications are running: on the edge (inside the car), in the near field (city, infrastructure) or fully remotely (cloud).
The automotive industry and many other industries (train, energy, ship, ...) have strong specific requirements. Nevertheless, even if OIDc was not initially designed for those markets, it is valuable not only to secure exchanges between cars to the cloud but also to secure exchanges inside the car as well as between cars and city infrastructures. Last but not least, OIDc can unite existing Internet identities with a driver or passenger identity inside the car.
This talk presents an overview of the integration of OIDc inside the AGL (Automotive Grade Linux) security model. It explains how IoT.bzh uses OIDc to secure the interaction between car infotainment, instrument cluster or telematic unit. Finally, it proposes how OIDc could help you to link your Internet identities with the one in your car. All this in order to smoothly transfer your beloved Internet services to your car headache-free !
Digital transformation requires that companies process more data with more apps involving more services. IoT, services and rich apps provide the vulnerable interfaces between business process and customers, while legacy apps hold the door open for outdated protocols and vulnerable on-prem systems. In this talk, learn of the latest cutting edge exploits impacting organizations like yours, how to secure your service and device identities, and how a good develop process can ensure yours isn't the next good bot to go bad.
- Understand how adversaries are utilizing the explosion of non-human identities to compromise organizations
- Understand the top defensive measures to stop the exploits.
- Understand how to build and operate apps to best identity security practices
- How to get to a security reference architecture in an IoT eco-system
- Security architectures for IoT systems and classical IT systems – similarities and differences
- Main obstacles for a secure IoT eco-system and how to address them
- How to apply this to a real-life scenario
- Registration fee:
€1600.00 till 15.04.2020
$2000.00 till 15.04.2020
S$2560.00 till 15.04.2020
17600.00 kr till 15.04.2020
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 12 - 15, 2020 Munich, Germany
The European Identity & Cloud Conference 2020 is proud to present a large number of partners
How can we help you