Highlights of the Program
2 days business program:
Learn from real-world case studies by industry leaders.
SHOWCASING INNOVATION:
Discover the latest technology and techniques from across the industry.
leaders talk:
Hear from top-level experts about how to stay ahead in a fast-changing industry.
MULTIPLE STREAMS:
A business program that is multi-disciplinary, giving you a broad view of the industry.
SMART TECHNOLOGIES:
Explore the latest smart and AI-driven solutions, and see how they can be used in your business.
roundtable discussion:
Join talks with industry peers. Share ideas, make connections, and find new partners.
Program
Day 1 :
WEDNESDAY, JULY 29, 2026
08:00 - 09:00
REGISTRATION AND MORNING REFRESHMENTS
09:00 - 09:10
OPENING ADDRESS
09:10 - 09:35
STRENGTHENING AUTOMOTIVE CYBERSECURITY IN THE DIGITAL ERA


Venkata Krishna Cheemalakonda
ZF Group
- Embedding cybersecurity into software-defined vehicles and secure OTA update architectures
- Leveraging real-time monitoring and AI-driven detection to protect connected fleets
- Navigating global standards and regulations shaping modern automotive cybersecurity programs
09:35 - 09:40
Q&A SESSION ON ADVANCING CYBER RESILIENCE IN DIGITAL VEHICLES
09:40 - 10:05
BIOMETRICS AND GEOLOCATION RISKS IN CONNECTED VEHICLES


Steven Wernikoff
Honigman LLP
- Analyzing emerging federal and state privacy laws governing connected vehicle data
- Assessing legal and cybersecurity risks tied to biometrics, geolocation, and sensitive telemetry
- Applying privacy-by-design principles and V2I security practices to reduce enforcement exposure
10:05 - 10:10
Q&A SESSION ON MANAGING PRIVACY ENFORCEMENT IN CONNECTED MOBILITY
10:10 - 10:35
PRIVACY, SECURITY, AND STANDARDS IN CONNECTED VEHICLES


Shormin Chowdhury
Ford Motor Company
- Examining the evolving landscape of connected and automated vehicle technologies
- Applying privacy-by-design principles including data minimization and user consent
- Implementing secure SDLC practices aligned with ISO/SAE 21434 and UNECE R155
10:35 - 10:40
Q&A SESSION ON BALANCING PRIVACY AND SECURITY IN CONNECTED CARS
10:40 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:30
PANEL DISCUSSION ON SECURING THE SOFTWARE-DEFINED VEHICLES - CHALLENGES AND SOLUTIONS
- What are the dynamics of cyber threat uncertainties in integrated positioning and navigation systems for autonomous vehicles?·
- What are the most critical cybersecurity vulnerabilities unique to SDVs?
- Given the complexity of AI-based threat analysis in modern vehicles, are standards like ISO/SAE 21434 evolving fast enough?
- How are the principles of zero trust applied in the design and operation of SDVs?
- What strategies can be implemented to ensure that cyberattacks remain contained within a single vehicle or subsystem?
| The University of Alabama
| VicOne
| Matrickz Inc.
| Aeris
| International Motors LLC
11:30 - 11:55
WHEN SAFETY MEETS CYBERSECURITY IN SDVS


Mona Elfiky
STH - Safety Tech Hub
- Exploring the convergence of functional safety and cybersecurity in autonomous vehicle systems
- Analyzing how cyber vulnerabilities can create real-world risks in safety-critical systems
- Integrating safety engineering with secure SDLC practices early in vehicle development
11:55 - 12:00
Q&A SESSION ON ALIGNING SAFETY AND CYBERSECURITY IN AUTONOMOUS VEHICLES
12:00 - 12:25
AN AUTO ARCHITECTURAL APPROACH FOR SECURE CONNECTIVITY


Wladimir Araujo
Aeris
- Learning how a network-anchored architecture strengthens in-vehicle connectivity security
- Exploring how this model compares technically and economically to agent and firewall-based setups
- Understanding how this approach reduces complexity and lowers operational costs effectively
12:25 - 12:30
Q&A SESSION ON AUTO ARCHITECTURE FOR SECURE CONNECTIVITY
12:30 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
DESIGNING CRYPTO-AGILE ARCHITECTURES FOR 15-YEAR LIFECYCLES


Manikanta Danda
BWI GROUP
- Addressing the “harvest now, decrypt later” threat across the 15-year vehicle lifecycle
- Defining crypto-agility as OTA-enabled migration from RSA and ECC to Kyber and Dilithium
- Integrating post-quantum cryptography into constrained ECUs while preserving ISO 21434 compliance
13:55 - 14:00
Q&A SESSION ON PREPARING VEHICLES FOR POST-QUANTUM SECURITY
14:00 - 14:25
CYBERSECURITY DOESN’T STOP AT SOP - EXTENDING ISO/SAE 21434


Vincent Besselat
CS GROUP - Canada
- Exploring how ISO/SAE 21434 cybersecurity requirements extend into vehicle production
- Aligning engineering cybersecurity frameworks with TISAX and enterprise security practices
- Highlighting best practices for integrating cybersecurity across engineering and manufacturing
14:25 - 14:30
Q&A SESSION ON INTEGRATING CYBERSECURITY INTO VEHICLE MANUFACTURING
14:30 - 14:55
AI-ENABLED ACCELERATED CYBERSECURITY ENGINEERING IN AUTOMOTIVE


Hasan Akram
Matrickz
- Examining how AI is transforming the landscape of engineering in the automotive industry
- Accelerating cybersecurity engineering processes with advanced AI technologies
- Showcasing case studies of accelerated development cycles and potential risks
14:55 - 15:00
Q&A SESSION ON AI CYBERSECURITY ENGINEERING
15:00 - 15:30
AFTERNOON COFFEE BREAK IN THE EXHIBIT AREA
15:30 - 15:55
HOW TO MEET GLOBAL SECURITY STANDARDS WHILE REDUCING COST


Andre Weimerskirch
Block Harbor Cybersecurity
- Understanding how evolving global cybersecurity regulations are reshaping the automotive industry
- Exploring cost-effective strategies for compliance, including AI-driven automation and smart toolchains
- Learning how to implement scalable cybersecurity management systems across a vehicle's lifecycle
15:55 - 16:00
Q&A SESSION ON MEETING GLOBAL SECURITY STANDARDS AT A LOWER COST
16:00 - 16:25
SECURING AUTOMOTIVE SYSTEMS AGAINST 'HARVEST NOW, DECRYPT LATER' ATTACKS


Abdulrahman Yacoob
Valeo
- Exploring how harvest now, decrypt later (HNDL) attacks pose long-term risks to connected vehicles
- Understanding how threat modeling is evolving to assess quantum-resilient cybersecurity measures
- Learning why early post-quantum cryptography (PQC) adoption is crucial for automotive system security
16:25 - 16:30
Q&A SESSION ON SECURING AUTOMOTIVE SYSTEMS AGAINST HNDL ATTACKS
16:30 - 16:55
CYBERSECURITY RISKS IN RESIDENTIAL EV CHARGING ECOSYSTEMS


Manoj Karwa
Ampure
- Examining home network intrusion risks introduced by connected EV chargers
- Protecting sensitive data including VINs, credentials, and payment information
- Mitigating malware injection and grid disruption risks from compromised chargers
16:55 - 17:00
Q&A SESSION ON SECURING RESIDENTIAL EV CHARGING NETWORKS
17:00 - 17:25
DYNAMIC CYBERSECURITY VALIDATION FOR SDVS IN MOTION


Sushanta Das
American Center for Mobility
- Transitioning from static testing to real-world validation under dynamic driving conditions
- Enabling continuous validation across OTA updates, ADAS, and automated driving systems
- Generating evidence-based assurance aligned with standards and operational risk reduction
17:25 - 17:30
Q&A SESSION ON VALIDATING CYBERSECURITY IN REAL-WORLD VEHICLE OPERATIONS
17:30 - 18:30
NETWORKING DRINKS RECEPTION
Day 2 :
THURSDAY, JULY 30, 2026
08:30 - 09:00
MORNING REFRESHMENTS
09:00 - 09:10
OPENING ADDRESS
09:10 - 09:35
INTEGRATING ISO 26262 AND ISO 21434 IN SDLC


Manikandan Menon
Lucid Motors
- Establishing an integrated SDLC aligning ISO 26262 functional safety with ISO 21434 cybersecurity
- Implementing verification and validation processes to ensure robust automotive software
- Managing controlled CI/CD pipelines and secure release governance for vehicle platforms
09:35 - 09:40
Q&A SESSION ON ALIGNING SAFETY AND CYBERSECURITY DEVELOPMENT
09:40 - 10:05
MEETING U.S. CONNECTED VEHICLE RULE ORIGIN REQUIREMENTS


Joe Saunders
RunSafe Security Inc.
- Explaining the BIS connected vehicle rule introducing origin requirements and annual Declarations of Conformity
- Identifying gaps where traditional software composition analysis fails to prove proprietary component provenance
- Demonstrating how SBOMs and build-time analysis enable compliance while strengthening overall vehicle cybersecurity
10:05 - 10:10
Q&A SESSION ON PROVING SOFTWARE ORIGIN AND VEHICLE COMPLIANCE
10:10 - 10:35
THE CRUCIAL ROLE OF RISK-BASED VULNERABILITY MANAGEMENT


Amadou Kane
VicOne
- Learning how focusing on high-risk vulnerabilities helps reduce incidents and cut remediation costs
- Exploring strategic approaches like risk scoring and threat intelligence for smarter prioritization
- Understanding how continuous monitoring keeps risk management effective and up-to-date
10:35 - 10:40
Q&A SESSION ON RISK-BASED VULNERABILITY MANAGEMENT STRATEGIES
10:40 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:25
AUTOMOTIVE CYBERSECURITY IN V2X ECOSYSTEMS


Srikanth Bendi
ZF Group
- Exploring V2X growth, technology landscape, and benefits for connected vehicle users
- Examining regulations including ISO 21434, privacy laws, and emerging government rules
- Addressing attack vectors and security needs across IoT, 5G, OTA, and trusted systems
11:25 - 11:30
Q&A SESSION ON SECURING THE EVOLVING V2X ECOSYSTEM
11:30 - 11:55
CYBER-RESILIENT GNSS-BASED AUTONOMOUS VEHICLE NAVIGATION


Mizanur Rahman
The University of Alabama
- Examining the increasing range and complexity of cyber threats targeting GNSS navigation systems
- Discussing innovative models that help detect and analyze GNSS spoofing attempts in real time
- Exploring practical mitigation approaches to maintain navigation reliability under cyber compromise
11:55 - 12:00
Q&A SESSION ON GNSS-BASED VEHICLE NAVIGATION SECURITY STRATEGIES
12:00 - 12:25
NANO CYBERSECURITY FOR LAW ENFORCEMENT, FIRST RESPONDERS, FLEET, AND TRUCKING


Micki Boland
Check Point Software
- Exploring key vulnerabilities of the CAN bus system, with a focus on authentication gaps and risks
- Examining the broader challenges around SDV and OTA security, privacy, and operational safety
- Presenting a conceptual use case for a vehicle-based cybersecurity device enabling secure data flow
12:25 - 12:30
Q&A SESSION ON NANO CYBERSECURITY USE CASES FOR VEHICLE COMMUNICATION
12:30 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
BUILDING AUTONOMOUS VULNERABILITY INTELLIGENCE FOR AUTOMOTIVE CYBERSECURITY


Pavan Vemuri
SDVerse
- Exploring why manual CVE impact analysis across complex automotive supply chains is no longer sustainable
- Learning how vector search enables semantic matching between vulnerabilities and diverse software inventories
- Seeing how agentic AI automates detection prioritization and remediation planning for safety-critical systems
13:55 - 14:00
Q&A SESSION ON AUTONOMOUS VULNERABILITY INTELLIGENCE IN AUTOMOTIVE SYSTEMS
14:00 - 14:25
TISAX AT SCALE - CUTTING CERTIFICATION TIME BY 50 % WITHOUT ADDED RISK


Alexander Fuerst
Isegrim-X
- Exploring why slow TISAX certification creates supply chain delays and risk across OEM projects
- Outlining practical frameworks that cut certification effort and timelines by more than half
- Showing how OEMs and Tier 1s scale TISAX readiness using tools AI and repeatable playbooks
14:25 - 14:30
Q&A SESSION ON SCALING TISAX CERTIFICATION WITHOUT RISK
14:30 - 14:55
DRIVING CYBER RESILIENCE THROUGH AUTO-ISAC COLLABORATION


Heather Wagner
Auto-ISAC
- Tracing the evolution of Auto-ISAC and its role in automotive cybersecurity collaboration
- Establishing trusted information sharing models across OEMs, suppliers, and partners
- Evaluating Auto-ISAC’s global impact and its role in future cyber resilience strategies
14:55 - 15:00
Q&A SESSION ON ADVANCING INDUSTRY COLLABORATION IN CYBERSECURITY
15:00 - 15:25
ATTACK SURFACE STRATEGY AND ASYMMETRIC RISK IN SDVS


Josh Santiago
Santiago & Company
- Examining how OTA pipelines, APIs, cloud integration, and diagnostics compound lifecycle attack surface risk
- Explaining why compliance-focused cybersecurity programs remain fragile under real adversarial pressure
- Providing a system-level framework to reason about attack surface concentration and long-term cost exposure
15:25 - 15:30
Q&A SESSION ON ARCHITECTURAL DECISIONS AND VEHICLE CYBER RISK
15:30 - 15:45
FEEDBACK AND RAFFLE DRAW
15:45 - 16:00
CLOSING REMARKS
Become a Speaker & Join the Conversation
SUBSCRIBE FOR UPDATES
By submitting, you agree to receive email communications from the event organizers, including upcoming promotions and discounted tickets, news, and access to related events.
