Highlights of the Program

2 days business program:

Learn from real-world case studies by industry leaders.

SHOWCASING INNOVATION:

Discover the latest technology and techniques from across the industry.

leaders talk:

Hear from top-level experts about how to stay ahead in a fast-changing industry.

MULTIPLE STREAMS:

A business program that is multi-disciplinary, giving you a broad view of the industry.

SMART TECHNOLOGIES:

Explore the latest smart and AI-driven solutions, and see how they can be used in your business.

roundtable discussion:

Join talks with industry peers. Share ideas, make connections, and find new partners.

Program

Day 1 :
WEDNESDAY, JULY 29, 2026
08:00 - 09:00
REGISTRATION AND MORNING REFRESHMENTS
09:00 - 09:10
OPENING ADDRESS
09:10 - 09:35
STRENGTHENING AUTOMOTIVE CYBERSECURITY IN THE DIGITAL ERA
Venkata Krishna Cheemalakonda
ZF Group

Venkata Krishna Cheemalakonda

ZF Group

  • Embedding cybersecurity into software-defined vehicles and secure OTA update architectures
  • Leveraging real-time monitoring and AI-driven detection to protect connected fleets
  • Navigating global standards and regulations shaping modern automotive cybersecurity programs
09:35 - 09:40
Q&A SESSION ON ADVANCING CYBER RESILIENCE IN DIGITAL VEHICLES
09:40 - 10:05
BIOMETRICS AND GEOLOCATION RISKS IN CONNECTED VEHICLES
Steven Wernikoff
Honigman LLP

Steven Wernikoff

Honigman LLP

  • Analyzing emerging federal and state privacy laws governing connected vehicle data
  • Assessing legal and cybersecurity risks tied to biometrics, geolocation, and sensitive telemetry
  • Applying privacy-by-design principles and V2I security practices to reduce enforcement exposure
10:05 - 10:10
Q&A SESSION ON MANAGING PRIVACY ENFORCEMENT IN CONNECTED MOBILITY
10:10 - 10:35
PRIVACY, SECURITY, AND STANDARDS IN CONNECTED VEHICLES
Shormin Chowdhury
Ford Motor Company

Shormin Chowdhury

Ford Motor Company

  • Examining the evolving landscape of connected and automated vehicle technologies
  • Applying privacy-by-design principles including data minimization and user consent
  • Implementing secure SDLC practices aligned with ISO/SAE 21434 and UNECE R155
10:35 - 10:40
Q&A SESSION ON BALANCING PRIVACY AND SECURITY IN CONNECTED CARS
10:40 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:30
PANEL DISCUSSION ON SECURING THE SOFTWARE-DEFINED VEHICLES - CHALLENGES AND SOLUTIONS
Speaker ImageSpeaker Image
  • What are the dynamics of cyber threat uncertainties in integrated positioning and navigation systems for autonomous vehicles?·
  • What are the most critical cybersecurity vulnerabilities unique to SDVs?
  • Given the complexity of AI-based threat analysis in modern vehicles, are standards like ISO/SAE 21434 evolving fast enough?
  • How are the principles of zero trust applied in the design and operation of SDVs?
  • What strategies can be implemented to ensure that cyberattacks remain contained within a single vehicle or subsystem?

| The University of Alabama

| VicOne

| Matrickz Inc.

| Aeris

| International Motors LLC

11:30 - 11:55
WHEN SAFETY MEETS CYBERSECURITY IN SDVS
Mona Elfiky
STH - Safety Tech Hub

Mona Elfiky

STH - Safety Tech Hub

  • Exploring the convergence of functional safety and cybersecurity in autonomous vehicle systems
  • Analyzing how cyber vulnerabilities can create real-world risks in safety-critical systems
  • Integrating safety engineering with secure SDLC practices early in vehicle development
11:55 - 12:00
Q&A SESSION ON ALIGNING SAFETY AND CYBERSECURITY IN AUTONOMOUS VEHICLES
12:00 - 12:25
AN AUTO ARCHITECTURAL APPROACH FOR SECURE CONNECTIVITY
Wladimir Araujo
Aeris

Wladimir Araujo

Aeris

  • Learning how a network-anchored architecture strengthens in-vehicle connectivity security
  • Exploring how this model compares technically and economically to agent and firewall-based setups
  • Understanding how this approach reduces complexity and lowers operational costs effectively
12:25 - 12:30
Q&A SESSION ON AUTO ARCHITECTURE FOR SECURE CONNECTIVITY
12:30 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
DESIGNING CRYPTO-AGILE ARCHITECTURES FOR 15-YEAR LIFECYCLES
Manikanta Danda
BWI GROUP

Manikanta Danda

BWI GROUP

  • Addressing the “harvest now, decrypt later” threat across the 15-year vehicle lifecycle
  • Defining crypto-agility as OTA-enabled migration from RSA and ECC to Kyber and Dilithium
  • Integrating post-quantum cryptography into constrained ECUs while preserving ISO 21434 compliance
13:55 - 14:00
Q&A SESSION ON PREPARING VEHICLES FOR POST-QUANTUM SECURITY
14:00 - 14:25
CYBERSECURITY DOESN’T STOP AT SOP - EXTENDING ISO/SAE 21434
Vincent Besselat
CS GROUP - Canada

Vincent Besselat

CS GROUP - Canada

  • Exploring how ISO/SAE 21434 cybersecurity requirements extend into vehicle production
  • Aligning engineering cybersecurity frameworks with TISAX and enterprise security practices
  • Highlighting best practices for integrating cybersecurity across engineering and manufacturing
14:25 - 14:30
Q&A SESSION ON INTEGRATING CYBERSECURITY INTO VEHICLE MANUFACTURING
14:30 - 14:55
AI-ENABLED ACCELERATED CYBERSECURITY ENGINEERING IN AUTOMOTIVE
Hasan Akram
Matrickz

Hasan Akram

Matrickz

  • Examining how AI is transforming the landscape of engineering in the automotive industry
  • Accelerating cybersecurity engineering processes with advanced AI technologies
  • Showcasing case studies of accelerated development cycles and potential risks
14:55 - 15:00
Q&A SESSION ON AI CYBERSECURITY ENGINEERING
15:00 - 15:30
AFTERNOON COFFEE BREAK IN THE EXHIBIT AREA
15:30 - 15:55
HOW TO MEET GLOBAL SECURITY STANDARDS WHILE REDUCING COST
Andre Weimerskirch
Block Harbor Cybersecurity

Andre Weimerskirch

Block Harbor Cybersecurity

  • Understanding how evolving global cybersecurity regulations are reshaping the automotive industry
  • Exploring cost-effective strategies for compliance, including AI-driven automation and smart toolchains
  • Learning how to implement scalable cybersecurity management systems across a vehicle's lifecycle
15:55 - 16:00
Q&A SESSION ON MEETING GLOBAL SECURITY STANDARDS AT A LOWER COST
16:00 - 16:25
SECURING AUTOMOTIVE SYSTEMS AGAINST 'HARVEST NOW, DECRYPT LATER' ATTACKS
Abdulrahman Yacoob
Valeo

Abdulrahman Yacoob

Valeo

  • Exploring how harvest now, decrypt later (HNDL) attacks pose long-term risks to connected vehicles
  • Understanding how threat modeling is evolving to assess quantum-resilient cybersecurity measures
  • Learning why early post-quantum cryptography (PQC) adoption is crucial for automotive system security
16:25 - 16:30
Q&A SESSION ON SECURING AUTOMOTIVE SYSTEMS AGAINST HNDL ATTACKS
16:30 - 16:55
CYBERSECURITY RISKS IN RESIDENTIAL EV CHARGING ECOSYSTEMS
Manoj Karwa
Ampure

Manoj Karwa

Ampure

  • Examining home network intrusion risks introduced by connected EV chargers
  • Protecting sensitive data including VINs, credentials, and payment information
  • Mitigating malware injection and grid disruption risks from compromised chargers
16:55 - 17:00
Q&A SESSION ON SECURING RESIDENTIAL EV CHARGING NETWORKS
17:00 - 17:25
DYNAMIC CYBERSECURITY VALIDATION FOR SDVS IN MOTION
Sushanta Das
American Center for Mobility

Sushanta Das

American Center for Mobility

  • Transitioning from static testing to real-world validation under dynamic driving conditions
  • Enabling continuous validation across OTA updates, ADAS, and automated driving systems
  • Generating evidence-based assurance aligned with standards and operational risk reduction
17:25 - 17:30
Q&A SESSION ON VALIDATING CYBERSECURITY IN REAL-WORLD VEHICLE OPERATIONS
17:30 - 18:30
NETWORKING DRINKS RECEPTION
Day 2 :
THURSDAY, JULY 30, 2026
08:30 - 09:00
MORNING REFRESHMENTS
09:00 - 09:10
OPENING ADDRESS
09:10 - 09:35
INTEGRATING ISO 26262 AND ISO 21434 IN SDLC
Manikandan Menon
Lucid Motors

Manikandan Menon

Lucid Motors

  • Establishing an integrated SDLC aligning ISO 26262 functional safety with ISO 21434 cybersecurity
  • Implementing verification and validation processes to ensure robust automotive software
  • Managing controlled CI/CD pipelines and secure release governance for vehicle platforms
09:35 - 09:40
Q&A SESSION ON ALIGNING SAFETY AND CYBERSECURITY DEVELOPMENT
09:40 - 10:05
MEETING U.S. CONNECTED VEHICLE RULE ORIGIN REQUIREMENTS
Joe Saunders
RunSafe Security Inc.

Joe Saunders

RunSafe Security Inc.

  • Explaining the BIS connected vehicle rule introducing origin requirements and annual Declarations of Conformity
  • Identifying gaps where traditional software composition analysis fails to prove proprietary component provenance
  • Demonstrating how SBOMs and build-time analysis enable compliance while strengthening overall vehicle cybersecurity
10:05 - 10:10
Q&A SESSION ON PROVING SOFTWARE ORIGIN AND VEHICLE COMPLIANCE
10:10 - 10:35
THE CRUCIAL ROLE OF RISK-BASED VULNERABILITY MANAGEMENT
Amadou Kane
VicOne

Amadou Kane

VicOne

  • Learning how focusing on high-risk vulnerabilities helps reduce incidents and cut remediation costs
  • Exploring strategic approaches like risk scoring and threat intelligence for smarter prioritization
  • Understanding how continuous monitoring keeps risk management effective and up-to-date
10:35 - 10:40
Q&A SESSION ON RISK-BASED VULNERABILITY MANAGEMENT STRATEGIES
10:40 - 11:00
MORNING COFFEE BREAK IN THE EXHIBIT AREA
11:00 - 11:25
AUTOMOTIVE CYBERSECURITY IN V2X ECOSYSTEMS
Srikanth Bendi
ZF Group

Srikanth Bendi

ZF Group

  • Exploring V2X growth, technology landscape, and benefits for connected vehicle users
  • Examining regulations including ISO 21434, privacy laws, and emerging government rules
  • Addressing attack vectors and security needs across IoT, 5G, OTA, and trusted systems
11:25 - 11:30
Q&A SESSION ON SECURING THE EVOLVING V2X ECOSYSTEM
11:30 - 11:55
CYBER-RESILIENT GNSS-BASED AUTONOMOUS VEHICLE NAVIGATION
Mizanur Rahman
The University of Alabama

Mizanur Rahman

The University of Alabama

  • Examining the increasing range and complexity of cyber threats targeting GNSS navigation systems
  • Discussing innovative models that help detect and analyze GNSS spoofing attempts in real time
  • Exploring practical mitigation approaches to maintain navigation reliability under cyber compromise
11:55 - 12:00
Q&A SESSION ON GNSS-BASED VEHICLE NAVIGATION SECURITY STRATEGIES
12:00 - 12:25
NANO CYBERSECURITY FOR LAW ENFORCEMENT, FIRST RESPONDERS, FLEET, AND TRUCKING
Micki Boland
Check Point Software

Micki Boland

Check Point Software

  • Exploring key vulnerabilities of the CAN bus system, with a focus on authentication gaps and risks
  • Examining the broader challenges around SDV and OTA security, privacy, and operational safety
  • Presenting a conceptual use case for a vehicle-based cybersecurity device enabling secure data flow
12:25 - 12:30
Q&A SESSION ON NANO CYBERSECURITY USE CASES FOR VEHICLE COMMUNICATION
12:30 - 13:30
NETWORKING LUNCH AND VISITING THE AUTOMOTIVE CYBERSECURITY EXHIBITION
13:30 - 13:55
BUILDING AUTONOMOUS VULNERABILITY INTELLIGENCE FOR AUTOMOTIVE CYBERSECURITY
Pavan Vemuri
SDVerse

Pavan Vemuri

SDVerse

  • Exploring why manual CVE impact analysis across complex automotive supply chains is no longer sustainable
  • Learning how vector search enables semantic matching between vulnerabilities and diverse software inventories
  • Seeing how agentic AI automates detection prioritization and remediation planning for safety-critical systems
13:55 - 14:00
Q&A SESSION ON AUTONOMOUS VULNERABILITY INTELLIGENCE IN AUTOMOTIVE SYSTEMS
14:00 - 14:25
TISAX AT SCALE - CUTTING CERTIFICATION TIME BY 50 % WITHOUT ADDED RISK
Alexander Fuerst
Isegrim-X

Alexander Fuerst

Isegrim-X

  • Exploring why slow TISAX certification creates supply chain delays and risk across OEM projects
  • Outlining practical frameworks that cut certification effort and timelines by more than half
  • Showing how OEMs and Tier 1s scale TISAX readiness using tools AI and repeatable playbooks
14:25 - 14:30
Q&A SESSION ON SCALING TISAX CERTIFICATION WITHOUT RISK
14:30 - 14:55
DRIVING CYBER RESILIENCE THROUGH AUTO-ISAC COLLABORATION
Heather Wagner
Auto-ISAC

Heather Wagner

Auto-ISAC

  • Tracing the evolution of Auto-ISAC and its role in automotive cybersecurity collaboration
  • Establishing trusted information sharing models across OEMs, suppliers, and partners
  • Evaluating Auto-ISAC’s global impact and its role in future cyber resilience strategies
14:55 - 15:00
Q&A SESSION ON ADVANCING INDUSTRY COLLABORATION IN CYBERSECURITY
15:00 - 15:25
ATTACK SURFACE STRATEGY AND ASYMMETRIC RISK IN SDVS
Josh Santiago
Santiago & Company

Josh Santiago

Santiago & Company

  • Examining how OTA pipelines, APIs, cloud integration, and diagnostics compound lifecycle attack surface risk
  • Explaining why compliance-focused cybersecurity programs remain fragile under real adversarial pressure
  • Providing a system-level framework to reason about attack surface concentration and long-term cost exposure
15:25 - 15:30
Q&A SESSION ON ARCHITECTURAL DECISIONS AND VEHICLE CYBER RISK
15:30 - 15:45
FEEDBACK AND RAFFLE DRAW
15:45 - 16:00
CLOSING REMARKS

Become a Speaker & Join the Conversation

SUBSCRIBE FOR UPDATES

By submitting, you agree to receive email communications from the event organizers, including upcoming promotions and discounted tickets, news, and access to related events.