SlideShare a Scribd company logo
Nectar Jinil R Strictly Confidential
Internal
Decoding Automotive Cyber Threats :
Challenges and Outlook
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
One TCI, Center of Excellence: Cybersecurity © Continental AG 2
What is Cybersecurity ??
7/22/2024
What is Cybersecurity in the Automotive sector ??
Confidentiality Integrity Availability
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
One TCI, Center of Excellence: Cybersecurity © Continental AG 3
7/22/2024
https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/
• Hacked a Jeep
Cherokee on Highway
(the driver was
already made aware),
and the hackers were
in some remote
location
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
2023 Vehicle Cyber Threats
One TCI, Center of Excellence: Cybersecurity © Continental AG 4
1468
Automotive security
Incidents Reported
science 2010
295 Security Incidents
Reported in 2023
43%
15%
13%
9% 9%
7%
4%
Telematics and
Cloud
Infotainment API ECU's Others Remote Keyless EV Charging
2023 Attacks
95% Remote Attacks
5.40%
44.10%
35.90%
14.60%
Massive
(Millions)
High
(Thousands)
Medium
(up to 1000)
Low
(up to 10)
Mobility Assests Impacted
2.5x increase
from 2022
64 % 156 % 50 %
Source: Upstream : 2024 Global Automotive Cybersecurity Report
7/22/2024
Increase in
Deep and dark
web activities
Black hat attacks
targeted multiple
automotive and Smart
Mobility assets
Black Hat
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Security Attacks
One TCI, Center of Excellence: Cybersecurity © Continental AG 5
7/22/2024
Hackers Injecting Code Into Headlight Wiring to Steal Cars
(cybersecuritynews.com)
Hackers Use the Headlamps to access
the Vehicle CAN network and steal
Toyota vehicle
Hackers Use the antenna amplifier to
unlock a Rolls Royce
https://www.news18.com/viral/caught-on-camera-thieves-steal-
rolls-royce-in-mere-seconds-8688300.html
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Security Outlook
One TCI, Center of Excellence: Cybersecurity © Continental AG 6
Source: Upstream : 2024 Global Automotive Cybersecurity Report
Digital Transformation in Vehicle, introduces large scale attacks
Regulations varying according to Country could
lead to regulatory fatigue
EV Adaptations introduces new set of cyber risks
Emergence of Generative AI, over time introduces new methods and
tools to be introduces to our development eco system
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Security Overview : India
One TCI, Center of Excellence: Cybersecurity © Continental AG 7
Source: DSCI(NASCSCOM) India Cybersecurity Domestic Market 2023
India Cybersecurity market accounted for ~3% of
Overall global cybersecurity market
Domestic cybersecurity services market grew from
USD 1.98 billion in 2019 to USD 6.06 billion in
2023
Product cybersecurity market grew from 1.03
billion to 3.76 billion.
~97% of organization have invested in AI/ML.
~84 have invested in Cloud
~81% of Organization invested in Zero Trust
Key Factor:
✓ Digital
Transformation
✓ Regulatory
Compliances
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Security Overview : India Automotive Sector
One TCI, Center of Excellence: Cybersecurity © Continental AG 8
✓ Indian OEM’s are fast adapting to the Cybersecurity
requirements
• Key driving factor : Regulation and standards in markets
other than India
✓ Indian Automotive Cybersecurity domain is evolving.
✓ Most of the Indian OEM’s are adapting to the Cybersecurity
infrastructure
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
IT Cybersecurity → Product Cybersecurity
One TCI, Center of Excellence: Cybersecurity © Continental AG 9
7/22/2024
IT Cybersecurity Product Cybersecurity
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
✓ Hardware Security Module
✓ Hardware Trust Anchor
✓ Secure Storage of crypto artifacts
Decoding Automotive Cyber Threats
Product Cybersecurity
One TCI, Center of Excellence: Cybersecurity © Continental AG 10
✓ In Vehicle Network security
✓ Secured On board communication
✓ Vehicle to External Interface
✓ Firewall, Intrusion Detection. Etc.
ISO 21434
Regulations and Standard
7/22/2024
✓ Tooling and Testing Infrastructure
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Organization Adaptation to Cybersecurity
One TCI, Center of Excellence: Cybersecurity © Continental AG 11
Acknowledgement of Product Cybersecurity
Risks
Product Cybersecurity Management
Cybersecurity by Design
Cybersecurity Culture
Information Sharing and Cooperation
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
One TCI, Center of Excellence: Cybersecurity © Continental AG 12
Automotive Cybersecurity Outlook
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Cybersecurity for SDV
One TCI, Center of Excellence: Cybersecurity © Continental AG 13
✓ Most of the OEM’s are moving towards making
Software as a product and reducing the
interdependency with hardware.
✓ New functions can be added to the vehicle by
gathering information from different sensors and
providing new features.
✓ New features are added as services which can be
updated via OTA
Risks:
✓ Data Integrity
✓ Vulnerabilities in software
features added
✓ 3rd party software
Mitigation:
✓ Security use case for SDV’s
✓ Efficient Vulnerability management
✓ Effective tooling and testing
(SecDevops)
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Cybersecurity for Gen AI
One TCI, Center of Excellence: Cybersecurity © Continental AG 14
✓ Generative AI (Gen AI), can be used to process large
data to derive pattern.
✓ Hackers can use Gen AI to generate a pattern from the
Vehicle data logs and can attack the system.
✓ It can help hackers to identify the week spot in the
system in faster time duration.
Risks:
✓ Easy attack of vehicle
Mitigation:
✓ Gen AI can be used in the
development process for risk
identification
✓ System design with Gen AI
✓ Efficient development & tooling
(Sec DevOps)
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
Post Quantum Cryptography
One TCI, Center of Excellence: Cybersecurity © Continental AG 15
✓ Quantum computers can be a challenge to the
existing crypto algorithms.
✓ With advanced computational power they can break
existing ciphers
✓ Newer counter algorithms for the
same (under development)
✓ Computational power inside
vehicle
✓ This is more futuristics and no
timeline defined.
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
One TCI, Center of Excellence: Cybersecurity © Continental AG 16
Q&A
7/22/2024
Nectar Jinil R Strictly Confidential
Internal
Strictly Confidential
Decoding Automotive Cyber Threats
One TCI, Center of Excellence: Cybersecurity © Continental AG 17
Thank You
7/22/2024

More Related Content

Similar to ANIn Bengaluru July 2024 | Decoding Automotive Cyber Threats : Challenges and Outlook by Nectar Jinil R

The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020
Mirror Review
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
Alan Tatourian
 
LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME
LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOMELES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME
LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME
TelecomValley
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
GoSecure
GoSecureGoSecure
GoSecure
Nitesh Kulkarni
 
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj SayalANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
AgileNetwork
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
Greg Harms
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
AMETIC
 
EB corbos and the L4Re microhypervisor: Open-source automotive safety
EB corbos and the L4Re microhypervisor: Open-source automotive safetyEB corbos and the L4Re microhypervisor: Open-source automotive safety
EB corbos and the L4Re microhypervisor: Open-source automotive safety
Alexander Much
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
Agile Testing Alliance
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
Bijal (Bee) Hayes-Thakore
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
Block Armour
 
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalCrisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Kalin Hitrov
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
Rafael Maranon
 
Video Analytics Market.pdf
Video Analytics Market.pdfVideo Analytics Market.pdf
Video Analytics Market.pdf
SunilShah9161
 
5G and Connected Car Oppurtunities.pdf
5G and Connected Car Oppurtunities.pdf5G and Connected Car Oppurtunities.pdf
5G and Connected Car Oppurtunities.pdf
DSP/CSP Company
 

Similar to ANIn Bengaluru July 2024 | Decoding Automotive Cyber Threats : Challenges and Outlook by Nectar Jinil R (20)

The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020The 10 most advanced automotive tech companies of 2020
The 10 most advanced automotive tech companies of 2020
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME
LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOMELES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME
LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
GoSecure
GoSecureGoSecure
GoSecure
 
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj SayalANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 
EB corbos and the L4Re microhypervisor: Open-source automotive safety
EB corbos and the L4Re microhypervisor: Open-source automotive safetyEB corbos and the L4Re microhypervisor: Open-source automotive safety
EB corbos and the L4Re microhypervisor: Open-source automotive safety
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalCrisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Video Analytics Market.pdf
Video Analytics Market.pdfVideo Analytics Market.pdf
Video Analytics Market.pdf
 
5G and Connected Car Oppurtunities.pdf
5G and Connected Car Oppurtunities.pdf5G and Connected Car Oppurtunities.pdf
5G and Connected Car Oppurtunities.pdf
 

More from AgileNetwork

ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...
ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...
ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...
AgileNetwork
 
ANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti Saini
ANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti SainiANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti Saini
ANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti Saini
AgileNetwork
 
ANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal Jariiwala
ANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal JariiwalaANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal Jariiwala
ANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal Jariiwala
AgileNetwork
 
ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...
ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...
ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...
AgileNetwork
 
ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...
ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...
ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...
AgileNetwork
 
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
AgileNetwork
 
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish AgrawalANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
AgileNetwork
 
ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...
ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...
ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...
AgileNetwork
 
ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...
ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...
ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...
AgileNetwork
 
ANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod Pai
ANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod PaiANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod Pai
ANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod Pai
AgileNetwork
 
ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...
ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...
ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...
AgileNetwork
 
ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...
ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...
ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...
AgileNetwork
 
ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...
ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...
ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...
AgileNetwork
 
ANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank Aadimulam
ANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank AadimulamANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank Aadimulam
ANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank Aadimulam
AgileNetwork
 
ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...
ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...
ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...
AgileNetwork
 
ANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin Mukhedkar
ANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin MukhedkarANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin Mukhedkar
ANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin Mukhedkar
AgileNetwork
 
ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...
ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...
ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...
AgileNetwork
 
ANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan Mayer
ANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan MayerANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan Mayer
ANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan Mayer
AgileNetwork
 
ANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh Rohit
ANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh RohitANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh Rohit
ANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh Rohit
AgileNetwork
 
ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...
ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...
ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...
AgileNetwork
 

More from AgileNetwork (20)

ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...
ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...
ANIn Mumbai July 2024 | Design Thinking through lens of Scrum Master by Meenu...
 
ANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti Saini
ANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti SainiANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti Saini
ANIn Mumbai July 2024 | Elevate value delivery through UX design by Priti Saini
 
ANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal Jariiwala
ANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal JariiwalaANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal Jariiwala
ANIn Ahmedabad July 2024 | Unlearn & Learn from the Unknown by Vishal Jariiwala
 
ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...
ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...
ANIn Noida Sep 2022 | How to drive right Business Value in Transformation Jou...
 
ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...
ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...
ANIn Ahmedabad July 2024 | Building Lasting Customer Relationships through Ef...
 
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
 
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish AgrawalANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
ANIn Pune July 2024 | Mastering the Data Paradox by Ashish Agrawal
 
ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...
ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...
ANIn Gurugram July 2024 | Elevating Product excellence with Design Sprints by...
 
ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...
ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...
ANIn Gurugram July 2024 | Leveraging Product Failures into Successes by Panka...
 
ANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod Pai
ANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod PaiANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod Pai
ANIn Kochi July 2024 | Agility in E-commerce Implementation by Vinod Pai
 
ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...
ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...
ANIn Kochi July 2024 | Overcoming Anti-Patterns and Pitfalls of Metrics by Ha...
 
ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...
ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...
ANIn Chennai July 2024 | Fusing AI with Agility: Strategies for the Modern Or...
 
ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...
ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...
ANIn Chennai July 2024 | Encouraging Creativity: Fostering Organizational Gro...
 
ANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank Aadimulam
ANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank AadimulamANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank Aadimulam
ANIn Chennai Feb 2023 | CI/CD with AWS CDK by Shashank Aadimulam
 
ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...
ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...
ANIn Ahmedabad April 2023 | Perspectives on Technical Agility from Agile Tran...
 
ANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin Mukhedkar
ANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin MukhedkarANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin Mukhedkar
ANIn Navi Mumbai Jan 2023 | Agile- 360 degree perspective by Pravin Mukhedkar
 
ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...
ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...
ANIn Faridabad June 2024 | Navigating DevOps Challenges, Solutions, and Outco...
 
ANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan Mayer
ANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan MayerANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan Mayer
ANIn Faridabad June 2024 | Modern Infrastructure Management by Kulbhushan Mayer
 
ANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh Rohit
ANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh RohitANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh Rohit
ANIn Chennai June 2024 | Product Planning and Growth Strategy by Anirudh Rohit
 
ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...
ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...
ANIn Chennai June 2024 | Right Business strategy is foundational for Successf...
 

Recently uploaded

How Sales Coaching Drives Performance Improvement at Groval Euler’s
How Sales Coaching Drives Performance Improvement at Groval Euler’sHow Sales Coaching Drives Performance Improvement at Groval Euler’s
How Sales Coaching Drives Performance Improvement at Groval Euler’s
Groval Euler's Consulting
 
COMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdf
COMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdfCOMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdf
COMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdf
deepaabrahammathew
 
Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...
Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...
Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...
janusa9823#S0007
 
Criminal Justice Careers and the things that make people happy
Criminal Justice Careers and the things that make people happyCriminal Justice Careers and the things that make people happy
Criminal Justice Careers and the things that make people happy
muunganiakimathi09
 
Cal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty Girl
Cal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty GirlCal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty Girl
Cal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty Girl
nagunakhan
 
The 5 Mindsets and skills of Today's Top Leaders
The 5 Mindsets and skills of Today's Top LeadersThe 5 Mindsets and skills of Today's Top Leaders
The 5 Mindsets and skills of Today's Top Leaders
Kabir Learning Foundation
 
Lecture 3 - Chp 5.pptx abu dhabi university
Lecture 3 - Chp 5.pptx abu dhabi universityLecture 3 - Chp 5.pptx abu dhabi university
Lecture 3 - Chp 5.pptx abu dhabi university
AhmedRaeisi3
 
Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...
Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...
Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...
Peter Eckerline
 
Day 0 - Bootcamp Roadmap vApril24 v2.pdf
Day 0 - Bootcamp Roadmap vApril24 v2.pdfDay 0 - Bootcamp Roadmap vApril24 v2.pdf
Day 0 - Bootcamp Roadmap vApril24 v2.pdf
Joyce Wong
 
Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...
Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...
Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...
ICFAI University
 

Recently uploaded (10)

How Sales Coaching Drives Performance Improvement at Groval Euler’s
How Sales Coaching Drives Performance Improvement at Groval Euler’sHow Sales Coaching Drives Performance Improvement at Groval Euler’s
How Sales Coaching Drives Performance Improvement at Groval Euler’s
 
COMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdf
COMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdfCOMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdf
COMPILATION_OF_ACADEMIC_WRITING_ASSIGNMENTS(2).pdf
 
Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...
Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...
Cal Girls Hotel Siddharth Residency Satvik Siddharth Jaipur | 8445551418 | Sw...
 
Criminal Justice Careers and the things that make people happy
Criminal Justice Careers and the things that make people happyCriminal Justice Careers and the things that make people happy
Criminal Justice Careers and the things that make people happy
 
Cal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty Girl
Cal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty GirlCal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty Girl
Cal Girls Ajmer Road Jaipur | 8445551418 | Top Class High Profile Beauty Girl
 
The 5 Mindsets and skills of Today's Top Leaders
The 5 Mindsets and skills of Today's Top LeadersThe 5 Mindsets and skills of Today's Top Leaders
The 5 Mindsets and skills of Today's Top Leaders
 
Lecture 3 - Chp 5.pptx abu dhabi university
Lecture 3 - Chp 5.pptx abu dhabi universityLecture 3 - Chp 5.pptx abu dhabi university
Lecture 3 - Chp 5.pptx abu dhabi university
 
Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...
Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...
Revolutionizing Giving_ The Emergence of Impact-Driven Philanthropy by Peter ...
 
Day 0 - Bootcamp Roadmap vApril24 v2.pdf
Day 0 - Bootcamp Roadmap vApril24 v2.pdfDay 0 - Bootcamp Roadmap vApril24 v2.pdf
Day 0 - Bootcamp Roadmap vApril24 v2.pdf
 
Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...
Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...
Business Strategy: Strategic Planning, Logical Incrementalism, Strategic Lead...
 

ANIn Bengaluru July 2024 | Decoding Automotive Cyber Threats : Challenges and Outlook by Nectar Jinil R

  • 1. Nectar Jinil R Strictly Confidential Internal Decoding Automotive Cyber Threats : Challenges and Outlook
  • 2. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats One TCI, Center of Excellence: Cybersecurity © Continental AG 2 What is Cybersecurity ?? 7/22/2024 What is Cybersecurity in the Automotive sector ?? Confidentiality Integrity Availability
  • 3. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats One TCI, Center of Excellence: Cybersecurity © Continental AG 3 7/22/2024 https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/ • Hacked a Jeep Cherokee on Highway (the driver was already made aware), and the hackers were in some remote location
  • 4. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats 2023 Vehicle Cyber Threats One TCI, Center of Excellence: Cybersecurity © Continental AG 4 1468 Automotive security Incidents Reported science 2010 295 Security Incidents Reported in 2023 43% 15% 13% 9% 9% 7% 4% Telematics and Cloud Infotainment API ECU's Others Remote Keyless EV Charging 2023 Attacks 95% Remote Attacks 5.40% 44.10% 35.90% 14.60% Massive (Millions) High (Thousands) Medium (up to 1000) Low (up to 10) Mobility Assests Impacted 2.5x increase from 2022 64 % 156 % 50 % Source: Upstream : 2024 Global Automotive Cybersecurity Report 7/22/2024 Increase in Deep and dark web activities Black hat attacks targeted multiple automotive and Smart Mobility assets Black Hat
  • 5. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Security Attacks One TCI, Center of Excellence: Cybersecurity © Continental AG 5 7/22/2024 Hackers Injecting Code Into Headlight Wiring to Steal Cars (cybersecuritynews.com) Hackers Use the Headlamps to access the Vehicle CAN network and steal Toyota vehicle Hackers Use the antenna amplifier to unlock a Rolls Royce https://www.news18.com/viral/caught-on-camera-thieves-steal- rolls-royce-in-mere-seconds-8688300.html
  • 6. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Security Outlook One TCI, Center of Excellence: Cybersecurity © Continental AG 6 Source: Upstream : 2024 Global Automotive Cybersecurity Report Digital Transformation in Vehicle, introduces large scale attacks Regulations varying according to Country could lead to regulatory fatigue EV Adaptations introduces new set of cyber risks Emergence of Generative AI, over time introduces new methods and tools to be introduces to our development eco system 7/22/2024
  • 7. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Security Overview : India One TCI, Center of Excellence: Cybersecurity © Continental AG 7 Source: DSCI(NASCSCOM) India Cybersecurity Domestic Market 2023 India Cybersecurity market accounted for ~3% of Overall global cybersecurity market Domestic cybersecurity services market grew from USD 1.98 billion in 2019 to USD 6.06 billion in 2023 Product cybersecurity market grew from 1.03 billion to 3.76 billion. ~97% of organization have invested in AI/ML. ~84 have invested in Cloud ~81% of Organization invested in Zero Trust Key Factor: ✓ Digital Transformation ✓ Regulatory Compliances 7/22/2024
  • 8. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Security Overview : India Automotive Sector One TCI, Center of Excellence: Cybersecurity © Continental AG 8 ✓ Indian OEM’s are fast adapting to the Cybersecurity requirements • Key driving factor : Regulation and standards in markets other than India ✓ Indian Automotive Cybersecurity domain is evolving. ✓ Most of the Indian OEM’s are adapting to the Cybersecurity infrastructure 7/22/2024
  • 9. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats IT Cybersecurity → Product Cybersecurity One TCI, Center of Excellence: Cybersecurity © Continental AG 9 7/22/2024 IT Cybersecurity Product Cybersecurity
  • 10. Nectar Jinil R Strictly Confidential Internal Strictly Confidential ✓ Hardware Security Module ✓ Hardware Trust Anchor ✓ Secure Storage of crypto artifacts Decoding Automotive Cyber Threats Product Cybersecurity One TCI, Center of Excellence: Cybersecurity © Continental AG 10 ✓ In Vehicle Network security ✓ Secured On board communication ✓ Vehicle to External Interface ✓ Firewall, Intrusion Detection. Etc. ISO 21434 Regulations and Standard 7/22/2024 ✓ Tooling and Testing Infrastructure
  • 11. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Organization Adaptation to Cybersecurity One TCI, Center of Excellence: Cybersecurity © Continental AG 11 Acknowledgement of Product Cybersecurity Risks Product Cybersecurity Management Cybersecurity by Design Cybersecurity Culture Information Sharing and Cooperation 7/22/2024
  • 12. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats One TCI, Center of Excellence: Cybersecurity © Continental AG 12 Automotive Cybersecurity Outlook 7/22/2024
  • 13. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Cybersecurity for SDV One TCI, Center of Excellence: Cybersecurity © Continental AG 13 ✓ Most of the OEM’s are moving towards making Software as a product and reducing the interdependency with hardware. ✓ New functions can be added to the vehicle by gathering information from different sensors and providing new features. ✓ New features are added as services which can be updated via OTA Risks: ✓ Data Integrity ✓ Vulnerabilities in software features added ✓ 3rd party software Mitigation: ✓ Security use case for SDV’s ✓ Efficient Vulnerability management ✓ Effective tooling and testing (SecDevops) 7/22/2024
  • 14. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Cybersecurity for Gen AI One TCI, Center of Excellence: Cybersecurity © Continental AG 14 ✓ Generative AI (Gen AI), can be used to process large data to derive pattern. ✓ Hackers can use Gen AI to generate a pattern from the Vehicle data logs and can attack the system. ✓ It can help hackers to identify the week spot in the system in faster time duration. Risks: ✓ Easy attack of vehicle Mitigation: ✓ Gen AI can be used in the development process for risk identification ✓ System design with Gen AI ✓ Efficient development & tooling (Sec DevOps) 7/22/2024
  • 15. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats Post Quantum Cryptography One TCI, Center of Excellence: Cybersecurity © Continental AG 15 ✓ Quantum computers can be a challenge to the existing crypto algorithms. ✓ With advanced computational power they can break existing ciphers ✓ Newer counter algorithms for the same (under development) ✓ Computational power inside vehicle ✓ This is more futuristics and no timeline defined. 7/22/2024
  • 16. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats One TCI, Center of Excellence: Cybersecurity © Continental AG 16 Q&A 7/22/2024
  • 17. Nectar Jinil R Strictly Confidential Internal Strictly Confidential Decoding Automotive Cyber Threats One TCI, Center of Excellence: Cybersecurity © Continental AG 17 Thank You 7/22/2024