CONFERENCE AGENDA
● -Interpretation of the latest policies, regulations and standards of automotive cybersecurity.
- How should OEMs deal with cybersecurity and privacy risks?
For example, how to strengthen the construction of corporate cybersecurity, drivers and obstacles, etc.
- Automotive cybersecurity case study
such as: DDoS offensive and defensive thinking in Tesla's case, threat examples of future mobility etc.
● -Offensive and defensive practices for automotive cybersecurity.
- How to comprehensively deploy the vehicle cybersecurity protection?
For example: threat analysis and risk assessment, closed loop of vehicle networking security in the full life cycle, testing, operating system, etc.
- How to comprehensively deploy the protection of cybersecurity in vehicles?
For example: E/E architecture reform, CAN bus cybersecurity analysis, Ethernet, data security and privacy protection, digital car keys, OTA, firewall, etc.
- How to deploy comprehensive cloud cybersecurity protection?
For example: data access and traceability of usage behavior, database operation and maintenance control, etc.