Refine Your Search

Topic

Author

Affiliation

Search Results

Training / Education

DO -326A and ED-202A An Introduction to the New and Mandatory Aviation Cyber-Security Essentials

2019-11-12
The international standards D-326A (U.S.) and ED-202A (Europe) titled "Airworthiness Security Process Specification" are the cornerstones of the "DO-326/ED-202 Set" and they are the only Acceptable Means of Compliance (AMC) by FAA & EASA for aviation cyber-security airworthiness certification, as of 2019. The "DO-326/ED-202 Set" also includes companion documents DO-356A/ED-203A: "Airworthiness Security Methods and Considerations" & DO-355/ED-204: "Information Security Guidance for Continuing Airworthiness" (U.S. & Europe) and ED-201: "Aeronautical Information System Security (AISS) Framework Guidance" & ED-205: "Process Standard for Security Certification / Declaration of Air Traffic Management / Air Navigation Services (ATM/ANS) Ground Systems“ (Europe only).
Training / Education

ISO 26262 Functional Safety – Road Vehicles Focus on Second Edition Changes

2019-11-05
In addition to presenting an overview of the standard, this course highlights the major changes introduced in the second edition, which extends the standard's scope to include all vehicles (excluding special vehicles), the objective-oriented confirmation measures approach, and references to Cybersecurity at the Concept and System Level development.
Event

Vehicle-level Cyber-security Considerations for the Increasingly Connected, Automated, and AI-informed Mobility Environment

2019-10-31
Rapid advances with respect to connectivity and automation within the mobility sector coupled with the expansion and adoption of machine learning techniques across an ever increasing range of disciplines has led to a significant expansion in the types, opportunities, scale, and degree of sophistication that should be considered for vehicle and mobility-system cyber-security evaluation. While technology-specific attack opportunities and vulnerabilities begin to emerge across the technology spectrum from basic automation features such as Adaptive Cruise Control and Lane-following to fully automated vehicles dispatched by a centralized controller, it is equally important consider the ease of implementation, possible system responses, and existing robustness to these emerging attacks when prioritizing the severity and risks associated with these new issues relative to existing cyber-security concerns. ...While technology-specific attack opportunities and vulnerabilities begin to emerge across the technology spectrum from basic automation features such as Adaptive Cruise Control and Lane-following to fully automated vehicles dispatched by a centralized controller, it is equally important consider the ease of implementation, possible system responses, and existing robustness to these emerging attacks when prioritizing the severity and risks associated with these new issues relative to existing cyber-security concerns. Additionally, machine-learning techniques, specifically deep-learning approaches, appear to offer opportunities not only to better exploit certain vulnerabilities, but also to defend against these attacks in a more robust fashion. ...This presentation seeks to discuss on-going multi-disciplinary research examining emerging cyber-security concepts, trends, and opportunities within the mobility space, with a specific focus on highlighted vehicle-level concepts and considerations.
Event

Cybersecurity

2019-10-31
Industry experts from the Auto ISAC, automotive OEMs, suppliers, infrastructure, and security firms share the latest cybersecurity measures, standards, and regulations being discussed, developed, and deployed to ensure safe and secure transportation.
Event

From start-up to a Tier-1, a journey in automotive cyber-security

2019-10-31
The challenges of cyber-security are new to the automotive domain, and are more and more necessary with the introduction of vehicle connectivity and advanced features. ...In this presentation we will explore the cyber-security challenges in modern mobility, possible solutions and the start-up gone Tier-1 perspective.
Event

Automated/Autonomous and Connected Vehicles

2019-10-29
.), Sensor Fusion, Sensor Data Collection, HD Mapping, Internet of Things, Artificial Intelligence, Machine Learning, Wireless Communication, Vehicle/Fleet Deployment Strategies, Cybersecurity, Validation, Certification, and Testing, V2V/V2I, Advanced Driver Assistance Systems, Active Safety, and Occupant Protection
Event

Advanced Manufacturing

2019-10-29
Topics in this session include: Industrial Internet of Things, Industry 4.0, Augmented and Virtual Reality, Blockchain, Factory Automation and Robotics, Additive Manufacturing, and Cybersecurity
Training / Education

Design Considerations for Secure Embedded Systems

2019-10-14
Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for many devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked. So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices?
Training / Education

Introduction to Cyber Security for Commercial Aviation

2019-09-26
Despite the advantages of electronic flight bags (EFB), passenger entertainment and email access during flights, and the ability to access aircraft repair manuals electronically, computer interconnectivity throughout aviation has opened the aviation sector to cyber-attacks that could impact flights, data, and safety. This two-day seminar is intended to introduce aviation professionals to the need to implement cyber security throughout commercial aviation including the supply chain.
Event

Why the Future of the Aviation Market Depends on Cybersecurity

2019-09-24
It's critical that the development of connected aircrafts and the implementation of new technologies and applications from the very beginning goes hand in hand with cybersecurity. It’s a great challenge for both sides — for the cybersecurity and the aviation industry. ...Only a “cybersecurity first”-approach can deliver such a guarantee. It's critical that the development of connected aircrafts and the implementation of new technologies and applications from the very beginning goes hand in hand with cybersecurity.
Event

Cybersecurity Panel - How Would You Prevent This Breach?

2019-09-11
While engaging invited speakers and members of the audience, a genericized commercial vehicle network architecture will be followed to perform an analysis and devise an attack tree. The goal will be to determine responses to the following: 1) Is there an advantage to a standardized analysis across commercial vehicles? 2) What kinds of common attack surfaces are found and do they lead to SAE standards work? 3) Does common language exist or is there a need to specify terms & definitions? 4) Can exercises, such as this session, be used to decide what SAE standards need to evolve or be developed?
Training / Education

Keys to Creating a Cybersecurity Process from the J3061 Process Framework

2019-07-15
This allows an organization to develop an internal cybersecurity process consistent with its other processes in order to build cybersecurity robustness into their cyber-physical systems. ...This web seminar will define key concepts in cybersecurity and discuss what a cybersecurity process consists of and why one is needed for the development of cyber-physical vehicle systems.
X