Auto-ISAC Summit 2019
What if you cannot trust your own car?
- Connectivity is changing the automotive ecosystem and the way drivers interact with their cars; creating endless opportunities but at the same time introducing new threats, due to multiple penetration vectors
- Cellular (3G/4G-LTE), Bluetooth, V2X, OBD II, WiFi, Infotainment
- Attack motivations: Cyber Ransom, Car Theft, Targeted Attacks, Hacktivism, Data Theft/Privacy Invasion
- Ericsson’s Connected Vehicle Cloud caters to the global automotive industry’s need for scalability, flexibility and security when connecting products and services
- In order to provide secure vehicles it is important to look at different domains and how they set different requirements on technology, competence and processes. To secure the connected vehicles domain, Ericsson has partnered with Argus Cybersecurity
- Ericsson and Argus Cybersecurity are demonstrating how automotive cybersecurity can be managed end-to-end at this year’s Auto-ISAC.
- By combining Ericsson’s holistic security solutions and managed services, our access to anonymized data from other domains, and our Connected Vehicle Cloud platform, with Argus’ connected vehicle security and software update (OTA) solutions, we can offer the best open-ended solution on the market to address current and future needs of any vehicle manufacturers