Cybersecurity Afterwork: Managing Vulnerabilities in the Software Supply Chain

The Team at CYRES Consulting is glad to invite ASRG Members to the third Automotive Cybersecurity Afterwork Event on their new floors in the Highlight Towers in Munich. Network with other automotive cybersecurity specialists and get more knowledgeable on current topics while enjoying drinks and snacks in a laid-back environment. SPEAKER INFO:Introducing Gregor Knappik from Karamba Security. Karamba […]

Call for Speakers: COVESA All Member Meeting 2022

COVESA All Member Meeting 2022 The workshop session for cybersecurity will be on April 28th from 9am-11am local time in Leipzig, Germany. Driving the Future of Connected Vehicles The evolution from GENIVI to COVESA is complete and the momentum is building measured in new members and projects. We’re all eager to be back together in person in […]

Cybersecurity Capability Maturity Model (C2M2)

The Cybersecurity Capability Maturity Model (C2M2) is a tool for evaluating and improving cybersecurity. It was developed in 2012 by the U.S. energy sector and the Department of Energy (DOE). The C2M2 is managed by the DOE’s Office of Cybersecurity, Energy Security, and Emergency Response (CESER) Cybersecurity for Energy Delivery Systems (CEDS) division. CESER’s CEDS division advances […]

NHTSA: Cybersecurity Best Practices for Modern Vehicles National Highway Traffic Safety Administration. (2016, October). Cybersecurity best practices for modern vehicles. (Report No. DOT HS 812 333). Washington, DC: Author.

SAE J3101: Hardware Protected Security for Ground Vehicles Access mechanisms to system data and/or control is a primary use case of the hardware protected security environment (hardware protected security environment) during different uses and stages of the system. The hardware protected security environment acts as a gatekeeper for these use cases and not necessarily as the executor of the function. This section […]

SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. The best practices are intended to be flexible, pragmatic, and adaptable in their further application to the vehicle industry as well as […]