In this live webinar, you will learn about the growing threat landscape for connected vehicles, the most common vulnerabilities, how to secure critical systems better, and why it is essential for auto and component manufacturers to take a proactive approach to securing their products.
Increased dependency on software to power vehicle systems and features, has become a cyber security threat to connected vehicles and the introduction of new driving assistance, vehicle-to-vehicle communication, and autonomous driving capabilities. Learn about the growing threat landscape for connected vehicles, the most common vulnerabilities and how to secure critical systems better. Also, you will have an exclusive chance to talk to our security experts during the live Q&A session.
Date: Wednesday, May 17, 2017
Time: 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT
Duration: 45 minutes followed by live 15-minute Q&A
Domain expertise: Automotive, Web application testing, Network penetration testing, Wireless, Embedded, Social Engineering, IOT, SCADA, Reverse Engineering, Red Team, Lock Picking
Vlad is a driven security researcher with a passion for securing technology that makes civilized life possible. He is particularly focused on automotive security, satellite systems security, SCADA systems supporting the critical infrastructure and wireless networks. He specializes in the intersection of physical and network security. He has worked on DARPA projects, established and led penetration testing teams for Fortune 50 organizations, performed incident response and forensics on sensitive production systems within controlled environments, reverse engineered security devices, and participated in countless red team engagements for banks, critical infrastructure, pharmaceutical companies, law firms and research organizations. Vlad has been a speaker at various security conferences including Bsides, DEFCON, HOPE, and ShmooCon. Vlad was a board member for NYC OWASP and remains committed to the security community working together to improve the security posture through developer education, end user training, peer-reviewed code and rigorous standardized testing methodologies.