Industry BAROMETER »AUTOMOTIVE CYBERSECURITY. S/O PRACTICE«

In the "State of Practice" series, practitioners provide information about the challenges they face in their development projects and the specific methods they use.

Back to Automotive Cybersecurity

In qualitative interviews with experts from leading automotive manufacturers and suppliers, Kugler Maag Cie discussed the current state of cybersecurity in the car industry and how existing gaps can be closed in a methodical and structured way.

Furthermore, the experts conveyed to us where there is currently a need for support in order to concretely help practitioners in the projects with the understanding and application of cybersecurity tasks. "Automotive Cybersecurity. State of Practice" is directly built on these assessments. The report aims for practitioners who are faced with the day-to-day challenge of implementing cybersecurity requirements in line with their project goals.

Users still see cybersecurity first and foremost purely as technological protection. Of course, this is only half the story. In fact, security requires continuous effort, from the initial concept of a connected vehicle to its end-of-service.

Based on intensive interviews with experts, we provide an overview of the impact of security requirements and how they can be implemented at both organizational and project level.

Download Report

Get your copy of the industry barometer report »Automotive Cybersecurity. State of Practice 2020« here for free.

Institute for Information Securtiy (SEC)

We designed and conducted the industry barometer "Automotive Cybersecurity. State of Practice 2020" in close cooperation with the Institute for Information Security (SEC) at the University of Stuttgart, headed by Prof. Dr. Ralf Küsters.

More on SEC

The cybersecurity report highlights

In addition to the findings from the qualitative expert interviews, we have attempted to provide answers to guide newcomers to cybersecurity. 

From the content

  • Fundamentals of automotive cybersecurity 
  • Introduction to the world of standards
  • From theory to TARA
  • An architectural sketch for software updates
  • Automotive SPICE in the context of cybersecurity 
  • Functional safety and cybersecurity 
  • Open questions of automotive cybersecurity
Just get in touch.

Having questions on our research program, publications, videos or events? I will gladly support you with the information you need.

Dominik Strube Public Relations and Research

To prepare the State of Practice industry barometer, a good dozen qualitative interviews were conducted at the end of 2019 and in the first quarter of 2020 with those responsible for cybersecurity issues at vehicle manufacturers and leading suppliers. The interviewees' willingness to answer the questions openly and in detail gave us valuable insights into where the experts see knowledge gaps among users, especially at the project level.

Join the TARA training class

In this course we will familiarize you with theoretical and practical knowledge about TARA and risk assessments. After TARA in the concept phase, risk assessments turn into the pivotal point of cybersecurity oriented processes. We therefore recommend that you become accustomed to TARA from the very beginning.

In cooperation with TUEV Nord

Together with the TUEV Nord certification body we qualify you as a "Cybersecurity Engineer (Automotive)". During the training you will learn how to achieve the required end-to-end security. As a TUEV Nord qualified Cybersecurity Engineer, you will know how ISO/SAE 21434 supports your work and which homologation requirements are imposed by UNECE for your task.

 

WHAT THE NEW YORK TIMES SAYS ABOUT AUTOMOTIVE SECURITY

How does automotive security work in practice if connected vehicles are basically computers on wheels? This was the question posed by the New York Times. Automotive security expert Steve Tengler, Principal at Kugler Maag Cie, digs deeper.

INTERESTED IN FINDING OUT MORE?

UNIVERSITY OF STUTTGART

Is cybersecurity a realistic goal with so many network and new connectivity solutions around? Dr Thomas Liedtke looks at this topic as part of a round-robin seminar at the software and automation forum at Stuttgart University.

INTERESTED IN FINDING OUT MORE?

 

THREE KEY QUESTIONS ON CYBERSECURITY

HOW DO I STAY ON THE SAFE SIDE? Which tasks should my company take on and which tasks can I trust business partners to take care of? At wardsauto.com (third-party website), Steve Tengler, principal and automotive expert at Kugler Maag Cie in the United States, discusses who should hold the hot potato, and the conflicting interests of security solutions.

INTERESTED IN FINDING OUT MORE?

Download Report