Accelerating security

Winning the race to vehicle integrity and data privacy

Download the full reportDownload the infographic

In 2014, IBM published a point of view on automotive security, “Driving security: Cyber assurance for next-generation vehicles,” which introduced the “Design, Build, Drive” approach for the automotive security lifecycle. It’s time to dig deeper. While it’s logical to tackle each phase in the lifecycle, starting with Design, most conversations around vehicle security quickly turn to the threat to in-service vehicles and data privacy, both of which are aspects of the Drive phase. Consequently, we’ll focus on this phase, the one consumers can most readily identify with, and evaluate ways in which automakers can engineer technology to prevent exploits, detect suspicious behavior and respond by recovering gracefully and safely.

How can IBM help you?

Securing the vehicle throughout it's lifecycle

Build a smarter business with IBM Services

Bookmark this Report  

Download the study infographic

Meet the Authors:

Giuseppe Serio

Connect with author:

, IBM Global Solution Leader for Cybersecurity,
Ben Stanley

Connect with author:

, Automotive Research Lead, IBM Institute for Business Value

Related reports
Designing for privacy in connected cars requires participation of all entities that may process car data before vehicles are delivered.
Automotive companies need improved cybersecurity capabilities to support and protect their Industrial Internet of Things (IIoT) technologies.
Tokens are a versatile new form of value that can facilitate seamless transactions within a given usage domain such as commerce.
Automotive leaders must combine the creative skills of a startup with traditional strengths to innovate and scale.