Accelerating security

Winning the race to vehicle integrity and data privacy

Download the full reportDownload the infographic

In 2014, IBM published a point of view on automotive security, “Driving security: Cyber assurance for next-generation vehicles,” which introduced the “Design, Build, Drive” approach for the automotive security lifecycle. It’s time to dig deeper. While it’s logical to tackle each phase in the lifecycle, starting with Design, most conversations around vehicle security quickly turn to the threat to in-service vehicles and data privacy, both of which are aspects of the Drive phase. Consequently, we’ll focus on this phase, the one consumers can most readily identify with, and evaluate ways in which automakers can engineer technology to prevent exploits, detect suspicious behavior and respond by recovering gracefully and safely.

Download the full report

How can IBM help you?

Securing the vehicle throughout it's lifecycle

Build a smarter business with IBM Services

Bookmark this Report  

Download the study infographic

Meet the authors:

Giuseppe Serio

Connect with author:

, IBM Global Solution Leader for Cybersecurity;
Ben Stanley, Automotive Research Leader, IBM Institute for Business Value

Related reports
Automotive companies face radical change since owning a car is no longer a must. To remain competitive, they need to create personalized digital and data-driven experiences.
Designing for privacy in connected cars requires participation of all entities that may process car data before vehicles are delivered.
Automotive companies need improved cybersecurity capabilities to support and protect their Industrial Internet of Things (IIoT) technologies.
Tokens are a versatile new form of value that can facilitate seamless transactions within a given usage domain such as commerce.