Endpoint Security , Information Sharing , Internet of Things Security

Improving Connected Vehicle Cybersecurity

Faye Francy of Auto-ISAC Says Threat Intel Sharing Is Growing
Faye Francy, executive director, Auto-ISAC

Connected vehicles are rife with cybersecurity risk. But automakers and suppliers are increasingly sharing critical information.

See Also: Securing Industry 4.0: Insights From New Research

The Automotive Information Sharing and Analysis Center, or Auto-ISAC, has 60 members now, up from 14 original equipment manufacturers when it launched in 2014, says Faye Francy, its executive director. Those organizations share threat intelligence on a platform called Celerium, Francy says.

Auto-ISAC is also addressing the need for better supply chain security. Francy says her organization's Supplier Affinity Group is working on a software bill-of-materials model for the automotive industry. The model will offer a detailed list of what kinds of software a finished application contains, which makes it easier to ensure those components are up to date with patches.

The model "can really help us with known vulnerabilities and managing that risk," Francy says.

In this video interview, Francy discusses:

  • How manufacturers and suppliers are exchanging intelligence;
  • What supply chain security challenges the auto industry faces;
  • How long-term support for connected vehicles is shaping up.

Faye Francy is executive director of Auto-ISAC, a forum for exchanging intelligence about emerging cybersecurity threats. Francy was previously an executive at Boeing, developing cybersecurity strategies for aviation systems while also executive director of Aviation-ISAC.


About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.