Online live broadcast: "Reflections on risk assessment and security testing implementation based on WP.29 compliance"

 

In recent years, with the update of WP.29 and other automobile safety regulations and standards, information security has been paid more and more attention by manufacturers at all levels. Related risk assessment, penetration and inspection tests also play a key role in verifying the compliance and reliability of automotive information security. So, based on the current regulatory requirements, what are the matters that need to be focused on during the automotive risk assessment process and safety testing process? Under the requirements of new regulations, how to better deploy a penetration testing solution based on risk assessment?

Tansi Lab specially invited China Automotive Engineering Research Institute Co., Ltd. (Beijing Branch), Dr. Peng Jing, Strategic Development Director of China Automotive Research Institute of Vehicle Networking Security Joint Laboratory, to share with us: WP.29-based risk assessment and security test implementation thinking.

Jing Peng, Ph.D., Beijing University of Aeronautics and Astronautics (in the field of information security of Internet of Vehicles); director of strategic development of China Automotive Research Institute of Internet of Vehicles Security Joint Laboratory; member of Qingji Automotive Information Security Public Welfare Group; once worked as the head of CVVD of China Automobile Zhilian, and has been engaged in research in the field of Internet of Vehicles security for many years.

Live guest

Dr. Peng Jing

Strategic Development Director of China Automotive Research Institute of Vehicle Networking Security Joint Laboratory

China Automotive Engineering Research Institute Co., Ltd. (Beijing Branch)

Live topic

Thoughts on risk assessment and security testing implementation based on WP.29 compliance

Live time

December 28th 19:30-20:30

key topic

1. Overview of WP.29 and VDA guidelines

2. How to deal with the implementation of WP.29 risk assessment requirements?

3. How to better deploy a penetration testing solution based on risk assessment?

 

Guess you like

Origin blog.csdn.net/TaasLabs/article/details/111588789