Table of Content

1.EXECUTIVESUMMARY—KEYFINDINGSANDCHANGESFROM2014
ExecutiveSummary—KeyFindingsandChangesfrom2014
ExecutiveSummary—2014KeyFindingsvs.2015Actuals
AutomotiveCybersecurityin2015
ConnectedCarsandAutonomousVehicles—ThreatVectors
AutomotiveHackingIncidents—QuickRecap
ExhibitA—BMWConnectedDriveHackingIncident
OEMChallengesandSPYCarActFindings
2014AutomotiveSecurityInvestments
SecurityInitiatives—2015OEMActivities
OEMChanneltoV2XSecurity
OEMsandTier-1Suppliers—FocusandInvestmentRange
OEMsandTier-1Suppliers—KeyTrendsandBusinessModels
2014/2025FutureOutlookofVehicleCybersecurity
2014/2025FutureOutlookofVehicleCybersecurity(continued)

2.RESEARCHSCOPE,OBJECTIVES,BACKGROUND,ANDMETHODOLOGY
ResearchScope,Objectives,Background,andMethodology
ResearchScope
ResearchAimsandObjectives
KeyQuestionsThisStudyWillAnswer
RelatedResearch
ResearchMethodology

3.REVIEWOFTHREATSANDOVERALLSECURITYPOSTURE
ReviewofThreatsandOverallSecurityPosture
AutomotiveCybersecurity—RoadAheadto2025
AutomotiveCybersecurity—RisksandVulnerabilities
DistributedSecurityArchitecture
DistributedSecurityArchitecture(continued)
AutomotiveCybersecurity—EnterpriseSecurity
EnterpriseSecurity—DataPrivacyandLeakage
SupplyChainSecurity
AutomotiveRetailSecurity

4.OVERVIEWOFCYBERSECURITYECOSYSTEM
OverviewofCybersecurityEcosystem
AutomotiveOEMsandCybersecurityInitiatives
AutomotiveProductSecurity—Tier-1Activities
CybersecuritySpecialistCompanies
CellularInfrastructure,SemiconductorandTechnologyCompanies

5.OEMPARTNERSHIPSANDCYBERSECURITYACTIVITIES
OEMPartnershipsandCybersecurityActivities
V2X—V2V+V2ITechnology
802.11P—ConsortiumsandBenefits
V2XRegionalProtocols,Developments,andAdoption—Japan
V2XRegionalProtocols,DevelopmentsandAdoption—Europe
V2XRegionalProtocols,Developments,andAdoption—US
V2X—KeyPartnershipsandInitiatives
V2VCost
GM2017CadillacandV2X
VolkswagenandGermanCompanies—CybersecurityOrganization
VolvoCars—CybersecurityProject
TeslaBigBountyProgramwithWhiteHatHackers
HondaV2XTestDrive—Europe
SafetyPilotModelDeployment(SPMD)Program

6.VENDORPROFILES
VendorProfiles
AutomotiveCybersecurityEcosystemParticipants
TowerSec
Harman5+1LayerSecurityFramework
ArgusCybersecurity
SecurityInnovationV2XSolutions
CohdaWireless
RenesasElectronicsCorporation

7.AUTOMOTIVECYBERSECURITY—RECAPANDCONCLUSIONS
AutomotiveCybersecurity—RecapandConclusions
AutomotiveCybersecurityandAlliances—QuickRecap
AutomotiveCompaniesSecurityAdoption—CurrentStatus
Cybersecurity—AutomotiveParticipantsPerspective
AutomotiveCybersecurity—IndustryParticipantsMindShare
SecureCodeChallengesandCurrentCodingPractices
Cybersecurity—IndustryAlliancesandPartnerships
AutomotiveCybersecurity—BusinessImpactandTimeline
FutureConnectedCarUseCasesDemandSecuritySpecialists
AutomotiveCybersecurityandNextGenerationVehicles
AutomotiveCybersecurity—ExtendedEcosystem
AutomotiveOEMs—OTAApproach
AutomotiveCybersecurityandOTA
V2XCost—DSRCFieldTrialsandAdoptionRate
AutomotiveSecurityInvestments—KeyTrends
ConnectedCarandCybersecurity—InitiativesandImpactAnalysis
TheLastWord—3BigPredictions
LegalDisclaimer

8.APPENDIX
Appendix
TableofAbbreviationsandAcronymsUsed