Welcome!

News Feed Item

Security Guru Bruce Schneier to Keynote Battelle CyberAuto Challenge

Third Annual Event Provides New Training for the Next Generation

COLUMBUS, OH -- (Marketwired) -- 06/23/14 -- Bruce Schneier, one of the world's leading experts on computer security and privacy issues, will deliver the keynote at the July Battelle CyberAuto Challenge, a practicum-based camp designed to address cybersecurity in automobiles for students, engineers, scientists, policy leaders and white hat "hackers."

Schneier, a cryptographer, security technologist and author of a dozen books and countless articles, will discuss the emerging field of vehicular cyber security at the third annual event, which takes place July 13 -18 at the Troy, Mich., offices of Delphi Automotive PLC.

Battelle, the world's largest nonprofit research and development organization and a leader in STEM education as well as cybersecurity and connected-vehicle technology, developed the CyberAuto Challenge in 2012 to champion science and technology as a career choice for today's youth. Today's vehicles have more computational power than most laptops and increasingly sophisticated communications systems that could be vulnerable to corruption, misuse or unauthorized access.

"As one of the world's leading cyber security gurus, Bruce brings valuable insights and expertise to the CyberAuto Challenge," said Karl Heimer, director of Battelle's Center for Advanced Vehicle Environments. "No one has a better understanding of how the sophisticated communications systems available in vehicles today need to be protected from corruption and misuse."

Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, an advisory board member of the Electronic Privacy Information Center and chief technology officer at Co3 Systems, Inc. He has addressed Congress on issues of security and privacy and publishes the newsletter "Crypto-Gram" and blog "Schneier on Security."

Schneier is scheduled to speak on Tuesday, July 15.

At the event, students will be divided into teams with an equal ratio of working professionals from a variety of organizations, including automotive manufacturers, federal agencies such as the U.S. Departments of Transportation, Homeland Security and Defense and research organizations. The teams will participate in daily lecture and instruction in subjects such as secure system design, secure programming, embedded systems, IT law and ethics. Then, each day, they will apply their new knowledge to practical challenges on actual cars. Many of the sessions will have time constraints to simulate real-world conditions.

A trusted leader in national security, Battelle has unparalleled experience in cybersecurity, providing risk analysis, threat assessment and detection, countermeasures and other security services to federal agencies and financial services companies. Battelle's work in automotive technology includes contributions to the development of anti-lock brakes and cruise control, as well as crash safety and collision avoidance programs with the U.S. Department of Transportation.

Battelle is applying that expertise to the automotive industry's growing need for security and performance technologies that protect the connected car, creating a portfolio of cyber automotive products and services. This offering includes a new technology, called NEM, which Battelle is currently testing with several automotive manufacturers. NEM applies machine-learning to understand normal behaviors through vehicle usage and then detect system anomalies. NEM can alert the driver, intervene or alert authorities, depending on the severity of the threat.

Another innovative automotive technology from Battelle, VITAL™, provides drivers with a wide variety of real-time vehicle telematics data that can be used to monitor and coach driver behavior, conduct performance based maintenance, and even update and fine-tune engine and performance parameters.

Visit the Battelle CyberAuto Challenge page at www.battelle.org/cyber-auto-challenge or follow @Battelle and use the #cyberauto hashtag on Twitter.

About Battelle

Every day, the people of Battelle apply science and technology to solving what matters most. At major technology centers and national laboratories around the world, Battelle conducts research and development, designs and manufactures products, and delivers critical services for government and commercial customers. Headquartered in Columbus, Ohio since its founding in 1929, Battelle serves the national security, health and life sciences, and energy and environmental industries. For more information, visit www.battelle.org.

Media Contacts

For more information contact
Katy Delaney
(614) 424-7208
Email Contact

T.R. Massey
(614) 424-5544
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.