Channel Avatar

SecureOurStreets @UCXDdB54gfDFVW2XxQe0vzXw@youtube.com

296 subscribers - no pronouns :c

More from this channel (soon)


44:39
PIVOT Catalyzing the Community Around Collection and Sharing of Automotive Research Datasets 1
44:53
Observing the Clouds Lessons Learned from Cloud Vulnerabilities for HPCs and Software Containers 1
34:50
Automotive Bug Bounty Program and Lessons Learned
43:25
Application of GenAI LLM's for Threat Scenario Generation for TARA Assessments 1
45:48
Secure Isolation
37:44
Enhancing Automotive Cybersecurity Using Machine Learning techniques to Improve ISO SAE 21434
30:50
CRISKLE An Integrated Product Security Lifecycle Platform for Enhanced Safety & Security Analysis
34:07
vSOC Risk Recharging Dynamically Integrating TARA, Threat Intelligence and Live Monitoring 1
44:19
The Missing Link How we collect and leverage SBOMs
35:11
Everything Everywhere All at Once Towards Integrated Product Security for Software Defined Vehicle
50:25
Practical Transformation Proposal between CVSS 4 0 and ISO SAE 21434 Attack Feasibility Rating
59:38
PANEL DISCUSSION Automotive Privacy – Differentiator or Pain in the Neck
54:52
KEYNOTE Raising the Cybersecurity bar Seeking unconventional methods to solve conventional problems
48:41
The Complex Regulatory Landscape of Automotive Cybersecurity Challenges of National Standards
44:58
An Investigation into Retrievable PII Data from a Mercedes Benz NTG6 IVI Module
28:48
Driving Efficiency: Validating Your Security Posture With Sector Relevant Intelligence
45:14
Risk assessment along the supply chain From OEM to Tier 1 to Tier 2 – how does it all fit together
39:57
Redefining OEM Supplier Dynamics Powerful TARA Updates for Effective Requirements Specifications
43:53
Shifting Left Vulnerability Management
45:09
From Regulation to Practice Frameworks for Cybersecurity Manager to Enable Better Cybersecurity
45:01
Securing the Keys to the Future Robust Authentication for Next Gen Vehicles
40:38
Exploiting EV Charging Networks Pathways to Potential Blackouts
30:34
EVSE Security and the need for collaboration
38:31
Tales from a Penetration Testing Team Insights on Recent Zero Day Automotive Vulnerabilities
39:42
TAF as Steel A practical example for applying Targeted Attack Feasibility in an ECU Project
49:08
KEYNOTE: Keeping Car Safe in the Real of Hyper-Converged SDVs
00:47
SecureOurStreets 2024 Promo
43:46
Noel Lowdon | Data Trails: MBUX NTG6 & DLT Files - Forensic & Cybersecurity Research
48:05
Cédric Vamour | Security of Over the Air Software Update towards SDV
37:15
Adam Shostack | A Fully Trained Jedi, You Are Not
44:51
Hollie Hennessy | The road to regulation cybersecurity requirements for modern vehicles
44:23
Danila Parnishchev | Walking Through Walls The Real World Approach to Vehicle Security Assessment
11:37
Closing | Secure our Streets 2023 | John Heldreth
43:06
Vit Sembera | Securing Connected Cars Against Full Chain Attacks and Advanced Automotive...
44:26
Dr. Thomas Liedtke | End-to-end derivation of cybersecurity requirements in different levels of...
45:04
Florian Lukavsky | Mining for relevant vulnerabilities in connected devices
01:00:24
Dr. Andre Weimerskirch | KEYNOTE Automotive Cybersecurity Map – Today and Tomorrow
43:28
Manuel Sandler | How to establish a cybersecurity culture in automotive development work: Guidance..
57:17
PANEL DISCUSSION Maturity of Cybersecurity Management Systems in Automotive Insights from Auditors
54:32
Ian Tabor and Ken Tindell | How an automotive security researcher had his car stolen via CAN Inje...
41:48
David Leichner | Cybersecurity in the Driver's Seat SBOMs for Automobiles
46:16
Dr. Nils Weissand Enrico Pozzobon | Fault Injection Attacks on Secure Automotive Bootloaders
45:37
Yashin Mehaboobe and Ramiro Pareja | Challenges in Automotive Vulnerability Disclosure
59:01
Sean McKeever | LIVE TABLE TOP EXERCISE: Incident Response
39:03
Giuseppe Serio | SDVs and Beyond Upstream's H1'2023 Automotive Cyber Trend & Impact Report
47:10
Kamel Ghali | Falling Backwards Into Automotive Security
44:12
Rakshith Amarnath and Khaled Yakdan | Tragedy of the Commons: Software Security in the Software...
39:18
Zhongjie Wu and Yuqiao Yang | GoGoBark: Interference Attacks on UWB Ranging for IEEE 802.15.4z...
43:36
Orhun Süzer and Oliver Huppenbauer | A Practical Transformation Proposal...
45:28
Alon Ashkenazi | Automating End to End Security Testing in the Automotive Industry
57:14
Dr. Joern Eichler | KEYNOTE: Looking back to the future of automotive cybersecurity
26:18
Welcome! | Secure Our Streets Conference 2023 | John Heldreth
00:57
Secure Our Streets September 2023
01:18
Seecure Our Streets 2023
03:05
Secure Our Streets 2022 Reception Video
40:48
Session 13 | Stage 2 | Matthew Carpenter | Emulation driven Reversing For Firmware Vulnerability Res
30:30
Session 13 | Stage 1 | Carla Trevino | Secure EV Charging Plug and Charge
26:18
Session 12 | Stage 2 | Fabian Weber and Florian Schmid | PROBoter Automating PCB analysis tasks to
28:53
Session 12 | Stage 1 | Guy Molho | Mastering the Continuous Automotive Security with a Feedback Loop
39:58
Session 11 | Ranwa Al Mallah | AI vs AI arms race on critical infrastructure