Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES...The Bridge connecting sacrifice to success. YOU NEED THE BUSINESS BEATITUDES!
TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!
SUMMARY KEYWORDS
cybersecurity, giuseppe, conversation, vehicle, industrial, autonomous vehicles, cyber attacks, cyber, companies, understand, resiliency, build, technology, world, connected, security, talk, automotive, car, place
00:00
Welcome to the Industrial Talk Podcast with Scott. MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's go all right. Thank you very
00:22
much for joining Industrial Talk and thank you for your continued support of this platform. This platform is dedicated to you, industrial professionals all around the world. You are bold, brave, you dare greatly, you innovate. You're solving problems, you're making the world a better place. That's why Industrial Talk is celebrating you. Thank you very much for joining and again, thank you for your continued support. We are at IoT solutions, World Congress right now, broadcasting on site Barcelona, Spain, and it is a wonderful event. This event needs to be put on your calendar. It is a must attend event. So if you're not here at 24 put it in 25 make that a priority. Put it in your budget. Make it happen. You will not be disappointed you get to meet people like Giuseppe, Upstream, auto. Upstream, dot auto. Let me get that correct. Is the organization we're going to be talking about cybersecurity and the importance of cybersecurity. Yeah, you're saying to yourself, Scott, I understand. No, you don't understand. You need more information around cybersecurity. Let's get cracking. All right, Giuseppe, thank you for your flexibility. From last night. We were supposed to have this conversation last night, but Giuseppe said, Scott, I understand you're busy, and I'm flexible and I'll come back tomorrow.
01:36
Absolutely, you're awesome. I'm really excited to be here today with you. Yeah,
01:41
I was excited too. I said, All right, man, he's on my calendar, and I'm going, Oh yeah, I want to talk. I'm looking forward to this conversation in a big way. You having a good conference,
01:51
very good conference. So it's the first time for me here at the IoT solution world. I enjoyed it because I think this is a great place to be if you are in the IoT and cybersecurity space, as I do
02:06
see, I like the fact that it's it's the two. It's like there is a real connection between that connectivity, that digital connectivity, that that IoT space and cyber. I don't think the two conversations can be sort of had in a vacuum. I think you need to be able to have both conversations to be truly to ensure proper connectivity.
02:30
Couldn't agree more, that is exactly why I choose to be here, because it's both one coin, and you have two sides. One is the enabling technology, and the other is, hey, that is kind of risky place to be because it's operated by the Internet. We know it's one, if not, the most insecure place that we do things with, and therefore security needs to be a top priority. And
02:55
well, we're not going to get into it before we get into that conversation. Just just give us a little background on who you are.
03:02
Yeah, sure. So my name is Giuseppe Serio. I'm based Frankfurt in Germany. I work for a company. His name is Upstream Security. We are passionate about making mobility safe and secure, and what that means we look at everything that is connected, predominantly automotive transportation at large, and try to make companies more resilient against cyber attacks. So I spent, like the last 20 years in the automotive industry, of background, working with big blue IBM, also coming from the consulting side, strategy consulting, and now I help clients to make themselves more resilient against cyber
03:48
attacks. I like it. I think you brought up something that was really that piqued my. My interest was the the autonomous car, the vehicle. Autonomous vehicle is the most sophisticated IoT device out there. Is that? Is that an accurate description? Because there's IoT devices, but as I want my car absolutely,
04:11
absolutely Now, here's the thing, so today's more sophisticated vehicle, which are not autonomous, they can have up to 100 million lines of code. To give you a perspective, a F 15 fighter jet has 2 million now that tells you something. It's the most complex device that we have built. And therefore, in looking forward, when we talk about autonomous, that 100 million lines of code will be, sooner or later, around 600 million lines of code, and there's inherently vulnerabilities in software, because people suck, we are not good in doing code. As a matter of fact, there will be vulnerabilities, and therefore we need to be very, very careful. Are passionate on one hand, on the other hand side, we're cautious in the evolution of technology that moves people, because it's not a technology that breaks up, it's not the computer that's not working. It's people life that is at stake, and ultimately also critical infrastructure, because imagine you could attack and there's movie out there, like the world is not enough, or something like that, where you direct all the vehicles into congestion, and there you go. So what to do about that?
05:36
The topic of autonomous vehicles have been out for some time now, do you find that there's a greater appreciation or recognition for the necessity to protect these, these complicated, you know, assets, or is that sort of an afterthought? Or do we need to do we need to sort of change our thinking in
06:01
ew regulation that came up in:07:04
We do. How do you approach that? I don't it seems, well, it seems bigger than a bread box. How do you, I don't know, how do you begin that's,
07:18
yeah, you begin to understand what are the risks? And one thing is to raise the bar. So there's constant effort involved in raising the bar against the bad guys, right? So making it really hard and tough, so building secure by design in is imperative right on top of it, because the nature of cyber attacks is such that you're never secure, or at least the mindset needs to be that no matter how good the protection is today tomorrow, it can be obsolete. So it becomes really important to constantly monitor, understand what's going on, spot, any anomalies that are ongoing, and I say anomalies on purpose, and not cyber because sometimes cyber attacks are so sophisticated that you can't distinguish it. Is it now something that is misbehaving on the vehicle side? Is it something that gives you a trouble code, like a light that pushes up in your car, or is it really a cyber attack that and you understand cyber security only in the context, so there is no 100 security, person security, and it's really hard to upfront say this is cyber and I give you an example. So today, you can do all sorts of thing with application. Now you can open, start the car, start the engine. Now, if I do that in the proximity of the vehicle, that's a legitimate use case. We want this to happen, right? Yeah. But if I do this from being in, I don't know, Australia, maybe I want, I'm a show up, and I want to show those guys hanging out. Hey, look, I have a camera installing my house. I can show you that I can hold the horn. So context is important. Also, it's just one car that is being turned on and off, or is it multiple? So you want to have that visibility. And the hardest thing in cyber security is to make a visit, because the bad guys, obviously, they don't just do the attack by Hey, I launch an attack and it will be successful. The way it works is sometimes it takes years, and they're already in the system, waiting for that moment where they can do harm. I more.
09:43
Every time I have conversations around cybersecurity, I just want to curl up in a ball and like, how do we? Because the reality here using the use case of autonomous vehicles, it's happening. It's going to happen more. It's going to it's going to be the. And ubiquitous, and it's just going to be there. It's just as and I thought your point of our senses will start to just numb a little bit. We don't. We're just not tuned in as much. So we just don't know, how do we how do we create or build security for that resiliency. How do we where do we do I don't
10:27
know. So resiliency, from my perspective, has two sides. One is the companies that are putting out products and services, either there's regulation and there's a ton of regulation in the mobile world, for sure, for obvious reasons, companies need to be proactive. The meaning of it is resiliency. Is a combination of people who understand the problem processes in order to mitigate whenever there is a normally and then how to react to that. And an example I use is, how do you know your fire brigade is good? How do you know when there is a fire they will be doing their job brilliantly? It's because they train it. And what I'm mandating for is that needs rehearsal. It needs to be repetitive, as if a cyber attack has happened, so that one is prepared for when that happens. And the last thing is the technology. So the technology needs to be as sophisticated as the technology that the bad guys are using, because these are not isolated people who are sitting in the background, these are acting like corporations without the boundaries of having to do things legal. That is how you build resiliency. And the other thing is, and this is also something I'm advocating most of the time, the burden of, Hey, make that product and service secure is on the consumer is on the ones who produce it. I'm a big fan of saying, hey, we need literacy. We need education. So the moment I go into my car and there's something that is not normal, I shouldn't click and say, Yes, like we do it with click somewhere, click, click, click, yes, and that's it. We need to have that mindset that everything is potentially an
12:28
issue. Does digital twin, virtual twin, enter into the cut where you're simulating those vehicles, autonomous vehicles, being able to simulate those potential attacks. Yeah, absolutely.
12:42
That's part of the technology that my company provides, a stateful digital twin, which is understanding the context of where and how vehicles behave and operate, and thereby you have the ability to do forensic investigation. The meaning of it is, I have a symptom. Red light flashes up, okay. How do you switch it off? How do you go backwards and understand the source? Because at the end, we want to fix the problem and not the symptom.
13:16
I'm a big fan of that ability to simulate, to be able to sort of test and and, you know, take into consideration maybe some variables that are just a little far fetched, but you need to, you need to know what it is. So how do you consult your client base? How do you, how do you begin them on that journey and saying, this is, this is sort of something that you need to be considering.
13:45
Well, most of the company, for all the companies, as I said, there's regulatory environment where that's new. It's, it's a, yeah, it's somewhat new. But, you know, for automotive in general, safety has been always concerned. So that is something that probably the last 30 years, has been activated in companies to build more and more safe vehicles. Now, security and safety go hand in hand. They cannot be separated. I think the important is to understand and acknowledge that. And I give you also another example on that. Now, for safety reasons, the head unit is now. Everything is software based. It used to be buttons, so you would separate functions. Now, in order to reduce distraction, we have everything in one place. Now, guess what? From a security perspective, that's the Holy Grail, because you have one point of failure. So one point that the attacker can attack, it's not a separate function, and you have just a limited possibility to attack. That's a great example where the mindset needs. A shift where, okay, I do something in favor of safety. What does it mean, actually, for cyber security? Yeah,
15:05
I I just think that it's such an important conversation, not just and it goes beyond the the the industry that you focus in on it. I mean, I just think, from a, from a truly connected, you know, business that the cyber conversation needs to be upfront, not after the fact, not after the fact that you've installed all these devices, or you've you're starting to pull data and you're connected and all of that stuff, and then have that conversation. I don't think that that's the right approach, and I think, I think it's becoming more and more apparent. It's a part of the success. You want to connect. You want to be able to access all of the wonderful technology that exists out there. You cannot do it without that cyber conversation. Great, yes,
15:57
but goes hand in hand with what I said earlier. So on one hand, raise the bar. This is the design it in from the beginning. But we need to acknowledge, and this is really, really important, that it's not enough. We need to monitor it. We need to have visibility of what we what did we not think about and attackers were smart in attacking in ways that we never thought it was possible, but then it's possible. So that is the conversation. It's like, it's still in the infancy. Cyber security for automotive news, like going to the moon in the end of 60s, right? So nobody did that before, yeah. So how do you know how you don't have that experience that you can build upon and weave into the conversation. So it's trial and error. At the end of the day, I don't want to scare anybody, because the industry is putting a lot a lot of emphasis in cybersecurity, but it's for people. Awareness is important, so be aware that the risk is there.
16:57
Yeah, see, I like that. Giuseppe, thank you very much. How do people get a hold of you if they want to
17:01
know more about I'm on LinkedIn Giuseppe zero, and I'm eager to have that discussion with
17:08
him while I was interested. I love it. All right. Listeners, cybersecurity, you can't ignore it. It's your best friend. Let's just accept the fact that it is your best friend. All right. We're gonna have all the contact information for Giuseppe out on Industrial Talk. You know that? Reach out to him, find out more. It's an important conversation to have. We are once again broadcasting from IoT solutions World Congress, Barcelona, Spain is the location, and put this on your calendar for next year. It is a great event with great people like Giuseppe solving problems. All right, we're going to wrap it up on the other side. Stay tuned. We will be right back.
17:42
You're listening to the Industrial Talk Podcast Network.
17:50
That was great conversation. The event was IoT solutions, World Congress, as you know, Giuseppe was his name, Serio, S, E, R, I, O. The company is Upstream.auto. So make note of that, Upstream dot auto. So I went out to their website. You know what they they do a lot in cybersecurity. They've got mad services and solutions. You just got to go out there check them out. Because if you're in the world of connected assets, IoT cybersecurity, hand in glove must happen. You must do it. Find out more. Connect with Giuseppe. He would be more than happy to have a conversation. All right, Industrial Talk is here for you. You have a podcast that you are doing, and you want greater traction and attention, put it out on Industrial Talk. If you want to do a podcast. Go out to Industrial Talk. If you have any desire to create a podcast, come talk to me. I'll tell you how to get it done. All right, be bold, be brave. Dare greatly. Go to IoT Solutions, World Congress, and you're going to change the world. We're going to have another great conversation shortly. So stay tuned.