Program Agenda
Insight. Research. Knowledge
This year’s program was uniquely curated by the escar USA Steering Committee. In addition to the invited speakers selected by the committee, submitted papers underwent a blind review process by the Program Committee. In 2026, we are including an Academic Track, focusing on papers from those working on mobility cybersecurity research, as well as a Poster Session.
All approved presentations can be accessed at the conclusion of the event by clicking the presentation title below.
Day 1 Agenda
Time
7:15-8:15 AM
Activity/Presentation
Breakfast
8:15-8:25 AM
Welcome and Introduction
8:25-9:10 AM
Invited Speaker | From Vulnerability Management to Vulnerability Elimination: Rethinking Automotive Software in the Era of AI Offensive Agents
9:10-9:35 AM
Maggie Shipman
9:35- 10:00 AM
Sharika Kumar
Networking Break
10:30- 11:15 AM
Dan Massey
11:15- 11:40AM
Hafiz Malik
11:40 AM- 12:25 PM
Pawel Brzezinski
Lunch
1:25- 1:40 PM
Richard Kerslake
1:40- 1:55 PM
Karl LeBoeuf
1:55- 2:40 PM
Invited Speaker | Euro 7, Anti-tampering and the Expanding Cybersecurity Landscape
Rami Riashy
2:40- 3:05 PM
Shin Li
Networking Break
3:35-4:00 PM
Nimrod Stoler
4:00-4:25 PM
Christos Papadopoulos
4:25-4:50 PM
Doug Britton
4:50-4:55 PM
Closing Remarks
5:00-6:00 PM
5:00-7:00 PM
Evening Reception
Speaker
Ahmad Nasser
Day 2 Agenda
Time
Activity/Presentation
Speaker
7:15-8:15 AM
Breakfast
8:15-8:20 AM
Welcome
8:20-9:05 AM
Annie Dai
9:05-9:30 AM
Roland Varriale
9:30-9:55 AM
Shin Li
9:55-10:20 AM
Brian Murray
Networking Break
Networking Break
10:50-11:15 AM
Sekar Kulandaivel
11:15-11:40 AM
Seungjin Baek
11:40 AM-12:25 PM
Andrew Zonenberg
1:25-1:40 PM
Chad Childers
Lunch
1:40-1:55 PM
Francesca Forestieri
1:55-2:40 PM
Matt Carpenter
Networking Break
3:10-3:35 PM
Pawel Brzezinski
3:35-4:20 PM
Urban Jonson
4:20 PM
Closing Remarks
OUR MISSION
The overall goal and objective of escar is to provide a forum for collaboration among private industry, academia and government regarding modern in-vehicle cybersecurity threats, vulnerabilities and risk mitigation/countermeasures.
WHAT TO EXPECT
Speakers give recent insights and encourage discussions about security in the automotive life cycle, security technologies for automotive components and networks, future security technologies.
Our Sponsors