The Returning Champ: Meet Trillium at Pioneers.Mobility 2018

If ever you wanted an illustration of why a startup might want to attend an event like Mobility.Pioneers, look no further than automotive cyber security company Trillium Secure. Having travelled all the way from Japan to Germany for the first edition of Mobility.Pioneers last year, they impressed the jury enough to enjoy the glory and publicity that came with victory in the autonomous track, one of three broad categories in which startups competed.

That in itself was a great return for a company making its first foray to a European event. But there was more to cheer than that. Trillium also got talking to automotive giant Volkswagen at the event, a connection which directly led to an ongoing collaboration with the corporate. And the impression they made last year also earned them an invitation to return, this time to take part in a panel discussion that reflects their growing status in the industry. Trillium’s CEO David Uze will be taking part in the What Could Future OEM Business Models Look Like? discussion on stage.

“We were humbled that the jury recognized the importance of securing vehicles and how that is fundamental to enabling autonomous drive,” recalls their Strategic Business Development Manager Adrian Sossna, who will also be present in Munich once again. “Without cyber security, there’s no autonomous drive.

“On the opening night, at the ice-breaker event, I happened to sit at the same table as Dr Zach Izham. He’s Project Manager of the Volkswagen Data:Lab in Munich. We kept in contact and he was very interested in what we were doing. Then in October last year we were selected for the VW Data:Lab program, and are now working continuously with them. So that contact was made at Mobility.Pioneers. On the day itself we had a demo set up and we got a lot of attention at our little booth. We got a lot of leads and discussions from that too.”

Fond as those recollections are, Trillium is looking forwards rather than backwards as the company continues to grow fast. And they see great value in taking part in the panel discussion next week.

“What these panels give you is the opportunity to begin a conversation about things that are industry-wide problems, with the right parties,” says Sossna. “Cyber security solutions won’t come from a startup. Nor from an OEM. And nor from a Tier 1. They’ll come from a group of companies coming together to solve different parts of a major problem. Panels enable us to start that conversation.

“One of the key reasons we’re coming back is to meet the right people from the right mobility companies. People who have an interest in our type of disruptive business model and want to do this together with a startup like ours. Having deployed and built our value system for Japan, we’re looking to have the right Go To Market partners for Europe this year.”

So which are the startups jostling for a chance to emulate Trillium’s success when the second edition of Mobility.Pioneers rolls around next week? Having narrowed down the invitation list to 100 startups, we can now also name the 20 who we’ve selected to pitch on stage – and the experts who’ll judge them. The program has been expanded from last year, and now includes four pitching tracks.

The details for each track are as follows:

SHARED USE TRACK

Startups: Caroo Mobility, MOVTZ, 2hire, Getaway, Utopian Future Technologies

Judges: Julius Rüßmann (Earlybird Venture Capital), Tian Tian Feng (Cherry Ventures) and Jens-Philipp Klein (Atlantic Labs).

ELECTRIFICATION TRACK

Startups: CIRRANTiC, AVILOO, EcoG, Lennahc, ChargeX

Judges: Olaf Joeressen (High-Tech Gründerfonds), Julien Etienne (Aster Capital)

AUTONOMOUS TRACK

Startups: TheWhollySee, Sensible 4, Humanising Autonomy, emotion3D, embotech AG

Judges: Ulrich Eisele (Fluxunit), Boris Shulkin (Magna International), Phillip Stangl (Pioneers Ventures)

CONNECTIVITY TRACK

Startups: Capricode, WeNow, High Mobility, German Autolabs, Susi & James

Judges: Christian Lindener (Wayra), Gitte Bedford (Robert Bosch Venture Capital), Marie-Helene Ametsreiter (Speedinvest)

The winning startup from each track will then get the chance to pitch on the Muffatwerk’s biggest stage at the end of the day, as they shoot for a chance to win overall. Picking the best of the quartet will doubtless be a tough job, and one we’ve entrusted to Tobias Jahn of BMW i Ventures, David Murray-Hundley of Tech London Advocates Automotive and our own Pioneers Ventures expert Stangl.

Perhaps the final word on pitching should go to Sossna, who was happy to share some advice on what helped get Trillium the thumbs-up from the judges a year ago.

“Focus on the problem that you’re solving, but be mindful of the applicability and the feasibility of what you’re doing,” he suggests. “Tie things into reality by presenting a clear business case for what you’re doing and how you’re doing it. If you have excellent tech and you don’t have the business model that goes with it, then you won’t be able to win. And if you have an excellent business model, but don’t have the tech for it, you won’t be able to win either. You have to marry the business with the technology.”

One last thing: our Match & Meet networking service is now live ahead of Mobility.Pioneers. If you need to get set up to use this great piece of tech, read on!

First head here and log in, using the same email address that you used to buy your ticket for Mobility.Pioneers. The next step is to check out the agenda and then fill out the slots in which you’ll be free for meetings. Then, if you haven’t previously filled out your match-making preferences – whom you’d like to meet, in other words – please do so.

Your personalised meeting schedule will be ready for you on February 6th, two days before the start of Mobility.Pioneers. It will also be sent in the form of Google Calendar or Outlook invites. Look out, too, for the PioBot link we’ll send out the night before Mobility.Pioneers. This is our on-event chatbot assistant, which is now even smarter at handling and redirecting queries. The latest iteration also has speaker profiles, agenda information and Match & Meet built in, so you’ll have the option to arrange your entire event via Messenger.

Original article: “Mobility.Pioneers Top Startups & Jurors Revealed: Let the Pitching Begin!” by Richard Asher
(https://pioneers.io/blog/post/mobilitypioneers-top-startups-jurors-revealed-let-pitching-begin)

Trillium an “International Success Story” at CyberTech Tel-Aviv 2018

The Trillium team is at Cybertech Tel Aviv 2018 in Israel this week, from the 29th to 31st of January.

Invited as part of the CyberTech Japan – Israel “International Success Story” summit, Trillium president and CEO, David M. Uze joined a panel of business and government influencers set on bringing the two countries closer. A big thank you to both the Japanese and Israeli embassies for arranging this excellent event.

Trillium technology will be on display at the Startup Pavilion during the conference.  To join the list for private demonstrations, kindly contact us at adrian.sossna@trilliumcyber.com

Trilliumsuccess
DavidUzeatCyberTech

Cybertechdisplay

Meet Trillium Secure, Inc. and Infineon Technologies at Automotive World Tokyo, January 17-19

Trillium Secure, Inc. and leading semiconductor chip manufacturer Infineon Technologies are showcasing Automotive Cyber Security solutions at Automotive World in Tokyo, January 17-19th. The joint display follows mutual efforts to develop and deploy security solutions to protect Connected and Autonomous Cars from hacker attacks.
At Infineon’s Booth No.: E55-48 Trillium will demonstrate SecureCAR, its in-vehicle network protection module, running on Infineon’s next generation Aurix platform.  The demonstration will show both hardware (HSM) and software enhanced protection for CAN FD in-vehicle network communication.
To schedule an appointment and private demo, please contact Yukihiro.Yamamoto@trillium.co.jp.
Infineon & Trillium

 

Trillium at CYBER SECURE CAR JAPAN, September 26-27th in Tokyo, Japan

On September 26 and 27th Trillium participated in the first ever CYBER SECURE CAR Event in Japan, held in Shinjuku, Tokyo. Apart from moderating and presenting at the conference, Trillium provided demonstrations of the SecureCAR SDK and BrainBOX automotive cyber security development platform.

A special thank you to all our customers and partners that came by our booth!

trilliumsec2

sec4

trilliumSec

trillium_at_cybersec

trillium_at_cybersec_ceAc4

 

A Vision for Safety 2.0: Automotive Cybersecurity

Autonomous vehicles are here today, and unbeknownst to many, they are already on public roads, test driving next to unsuspecting traffic – this is done before proper legislation to protect innocent bystanders is put into place.

This reality is one that causes great concern among the few who are aware of it. There is almost no regulation at a local level, and the technology is still very much in the development phase. Even worse, much of the development is conducted on public roads, right alongside human drivers. What will prevent an experiment from turning into an accident, potentially taking lives in the process?

Luckily, you will not have to fear for the safety of public roads much longer. On Tuesday, September 12th, the US National Highway Traffic Safety Administration (NHTSA) administered their updated guidelines on development of Autonomous Drive Systems (ADS). This document helps local governments develop their own regulations, as well as providing businesses developing ADS a clear message of what will and will not be tolerated.

It is no surprise that vehicle cybersecurity is listed as one of the 12 essential safety design elements. Without cybersecurity, a vehicle becomes a hacker’s plaything – allowing them to take complete control of the car, including steering, braking, and acceleration. The possibilities for malicious abuse of autonomous cars are endless, ranging from extortion to remote cyber terrorism. The NHTSA stresses the importance of cybersecurity, stating that entities developing ADS “should insist that their suppliers build into their equipment robust cybersecurity features. Entities should also address cybersecurity, but they should not wait to receive equipment from a supplier before doing so.” The message is clear and urgent; implement cybersecurity at every level, and do it quickly.

Trillium agrees, and we are ready to help suppliers, developers, and OEMs implement these guidelines today. Trillium has partnered with the world’s largest automotive IC vendor, NXP, to provide support for Trillium’s SecureCAR platform on NXP’s next-generation S32K automotive microcontrollers (MCU). Our modular, multilayered approach also allows for developers of ADS technology to add cybersecurity directly onto their existing hardware today – without requiring costly changes to their underlying systems.

It is essential that the industry adopts these guidelines quickly and immediately, especially as autonomous vehicles are deployed on an increasingly larger scale. As connectivity and reliance on machine learning increase, so will the damage hackers can cause. Autonomous cars are set to shift the entire transportation landscape, with companies rolling out entire fleets within the next ten years. One rogue autonomous car is a hazard, an army of hacker-controlled vehicles is an avoidable, unnatural disaster.

Trillium in the Media: Response.jp interview with Yukihiro Yamamoto

Click the link below to read an interview with Yukihiro Yamamoto, Senior Director of Business Development & Operations at Trillium Japan about our take on Automotive Cyber Security! (Japanese language only)

https://response.jp/article/2017/08/17/298656.html

Ahead of the Curve: UK Government to Pioneer Automotive Cybersecurity Legislation

Throughout history, governments have played a huge part in the development of technologies and their uses, often stepping in to ensure quality of use, safety, and standardization of industry best practices.

Whenever technology impacts society on a large scale, the potential negative consequences need to be considered alongside the benefits, and when it comes to connected cars, the biggest of these threats is undoubtedly cyber terrorism. With the age of self-driving cars and smart cities just over the horizon, government legislation is transforming our connected future from mere theory into reality.

Earlier in August, the United Kingdom published their “Principles of cyber security for connected and automated vehicles,” a set of guidelines detailing the necessities of connected and automated vehicles in the future. Such direct legislation is clear indication of the seriousness of the matter of automotive cyber security. What has long been simply the work of fiction and research is quickly become a potential threat to the connected car landscape, and having governments recognize it as such is the first step in creating a safer IoT driven world. Without such official recognition, the gravity of this threat is likely to be lost on the public until it is too late – that is, when an automotive cyber-terrorist attack has already taken place.

Of the many detailed guidelines laid out in the list of principles, two key points must be given special attention:

  1. Principle 3.1
    1. Organizations plan for how to maintain security over the lifetime of their systems, including any necessary after-sales support services.
  2. Principle 5.1
    1. The security of the system does not rely on single points of failure, security by obscuration or anything which cannot be readily changed, should it be compromised.

The first of these principles presents a clear message – for any system to be fully secure, it must be maintainable for the duration of its lifetime. Patching of exposed exploits and/or other threats is a necessity, as cyber security is an ever-evolving field in which a static defense system has no place. This same sentiment is echoed in Trillium’s philosophy, as part of our multi-layered SecureIOT platform is our SecureOTA and SecureSKYE systems, that enable an over-the-air update system designed from the ground up expressly for use in an automotive environment.

The second principle quoted is just as, if not more important than the first. The emphasis in this message is that no system is safe if its defense is concentrated on a single point of failure – multiple layers of security are necessary. In accepting the reality that no single security system alone is impregnable, the only solution therefore is to provide multiple systems under a single ecosystem. This message is the core of Trillium’s philosophy, the conviction that security done right has not one layer of protection, but multiple layers.

The United Kingdom’s foresight to develop such legislation pre-emptively is an example to be followed, and we hope to see more countries follow suit as this issue reaches more of the public.

Trillium Inc named to Gartner’s Cool Vendors in Security for Technology and Service Providers, 2017

TOKYO, June 23, 2017 – (ACN Newswire) – Trillium Inc, a leading provider of IoT automotive cyber security solutions, has announced it was named as one of Gartner’s “Cool Vendors in Security for Technology and Service Providers, 2017”, a report by Ruggero Contu, Lawrence Pingree, Deborah Kish and Dale Gardner of Gartner Inc (Published: 4 May, 2017).

“It is a unique honour to be named a Gartner Cool Vendor 2017,” said David Uze, President and CEO of Trillium Inc. “As a designer and provider of multilayer, adaptive and custom Cyber-security systems, we are on a mission to solve the biggest threat facing society due to the roll out of autonomous driving vehicles: car hacking.”

Gartner’s Cool Vendor Reports aim to identify companies with the potential to bring about paradigm shifts that stand out because they offer some disruptive capability or opportunity. Trillium Inc was named a Cool Vendor 2017 because, as the report says, it is “pioneering new directions and potential opportunities in the security market.”

The information provided in the report is of value to all technology and service providers looking to partner with providers of innovative security solutions.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Trillium Inc is a designer and provider of custom, multilayer adaptive Cyber-systems, specialising in vehicular and transportation applications for the vehicles of today and tomorrow. Founded in 2014, Trillium is led by a team of executives and engineers from Japan, Europe and the U.S. with extensive experience in automotive, cyber security, embedded systems and IoT.

Trillium’s products and services deploy a software-based suite of cybersecurity tools to protect automobiles and IoT connected devices from cyber-attack, around the globe. Trillium is backed by lead investor Global Brain, a Tokyo-based venture capitalist. To learn more, please visit www.trillium.co.jp.

For questions and to arrange executive interviews, contact pr@trillium.co.jp

Least Priority = Most Damage, The Flaw of Underestimating IoT Cyber Security

“While traditional cybersecurity has grabbed the nation’s attention, IoT security has been somewhat under the radar, even for some companies that have a lot to lose through a breach”

These are the words of Stefan Bewley, the Director of strategy consulting firm Altman Vilandrie and Company. The unfortunate truth behind the IoT solutions boom is that not enough companies are taking securing it seriously enough.

The International Business Times published an article Sunday addressing this perilous lack of focus when it comes to the security of the increasingly convenient Internet of Things in the industry sector. Despite the fact that industrial IoT integration is only expected to increase in the coming years, companies are still failing to take precautions against the damage that a cyber breach can cause. What many companies are failing to realize, is that as they continue to develop internet-enabled technologies to further the efficiency of their businesses, the amount of destruction a malicious cyber breach can cause increases in tandem.

Roughly 68 percent of companies recognize that IoT security is a distinct category of security.  However they fall short when it comes to actually allocating resources to properly deal with it, because only 43 percent have independent budgets for it. This negligence has proven disastrous for some businesses, with damages caused by cyber breaches ranging from almost $5 million in smaller firms to nearly $2 billion in larger ones. On a global scale, the stakes of the IoT game are not being taken seriously enough, a thought pattern that is wholly unwise and surely unsustainable in the long term.

Without a holistic approach to security, no IoT can ever truly be secure. Every smart watch, wireless heart monitor and WiFi camera connected to a network becomes a potential entry point for an attacker. The intellectual awakening that the businesses of today need to undergo is, unfortunately, still far-off. Without companies like Trillium are dedicated to spreading awareness ofthe need for security in any IoT setting, be it business or personal, IoT development is just a figurative time bomb that grows larger every year. Until the world moves on from traditional IT security and embraces the coming IoT revolution, we may as well be trying to lock a gate with a safety pin.