Skip to main content

Connected car data – both opportunities and challenges for auto OEMs, says KPMG

Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new KPMG report, Your Connected Car is Talking: Who's Listening? KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a
November 14, 2016 Read time: 2 mins
Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new 1981 KPMG report, Your Connected Car is Talking: Who's Listening?

KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a lasting impact on brand.

"Unlike most consumer products, a vehicle breach can be life-threatening, especially if the vehicle is driving at highway speeds and a hacker gains control of the car," says Silberg. "That is a very scary, but possible scenario and it's easy to see why consumers are so sensitive about cyber-security as it relates to their cars."

In a separate recent report, KPMG research of 450 consumers found that 82 per cent would be wary of buying a car from an automaker if they had been hacked. Despite the strong sentiments among consumers about hacking, that same report also found that two-thirds of automakers hadn't invested in information security over the past year.

"The newest asset in the automotive world is data," said Danny Le, KPMG's automotive leader for Cyber Security Services. "Data is becoming a currency with actual value and must be protected. A failure to do so could have long term consequences for automakers."  

KPMG suggests 10 initiatives for automakers to consider when trying to balance the potential business opportunities while recognising the risks associated with mishandled or compromised information. These include embedding security and privacy at the earliest phases of product and software development and including cyber-security in enterprise-wide risk governance. They also suggest focusing on not just on the data but also on the entire network, preparing for emerging security risks, encryption of  information coming into the master computer and testing vulnerabilities, among others.

For more information on companies in this article

Related Content

  • Cyber switching launch enhanced configuration on EV master controller to manage power
    November 22, 2017
    Cyber Switching Electric Vehicle Master Controller (EVMC) has released a direct input product configuration which aims to enhance capability during daytime high-demand/high–turnover charge station applications. It is designed with the intention providing electric vehicle (EV) fleet managers with more options to meet their charging needs while realizing the cost savings from managing power to charging stations. The controller, through the direct input design, can be connected to up to four independent input
  • Red, yellow, green - and WHITE?!
    July 19, 2024
    What on earth is ‘white phase’? Ali Hajbabaie from North Carolina State University tells Adam Hill why red, yellow and green lights may soon no longer be enough at traffic lights
  • Automotive OEMs ‘prefer a hybrid approach to power C-ITS’
    May 25, 2017
    The growing demand for road safety and efficient mobility is driving the adoption of cooperative intelligent transportation solutions (C-ITS) and a key enabler of C-ITS is Vehicle-to-X (V2X) communication, says Frost & Sullivan. It supports the exchange of information between vehicles, infrastructure and other road users, such as pedestrians. Vehicle-to-vehicle (V2V) communication is enabled using 802.11p (DSRC or ITS-G5) or cellular technology. 802.11p is a proven technology; however, it is not future proo
  • Two seconds – the difference between life and death
    October 17, 2016
    Professor Donald Fisher has spent 15 years identifying factors that increase the crash risk of novice and older drivers. His findings highlight the difference between living and dying, Colin Sowman reports.