Skip to main content

Connected car data – both opportunities and challenges for auto OEMs, says KPMG

Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new KPMG report, Your Connected Car is Talking: Who's Listening? KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a
November 14, 2016 Read time: 2 mins
Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new 1981 KPMG report, Your Connected Car is Talking: Who's Listening?

KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a lasting impact on brand.

"Unlike most consumer products, a vehicle breach can be life-threatening, especially if the vehicle is driving at highway speeds and a hacker gains control of the car," says Silberg. "That is a very scary, but possible scenario and it's easy to see why consumers are so sensitive about cyber-security as it relates to their cars."

In a separate recent report, KPMG research of 450 consumers found that 82 per cent would be wary of buying a car from an automaker if they had been hacked. Despite the strong sentiments among consumers about hacking, that same report also found that two-thirds of automakers hadn't invested in information security over the past year.

"The newest asset in the automotive world is data," said Danny Le, KPMG's automotive leader for Cyber Security Services. "Data is becoming a currency with actual value and must be protected. A failure to do so could have long term consequences for automakers."  

KPMG suggests 10 initiatives for automakers to consider when trying to balance the potential business opportunities while recognising the risks associated with mishandled or compromised information. These include embedding security and privacy at the earliest phases of product and software development and including cyber-security in enterprise-wide risk governance. They also suggest focusing on not just on the data but also on the entire network, preparing for emerging security risks, encryption of  information coming into the master computer and testing vulnerabilities, among others.

For more information on companies in this article

Related Content

  • Trust AI – it knows more than we do
    January 14, 2020
    There’s no shortage of data – but making the most of it is the problem. Andrew Bunn examines how AI will be able to support and influence the development of advanced transportation strategies
  • Caltrans trials Xerox’s Passenger Detection System
    October 30, 2015
    Xerox’s Passenger Detection System has been trialled in California and compared with the state’s team of human counters giving some interesting results, as Colin Sowman discovers. Like others adopting high-occupancy and high-occupancy vehicle (HOV) lanes for congestion management, Caltrans has faced challenges with compliance in what has been effectively an ‘honour system’ with drivers trusted to set their tags correctly or comply with the multi-passenger requirement.
  • Jason Morrison, Daktronics: 'We test our products to complete failure'
    April 27, 2023
    Jason Morrison, Daktronics ITS, parking & public transport market manager, explains how ITS products can mitigate the effects of climate change – and why they must be tested in the harshest conditions
  • GIS-based state of the art emergency response, damage recovery
    January 26, 2012
    The gecko is one of several members of the lizard family which demonstrate autotomy: the ability to re-grow a tail or some other appendage lost during a time of peril. The GITA's GECCo programme is looking to give US infrastructures much the same capability