Skip to main content

Connected car data – both opportunities and challenges for auto OEMs, says KPMG

Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new KPMG report, Your Connected Car is Talking: Who's Listening? KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a
November 14, 2016 Read time: 2 mins
Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new 1981 KPMG report, Your Connected Car is Talking: Who's Listening?

KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a lasting impact on brand.

"Unlike most consumer products, a vehicle breach can be life-threatening, especially if the vehicle is driving at highway speeds and a hacker gains control of the car," says Silberg. "That is a very scary, but possible scenario and it's easy to see why consumers are so sensitive about cyber-security as it relates to their cars."

In a separate recent report, KPMG research of 450 consumers found that 82 per cent would be wary of buying a car from an automaker if they had been hacked. Despite the strong sentiments among consumers about hacking, that same report also found that two-thirds of automakers hadn't invested in information security over the past year.

"The newest asset in the automotive world is data," said Danny Le, KPMG's automotive leader for Cyber Security Services. "Data is becoming a currency with actual value and must be protected. A failure to do so could have long term consequences for automakers."  

KPMG suggests 10 initiatives for automakers to consider when trying to balance the potential business opportunities while recognising the risks associated with mishandled or compromised information. These include embedding security and privacy at the earliest phases of product and software development and including cyber-security in enterprise-wide risk governance. They also suggest focusing on not just on the data but also on the entire network, preparing for emerging security risks, encryption of  information coming into the master computer and testing vulnerabilities, among others.

For more information on companies in this article

Related Content

  • New revenue streams from smartphones for European vehicle manufacturers
    March 14, 2012
    According to a study by Frost & Sullivan, vehicle manufacturers (VMs) in Europe and North America have stepped up their game in response to the smartphone threat. Most of them have flooded the market with free apps focusing on areas such as customer relationship management (CRM) and breakdown assistance, while others have created value-added apps such as remote start/stop.
  • TRL: In-vehicle tech is developing – but the driver isn’t
    August 19, 2019
    The evidence base for distracted driving has failed to keep up with technological developments, argue TRL’s Neale Kinnear and Paul Jackson. New research is urgently needed
  • Amey: sustainability ‘crucial’ for future of mobility
    November 14, 2019
    No business conversation over the next 10 years can really be had without talking about sustainability, says infrastructure support company Amey. Speaking at the launch of the firm’s latest white paper at the London Transport Museum this week, managing director of Amey Investments Asif Ghafoor insisted that “it needs to be part of your core DNA in your business decisions and investment decisions”. He explained that the paper addresses issues such as having the right people to deliver infrastructure wh
  • Wave goodbye to cyber security concerns
    June 13, 2016
    Visitor to Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy. Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the backgrou