Dreamforce 2022: Drive New Auto Revenue Through Connected Vehicles

With connected vehicle technology enabling software-activated features and telemetry data-driven services, new revenue streams are emerging.

Together with Salesforces’ Matthew Simpkins and Otonomo’s Anders Truelsen, Giuseppe Serio shares Upstream’s vision on enabling advanced data-driven features and capabilities that support the digital transformation of the Automotive and Smart Mobility ecosystem.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Cybersecurity and compliance in the age of autonomy

As autonomous technologies advance toward Levels 3-4, securing these innovative systems requires a unique product cybersecurity approach.

More Details

Upstream Security and Volta Team Up to Safeguard the Future of Electric Fleets

Ensuring driver safety, vehicle safety, and cybersecurity resilience is a top priority for Volta. We’re thrilled to support this commitment and showcase how our collaboration…

More Details

Podcast by Sonatus: Navigating Cybersecurity Threats in the Automotive Industry

Auto Tech Detroit 2024 highlighted the pressing issue of cybersecurity in the automotive ecosystem. Recorded live during the event, John Heinlein, CMO of Sonatus, had…

More Details

H1’2024 Report: Redefining Automotive & Smart Mobility IoT Cyber Risks

SIM-enabled IoT devices, primarily in the automotive and smart mobility ecosystem, have evolved into critical infrastructure, redefining cyber risks and requiring stakeholders to ensure safety,&hellip

More Details

Watch: Redefining automotive and smart mobility IoT cyber risks

The mobility ecosystem has identified a clear priority in accelerating the adoption of electric vehicles (EVs). However, as the proliferation of EVs deepens, new challenges…

More Details

Securing Identities in the Future of Mobility and Beyond

Discover how a vehicle-centric approach to identity management can revolutionize the automotive industry, enhance user experiences, and protect sensitive data.

More Details
Skip to content