Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled
Using your personal data 

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

October 30 Webinar: Unmasking Global Regulatory Landscape

  • Category: Connected Vehicles, Cybersecurity Regulation, Featured Post
  • October 20, 2023
Join us for this free webinar on Monday, October 30, as we'll break down the different regulations and standards governing automotive cybersecurity across the US, Europe, and China. To accommodate for time zones, we'll have two sessions, morning and evening CET.

Did you miss the webinar? That’s OK – we recorded it (the tech is available.. ;-). Watch it here.

Join us for this free webinar on Monday, October 30, as we’ll break down the different regulations and standards governing automotive cybersecurity across the US, Europe, and China. To accommodate for time zones, we’ll have two sessions:

Morning session: 9am Munich, 10am Tel Aviv, 4pm Beijing

Evening session: 10am Detroit, 4pm Munich, 5pm Tel Aviv.

Understanding the Shift in the Automotive Industry

In collaboration with our Chinese partner ThunderSoft, the webinar will offer crucial insights into the global regulatory shifts and their implications for your company.

The US for example, has established a comprehensive set of guidelines, including the ISO/SAE 21434, ISO/SAE26262, and SAE J-3061. Meanwhile, the EU has introduced stricter regulations like UNECE WP.29 R155 and R156, the General Data Protection Regulation (GDPR), and the Cybersecurity Act, shaping cybersecurity standards and fostering cross-border cooperation.

China’s regulatory approach is characterized by its dynamic Cybersecurity Law, which aims to safeguard national security and data privacy while promoting innovation and technological development within the automotive sector.

What You Will Gain

The webinar will equip you with a thorough understanding of the nuanced requirements of car makers, mobility companies, EV suppliers, and others, in compliance with these regulations. You’ll gain insights into the efficient understanding and implementation of cybersecurity standards and best practices.

Register today:

Morning session: 9am Munich, 10am Tel Aviv, 4pm Beijing

Evening session: 10am Detroit, 4pm Munich, 5pm Tel Aviv.

Meet Our Speakers

David Mor Ofek is the Head of Product at C2A Security, the only mobility-centric DevSecOps Platform vendor that addresses the specific needs of car makers and mobility companies. David has an extensive background in software engineering, which has helped him develop cutting-edge solutions that ensure the security of connected, autonomous, and electric vehicles. Before C2A Security, David worked as a Chief Automotive Security Architect for HARMAN International and as an engineer at Cisco for over 10 years. David holds a bachelor’s degree in computer science from the Hebrew University in Jerusalem, and is recognized as a thought leader in automotive cybersecurity.

Ouyang Zhe is Director of Advanced Product Planning Department and Product Lead of Cybersecurity Product Line at ThunderSoft Automotive. Currently leading enabling new and existing products with advanced automotive technologies in cybersecurity and cloud native. His works included cybersecurity, vehicle OS, vehicle-cloud SOA framework, TSP and V2X.

Dvir Reznik (moderator) leads the marketing team at C2A Security. A genuine petrol-head with a soft spot for industry-disrupting innovation, Dvir is a seasoned marketing leader with hands-on experience, that scaled software products and solutions to global markets while increasing sales pipeline and brand awareness. Before joining C2A Security, Dvir was VP Marketing at NoTraffic, and spent 5 years at automotive Tier 1 supplier HARMAN International (a Samsung company), through its acquisition of TowerSec Automotive Cybersecurity. 

Can’t attend live? Last minute conf-call?

That’s OK, we’ve all been there. Register anyhow, and we’ll share the slides and recording of the webinar shortly after. Register today:

Morning session: 9am Munich, 10am Tel Aviv, 4pm Beijing

Evening session: 10am Detroit, 4pm Munich, 5pm Tel Aviv.

Although understanding the automotive cybersecurity regulatory landscape can seem daunting, with the right knowledge and insights, you can confidently face these challenges. We invite you to register now for this free webinar to gain a comprehensive exploration of the global regulations shaping automotive cybersecurity.

More articles that might interest you:

The Convenience Trap: What “WhisperPair” Teaches Us About Product Security

January 28, 2026

Can an Indirect Vulnerability Still Be High Risk?

January 22, 2026

From SBOMs to Defensible Decisions: Risk Based Prioritization in Medical Devices

January 13, 2026

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2026 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin

Speaker Profile

Geoffrey Mann

Senior Physical Threat Analyst

Health-ISAC

Speaker Profile

John Auld

CRO

C2A Security

John Auld serves as Chief Revenue Officer at C2A Security, where he leads the company’s expansion into healthcare following the strategic acquisition of Vigilant Ops. With 20 years of experience bringing together complementary technologies across regulated industries, John specializes in helping manufacturers turn cybersecurity from a compliance burden into a competitive advantage. A mechanical engineer by training with deep expertise in product lifecycle management, John champions Dynamic Risk Management as the bridge between component visibility and actionable intelligence. His mission: enable medical device manufacturers to innovate safely without sacrificing speed or patient safety.

Speaker Profile

Ken Zalevsky

VP and GM, Medical Technology

C2A Security

Ken Zalevsky brings over 20 years of medical device cybersecurity experience to his role at C2A Security, where he serves as VP and GM, Medical Technology, following the acquisition of Vigilant Ops in October 2025. A former Bayer executive, Ken founded Vigilant Ops in 2019 after witnessing the consequences of inadequate technical preparation in the healthcare industry. He is an active contributor to CISA’s SBOM working groups and a frequent speaker on software supply chain security. Ken’s mission: transform SBOM from a compliance checkbox into operational intelligence that keeps patients safe while streamlining regulatory processes.

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo