The development of the first electric vehicle in 1832 has since given way to an ecosystem nobody at the time could anticipate. Though consumer demand is set to soar in the coming years, with 30 million EVs expected to take to roads in the EU alone, challenges have surfaced at every point in the supply chain. A lack of raw materials is causing battery shortage, manufacturing constraints result in slow delivery to consumers, while the U.S. may need to increase the supply of EV charging by as much as 20 times to effectively meet demand.
With new standards and regulations at play, security teams are abandoning outdated practices and implementing a more methodical, systematic approach to cybersecurity across all organizations. Following our review of ISO 21434 and WP.29 R155 Regulation, C2A Security reviews industry best practice, and how these can be seamlessly adopted across the automotive supply chain.
A report by C2A Security assessed the state of the automotive industry in its journey to ISO 21434 implementation, and the current approach to cybersecurity lifecycle management. As the industry shifts, huge gaps in security posture and protocol form — but so does huge opportunity.
Automotive Cybersecurity professionals have had to cope with a seismic shift to increasingly complex vehicle architecture, all while balancing compliance with new ISO 21434 standards and WP.29 R155 regulation. C2A Security dives into each area to provide security professionals with the ultimate guide to standards and regulations.
Building attack trees for scale is a difficult task – C2A Security Director of Product, David Mor Ofek provides a blueprint for security assessors that allow attack trees to grow with your model.
By requiring makers and suppliers to ensure cybersecurity compliance in all new vehicles, WP.29 and ISO/SAE 21434 drive scaling security capabilities across the supply chain.
An orchestra without a conductor can only get so far — same goes for automotive cybersecurity. Orchestrating cybersecurity management is the next step toward comprehensive cyber-protection for the entire vehicle lifecycle.
Risk assessments are an example of a core activity we should always strive to improve and perform faster and more effectively. How long does the typical risk assessment process take?