Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

Cybersecurity in a Brave New Automotive World: Roy Fridman on The Netscribes Podcast

  • Category: Research & Trends
  • May 4, 2023

Roy Fridman, CEO of C2A Security, recently joined Siddharth Jaiswal over at The Netscribes Podcast to discuss the shifting landscape of the automotive market and the implications to vehicle product security. Roy highlighted two major industry shifts driving this demand: the move away from hardware-focused automotive development towards software-defined vehicles, and the growth of the electric vehicle (EV) market.

As Roy notes, this shift to software-defined vehicles is causing a seismic change in the industry, with vehicles becoming computers on wheels coupled with a “coding explosion” – as car makers develop hundreds of millions of lines of code to address consumers’ demand. This shift emphasizes the need for greater focus on cybersecurity and new challenges in scaling development.

Fridman stresses that both internal combustion engine (ICE) vehicles and EVs are software defined, requiring a security by design methodology to develop and manage software at scale.

Even so, Roy explains that electric vehicles present three unique security challenges, the most critical of which is that EVs connect directly to the power grid at charging stations. This connection expands the attack surface beyond the vehicle and into critical infrastructure, which warrants even tougher security protocols. Yet despite the obvious security risks EVs pose to the grid, little has been done on the regulatory side, leaving the charging stations operators ‘in the dark’.

After talking about the three unique challenges of EV cybersecurity, Roy shares his thoughts on why the automotive market shouldn’t view security (only) through a threat lens, but rather its potential as a business enabler. He also gives some predictions on how the security ecosystem will evolve, identifying the two main tracks he sees bifurcating the cybersecurity market.

The episode, titled “Decoding cybersecurity for electric and software-defined vehicles,” is a quick, informative 20-minute listen. You can find it here.

More articles that might interest you:
Source: Power-generating windmill turbines and electricity pylons are pictured during sunrise at a wind park in Avesnes-le-Sec, France, September 8, 2023. REUTERS, Pascal Rossignol

Securing Solar Infrastructure: Managing Cybersecurity Risks in Renewable Energy 

June 10, 2025
John Chenoweth, Chief Product Security Officer

C2A Security Announces Agreement with Elekta to Enhance Cybersecurity and Global Compliance

May 20, 2025
European Commission Regulation: The EU Radio Equipment Directive (RED)

What Manufacturers Need to Know About the New Cybersecurity Requirements for RED

May 15, 2025

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2025 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo