Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled
Using your personal data 

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

Cybersecurity in a Brave New Automotive World: Roy Fridman on The Netscribes Podcast

  • Category: Research & Trends
  • May 4, 2023

Roy Fridman, CEO of C2A Security, recently joined Siddharth Jaiswal over at The Netscribes Podcast to discuss the shifting landscape of the automotive market and the implications to vehicle product security. Roy highlighted two major industry shifts driving this demand: the move away from hardware-focused automotive development towards software-defined vehicles, and the growth of the electric vehicle (EV) market.

As Roy notes, this shift to software-defined vehicles is causing a seismic change in the industry, with vehicles becoming computers on wheels coupled with a “coding explosion” – as car makers develop hundreds of millions of lines of code to address consumers’ demand. This shift emphasizes the need for greater focus on cybersecurity and new challenges in scaling development.

Fridman stresses that both internal combustion engine (ICE) vehicles and EVs are software defined, requiring a security by design methodology to develop and manage software at scale.

Even so, Roy explains that electric vehicles present three unique security challenges, the most critical of which is that EVs connect directly to the power grid at charging stations. This connection expands the attack surface beyond the vehicle and into critical infrastructure, which warrants even tougher security protocols. Yet despite the obvious security risks EVs pose to the grid, little has been done on the regulatory side, leaving the charging stations operators ‘in the dark’.

After talking about the three unique challenges of EV cybersecurity, Roy shares his thoughts on why the automotive market shouldn’t view security (only) through a threat lens, but rather its potential as a business enabler. He also gives some predictions on how the security ecosystem will evolve, identifying the two main tracks he sees bifurcating the cybersecurity market.

The episode, titled “Decoding cybersecurity for electric and software-defined vehicles,” is a quick, informative 20-minute listen. You can find it here.

More articles that might interest you:

Building Global Trust: How SBOMs Are Transforming Japan’s Automotive Software Supply Chains

October 15, 2025

C2A Security Acquires Vigilant Ops, Creating a Global Market-Leading AI-Powered Product Security Powerhouse, adding Tens of MedTech, Telecom, and Defense Customers

October 9, 2025

60 Healthcare and Medical Device Cybersecurity Risk Statistics for 2025

October 3, 2025

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2025 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin

Speaker Profile

Geoffrey Mann

Senior Physical Threat Analyst

Health-ISAC

Speaker Profile

John Auld

CRO

C2A Security

John Auld serves as Chief Revenue Officer at C2A Security, where he leads the company’s expansion into healthcare following the strategic acquisition of Vigilant Ops. With 20 years of experience bringing together complementary technologies across regulated industries, John specializes in helping manufacturers turn cybersecurity from a compliance burden into a competitive advantage. A mechanical engineer by training with deep expertise in product lifecycle management, John champions Dynamic Risk Management as the bridge between component visibility and actionable intelligence. His mission: enable medical device manufacturers to innovate safely without sacrificing speed or patient safety.

Speaker Profile

Ken Zalevsky

VP and GM, Medical Technology

C2A Security

Ken Zalevsky brings over 20 years of medical device cybersecurity experience to his role at C2A Security, where he serves as VP and GM, Medical Technology, following the acquisition of Vigilant Ops in October 2025. A former Bayer executive, Ken founded Vigilant Ops in 2019 after witnessing the consequences of inadequate technical preparation in the healthcare industry. He is an active contributor to CISA’s SBOM working groups and a frequent speaker on software supply chain security. Ken’s mission: transform SBOM from a compliance checkbox into operational intelligence that keeps patients safe while streamlining regulatory processes.

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo