Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • English
    • 简体中文
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • English
    • 简体中文

Cybersecurity in a Brave New Automotive World: Roy Fridman on The Netscribes Podcast

  • Category: Research & Trends
  • May 4, 2023

Roy Fridman, CEO of C2A Security, recently joined Siddharth Jaiswal over at The Netscribes Podcast to discuss the shifting landscape of the automotive market and the implications to vehicle product security. Roy highlighted two major industry shifts driving this demand: the move away from hardware-focused automotive development towards software-defined vehicles, and the growth of the electric vehicle (EV) market.

As Roy notes, this shift to software-defined vehicles is causing a seismic change in the industry, with vehicles becoming computers on wheels coupled with a “coding explosion” – as car makers develop hundreds of millions of lines of code to address consumers’ demand. This shift emphasizes the need for greater focus on cybersecurity and new challenges in scaling development.

Fridman stresses that both internal combustion engine (ICE) vehicles and EVs are software defined, requiring a security by design methodology to develop and manage software at scale.

Even so, Roy explains that electric vehicles present three unique security challenges, the most critical of which is that EVs connect directly to the power grid at charging stations. This connection expands the attack surface beyond the vehicle and into critical infrastructure, which warrants even tougher security protocols. Yet despite the obvious security risks EVs pose to the grid, little has been done on the regulatory side, leaving the charging stations operators ‘in the dark’.

After talking about the three unique challenges of EV cybersecurity, Roy shares his thoughts on why the automotive market shouldn’t view security (only) through a threat lens, but rather its potential as a business enabler. He also gives some predictions on how the security ecosystem will evolve, identifying the two main tracks he sees bifurcating the cybersecurity market.

The episode, titled “Decoding cybersecurity for electric and software-defined vehicles,” is a quick, informative 20-minute listen. You can find it here.

More articles that might interest you:
US House Committee Hearing: End the Typhoons. March 5, 2025 (Source: YouTube)

High Voltage: Strengthening U.S. Cyber Defenses Against Battery Energy Storage System (BESS) Threats

April 21, 2025

8 Essential Keynote Sessions You Must Attend at the RSA 2025 Conference

April 17, 2025
CVE Logo

Is the MITRE / CVE Program in Jeopardy? Understanding the Fallout and What Comes Next

April 16, 2025

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2025 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • English
    • 简体中文
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • English
    • 简体中文