Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

“Ford CEO: It’s Very Difficult for Car Companies to Get Software Right”

  • Category: Research & Trends
  • June 29, 2023
The Fully Charged Podcast, hosted by Robert Llewellyn, is renowned for deep diving into the technological revolution of the automotive industry. The latest episode welcomed Jim Farley, CEO of Ford, discussing the future of the automotive industry with a particular emphasis on electrification and software.

“We have 150 different companies that develop software at Ford”

 

One of the critical discussions circled around the complexity of automotive software:

“It’s so difficult for car companies to get software right. We have about 150 modules across the car, developed by 150 different companies, written in >100 different languages, that don’t talk to one another”, Farley mentions midway through the interview. “And we can’t even understand it all.”

Even though a vehicle might bear a single manufacturer’s name, it’s controlled by modules developed by several different suppliers, each contributing their proprietary software and IP. This decentralized approach, coupled with conflicting programming languages and disparate software structures, basically turns software development, maintenance, and improvements into a nightmare.

With the rise of EVs and the increasing reliance on software, vehicles are now hosting more code than ever before, facilitating an increasing number of automated functions. The shift is from a primarily hardware-based industry to a focus on software, with vehicles no longer limited by hardware or horsepower.

Farley’s enlightening insights underline a significant paradigm shift in the automotive industry, at least at Ford. The company initially approached electrification focusing on the propulsion system, which was fascinating yet limited in scope. But through years of learning and evolution, the focus has now moved beyond propulsion, with significant investment in software: “We’ve decided to completely insource the development of our 2nd Generation EV architecture.”

It’s not just about the vehicle anymore; it’s about the software, providing rich in-vehicle experiences to consumers, building a level of trust around payments and added-value services, which generate new revenue opportunities for car makers.

 

“We’ve decided to completely insource the development of our 2nd Generation EV architecture.”

 

C2A Security is working with global car makers, Tier 1 suppliers as Valeo and Marelli, and even cloud IT players as NTT and Evvo Labs, through the only mobility-centric DevSecOps Platform. The automated solution empowers them to deliver more secure software faster and generate new revenue opportunities through software and services, while adhering to current and emerging regulations and standards.

Watch the full interview below:

More articles that might interest you:
John Chenoweth, Chief Product Security Officer

C2A Security Announces Agreement with Elekta to Enhance Cybersecurity and Global Compliance

May 20, 2025
Industrial Robots at a factory

The Importance of Cybersecurity in Industrial Robotics: Protecting the Smart Manufacturing Floor

May 8, 2025
TISAX Logo

C2A Security Achieves Prestigious TISAX and ISO/IEC 27017:2015 Certifications, Reinforcing Commitment to Cloud Security Best Practices and Trust

May 2, 2025

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2025 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo