Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled
Using your personal data 

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

Lessons Learned from Jim Farley’s F-150 Lightening Road Trip: Implications for the EV Industry

  • Category: Connected Vehicles, Cybersecurity Regulation
  • August 20, 2023
Learn about the challenges faced by Ford CEO Jim Farley during a road trip in the electric F-150 Lightning. Explore the importance of cybersecurity regulations and the role they play in the electric vehicle (EV) industry.

The 626 Mile Road Trip

Ford CEO, Jim Farley, alongside several Ford employees, embarked on a journey from Silicon Valley to Las Vegas in the all-electric F-150 Lightning. This trip provided Jim with a firsthand experience of the challenges associated with driving an electric truck, particularly when faced with a dwindling battery.

During a stop at a charging station in Coalinga, Farley encountered the reality of slow charging speeds that many EV owners often face. Despite charging his truck for 40 minutes using a low-speed charger, he could only restore the battery to 40 percent.

In a video shared on X, he described the process as “pretty challenging” and underscored the significance of fast charging for an efficient customer experience.

 

Other Potential Key Challenges

Despite the challenges faced by Jim with the charging process during his road trip, there are additional areas of concern that need to be addressed in the EV industry:

Cyber Threats and Security: Cybersecurity measures are crucial for EV manufacturers and charging network providers. The discovery of critical vulnerabilities in ABB’s ChargerSync Platform last month highlights the need for solid processes that ensure system integrity and user data protection.

Regulation and Quality of Service: The UK has implemented comprehensive cybersecurity regulations for EV infrastructure, contributing to an enhanced charging network and seamless customer experience. However, these types of regulations need to become the norm worldwide. Countries should follow the UK’s lead and China’s rapid progress by establishing improved cybersecurity regulations.

 

Turn Security into a Business Value Multiplier

C2A Security provides the only mobility-centric DevSecOps platform designed to optimise your risk management efforts. Our advanced approach to automotive cybersecurity empowers companies to deliver secure products and create new software-based revenue streams while staying compliant and adhering to regulations and standards. Try it out by scheduling a demo today.

More articles that might interest you:

Understanding the IEC 81001-5-1 Interpretation Sheet and Its Impact on Health Software and Medical Device Security

December 10, 2025

Secure by Design

December 3, 2025

David Leichner Joins C2A Security as Chief Marketing Officer

November 18, 2025

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2025 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin

Speaker Profile

Geoffrey Mann

Senior Physical Threat Analyst

Health-ISAC

Speaker Profile

John Auld

CRO

C2A Security

John Auld serves as Chief Revenue Officer at C2A Security, where he leads the company’s expansion into healthcare following the strategic acquisition of Vigilant Ops. With 20 years of experience bringing together complementary technologies across regulated industries, John specializes in helping manufacturers turn cybersecurity from a compliance burden into a competitive advantage. A mechanical engineer by training with deep expertise in product lifecycle management, John champions Dynamic Risk Management as the bridge between component visibility and actionable intelligence. His mission: enable medical device manufacturers to innovate safely without sacrificing speed or patient safety.

Speaker Profile

Ken Zalevsky

VP and GM, Medical Technology

C2A Security

Ken Zalevsky brings over 20 years of medical device cybersecurity experience to his role at C2A Security, where he serves as VP and GM, Medical Technology, following the acquisition of Vigilant Ops in October 2025. A former Bayer executive, Ken founded Vigilant Ops in 2019 after witnessing the consequences of inadequate technical preparation in the healthcare industry. He is an active contributor to CISA’s SBOM working groups and a frequent speaker on software supply chain security. Ken’s mission: transform SBOM from a compliance checkbox into operational intelligence that keeps patients safe while streamlining regulatory processes.

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo