Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled
Using your personal data 

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

Automotive Regulations Webinar Recap: “Enough with the Checklist Mentality”

  • Category: Cybersecurity Regulation, Featured Post
  • November 10, 2023

Experts from C2A Security and ThunderSoft discuss the complex and evolving global regulatory environment for automotive cybersecurity on our recent webinar. The US for example, has established a comprehensive set of guidelines, including the ISO/SAE 21434, ISO/SAE 26262, and SAE J-3061. Meanwhile, the EU has introduced stricter regulations like UN WP.29 R155 and R156, the General Data Protection Regulation (GDPR), and the Cybersecurity Act, shaping cybersecurity standards and fostering cross-border cooperation.

Leading experts recently came together to discuss the emerging regulatory environment for automotive cybersecurity. In a webinar hosted by C2A Security and ThunderSoft, moderator Dvir Reznik, VP of Marketing at C2A Security, was joined by speakers David Mor Ofek and Zhe Ouyang.

David Mor Ofek is the Head of Product at C2A Security. He has extensive software engineering expertise from roles at HARMAN and Cisco. Zhe Ouyang is Director of the Advanced Product Planning Department at ThunderSoft, currently leading cybersecurity and cloud-native products.

Moderator Dvir Reznik opened by noting C2A Security’s recent recognition from the European Startup Prize for Mobility. Speaker David Mor Ofek then discussed how vehicles now require sophisticated software security like any other connected system. However, there is a talent gap in the automotive security field. David emphasized that robust cybersecurity is no longer voluntary – regulations globally now demand it. When done properly, cybersecurity efforts can actually accelerate time-to-market since secure products face fewer roadblocks.

A core challenge David identified is moving from a checklist mentality to an integrated risk management approach. Various cybersecurity activities like TARA, SBOM management, and vulnerability monitoring must come together to provide a unified view of risk. Automation is key to managing this complexity efficiently. David also noted that China’s auto cybersecurity regulations mirror Europe’s in many ways, focusing on network and application security along with extensive security testing.

Speaker Zhe Ouyang provided an overview of China’s cybersecurity regulations for intelligent and connected vehicles (ICVs). China initially took an “innovate now, regulate later” stance, but has grown concerned about ICVs posing national security risks. Zhe walked through China’s layered regulatory model spanning laws, standards, licensing, and inspections.

If you’re interested in watching the replay of this insightful webinar, click here to access the link. Hear directly from these experts on the future of automotive cybersecurity regulations worldwide.

Take Your Next Steps With C2A Security

C2A Security provides the only mobility-centric DevSecOps platform. Our advanced approach to automotive cybersecurity empowers companies to deliver secure products and create new software-based revenue streams while staying compliant and adhering to regulations and standards. Schedule a meeting to see how we can help your team.

More articles that might interest you:

The CRA Clock Is Ticking: What Manufacturers Need to Do Now

February 19, 2026

QMSR is Here: From Checklist Compliance to Lifecycle Risk

February 4, 2026

The Convenience Trap: What “WhisperPair” Teaches Us About Product Security

January 28, 2026

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2026 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin

Speaker Profile

Geoffrey Mann

Senior Physical Threat Analyst

Health-ISAC

Speaker Profile

John Auld

CRO

C2A Security

John Auld serves as Chief Revenue Officer at C2A Security, where he leads the company’s expansion into healthcare following the strategic acquisition of Vigilant Ops. With 20 years of experience bringing together complementary technologies across regulated industries, John specializes in helping manufacturers turn cybersecurity from a compliance burden into a competitive advantage. A mechanical engineer by training with deep expertise in product lifecycle management, John champions Dynamic Risk Management as the bridge between component visibility and actionable intelligence. His mission: enable medical device manufacturers to innovate safely without sacrificing speed or patient safety.

Speaker Profile

Ken Zalevsky

VP and GM, Medical Technology

C2A Security

Ken Zalevsky brings over 20 years of medical device cybersecurity experience to his role at C2A Security, where he serves as VP and GM, Medical Technology, following the acquisition of Vigilant Ops in October 2025. A former Bayer executive, Ken founded Vigilant Ops in 2019 after witnessing the consequences of inadequate technical preparation in the healthcare industry. He is an active contributor to CISA’s SBOM working groups and a frequent speaker on software supply chain security. Ken’s mission: transform SBOM from a compliance checkbox into operational intelligence that keeps patients safe while streamlining regulatory processes.

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo