Speakers

David Mor Ofek

Head of Product, C2A Security

Zhe Ouyang

Director, Cybersecurity Product Line, ThunderSoft

Dvir Reznik

VP Marketing, C2A Security

About The Webinar

Replay Available: Unmasking Global Regulations – 30 October, 2023.

Complete the form at the top to access the webinar.

In today’s rapidly evolving automotive landscape, cybersecurity and privacy have emerged as a paramount concern. The growing interconnectivity and reliance on software in our connected and electric vehicles have exposed the automotive industry and its ecosystem to unprecedented cybersecurity risks. As in many other technology sectors, industry bodies and Governments have adopted an ‘innovate now, regulate later’ approach to allow an industry to develop quickly – and that ‘regulate later’ is coming faster than ever, adding to the confusion.

In this free webinar by C2A Security and ThunderSoft, our experts speakers will delve into the complex regulatory frameworks governing automotive cybersecurity in three major markets: the US, Europe, and China. 

The US has established a comprehensive set of guidelines, including the ISO/SAE 21434, ISO/SAE26262, and SAE J-3061. Meanwhile, the EU has introduced stricter regulations like the General Data Protection Regulation (GDPR) and the Cybersecurity Act, shaping cybersecurity standards and fostering cross-border cooperation.

China’s regulatory approach is characterized by its dynamic Cybersecurity Law, which aims to safeguard national security and data privacy while promoting innovation and technological development within the automotive sector.

Moderated by Dvir Reznik, VP Marketing at C2A Security, attendees will gain insights, tools, and best practices into compliance requirements, cybersecurity standards, data protection laws, and the role of governmental bodies in shaping automotive cybersecurity policies.

Meet our speakers:

David Mor Ofek is the Head of Product at C2A Security, the only risk-driven DevSecOps Platform vendor that addresses the specific needs of car makers and mobility companies.

David has an extensive background in software engineering, which has helped him develop cutting-edge solutions that ensure the security of connected, autonomous, and electric vehicles. Before C2A Security, David worked as a Chief Automotive Security Architect for HARMAN International and as an engineer at Cisco for over 10 years.

David holds a bachelor’s degree in computer science from the Hebrew University in Jerusalem, and is recognized as a thought leader in automotive cybersecurity.

Zhe Ouyang is Director of Advanced Product Planning Department and Product Lead of Cybersecurity Product Line at ThunderSoft Automotive. Currently leading enabling new and existing products with advanced automotive technologies in cybersecurity and cloud native. His works included cybersecurity, vehicle OS, vehicle-cloud SOA framework, TSP and V2X.

WATCH WEBINAR

Watch Now

Speaker Profile

Geoffrey Mann

Senior Physical Threat Analyst

Health-ISAC

Speaker Profile

John Auld

CRO

C2A Security

John Auld serves as Chief Revenue Officer at C2A Security, where he leads the company’s expansion into healthcare following the strategic acquisition of Vigilant Ops. With 20 years of experience bringing together complementary technologies across regulated industries, John specializes in helping manufacturers turn cybersecurity from a compliance burden into a competitive advantage. A mechanical engineer by training with deep expertise in product lifecycle management, John champions Dynamic Risk Management as the bridge between component visibility and actionable intelligence. His mission: enable medical device manufacturers to innovate safely without sacrificing speed or patient safety.

Speaker Profile

Ken Zalevsky

VP and GM, Medical Technology

C2A Security

Ken Zalevsky brings over 20 years of medical device cybersecurity experience to his role at C2A Security, where he serves as VP and GM, Medical Technology, following the acquisition of Vigilant Ops in October 2025. A former Bayer executive, Ken founded Vigilant Ops in 2019 after witnessing the consequences of inadequate technical preparation in the healthcare industry. He is an active contributor to CISA’s SBOM working groups and a frequent speaker on software supply chain security. Ken’s mission: transform SBOM from a compliance checkbox into operational intelligence that keeps patients safe while streamlining regulatory processes.