Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Issak Davidovich – Creating vehicle cybersecurity standards

By Maria Henriquez
5 mins with Davidovich
December 21, 2020

Meet Issak Davidovich, Vice President of Research and Development at C2A Security. He has more than 16 years experience of leading embedded security teams. He joined C2A Security as Vice President of Research and Development in 2018, leveraging his extensive background in embedded devices and the complexities of automotive cybersecurity solutions on both client and cloud applications.

Davidovich is leading the development efforts of the company's embedded cybersecurity solutions, taking a multi-layered approach to cybersecurity to provide automotive-relevant protection and safety compatibility.

According to Davidovich, the implementation of driver assistance technologies and cybersecurity goes hand-in-hand, and the auto industry is taking its first steps on creating in-vehicle security standards. Here, we talk to him about what this means for automotive cybersecurity.

 

Security magazine: The auto industry is taking its first steps on creating in-vehicle security standards. Can you explain why this is a foundational time for the field of automotive cybersecurity?

Davidovich: In the last few years we’ve seen some significant changes in the automotive industry. There are many new, advanced features that OEMs add to modern vehicles - starting with connectivity. The vehicle is connected, continuing to improve the user experience with technology and expanding advanced safety and monitoring capabilities. These features have a high level of software complexity. Some analysts compare the transition of the automotive industry that is happening now to the transition in the mobile phone industry when the phone became a mobile data center; the vehicle became a data center on wheels. However there is one key difference: the vehicle is a safety device, so software errors and cyber incidents may lead to devastating results.

 Therefore, there is a great need to protect the vehicle against cyber security related incidents. When we come and ask the question, “how can we protect the vehicle against cyberattacks?” the answer is not simple. The automotive supply chain is very complex; the vehicle architectures and components may vary between OEMs and even between car programs within a single OEM.  For example, software of a single Domain Controller Unit may contain software modules from 5-10 different suppliers!

 All of the above lead to the understanding that in order to reduce cybersecurity risks, OEMs and their major suppliers need to define a common standard that the industry can follow.

 

Security magazine: Why is the creation of ISO 21423 significant?

Davidovich: ISO 21434 is the first time that OEMs, Tier-1s , Cyber Security suppliers together established processes that are agreed upon by all parties. The standard describes the processes and conclusions from which the security architect can define the security requirements for the car program (similar to the way that ISO26262 defines safety requirements).

 

Security magazine: What are the largest challenges facing automotive cybersecurity teams?

Davidovich: The largest challenges are:

1. How to control and protect a complex system in which so many parties deliver their software modules.

2. How does the OEM perform fast risk and threat analysis when an incident happens - how can the OEM deduct the actual damage that the cybersecurity incident can cause?

3. How can the OEM protect vehicle components against cyberattacks in a safety environment with low-resource MCUs and increased traffic load?

 

Security magazine: How can the automotive industry address these challenges?

Davidovich: The OEMs will need to own the cybersecurity life cycle of their car programs. In order to do that they will need to adopt modern methods that are tailored to the automotive needs. For example, managing all your software/hardware assets in such a way that the OEM’s security team can get an answer to the question "What ECUs and Networks are at risk due to a publication of a new vulnerability in one software library?" in just a few minutes. The next thing the OEM needs is a method to derive the possible damage and  ACTUAL risk level of this incident. Finally, if needed (actual risk can not be neglected), deploy the specific cybersecurity countermeasure that can protect the vehicle in the case that an incident happens in the field.

KEYWORDS: cyber security risk management vehicle security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 minutes with Waskelis

    5 minutes with Todd Waskelis - Cybersecurity consulting during the pandemic

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More
  • 5 mins with Dmitriy Ayrapetov

    5 minutes with Dmitriy Ayrapetov - K-12 cybersecurity challenges

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing