{"id":55241,"date":"2023-03-21T15:47:37","date_gmt":"2023-03-21T15:47:37","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=55241"},"modified":"2024-03-12T05:42:03","modified_gmt":"2024-03-12T05:42:03","slug":"automotive-new-cybersecurity-frontier","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/","title":{"rendered":"Is cybersecurity the new defining power of future vehicles?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55241\" class=\"elementor elementor-55241\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dce0cd5 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dce0cd5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-775cd94\" data-id=\"775cd94\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f417141 elementor-widget elementor-widget-text-editor\" data-id=\"f417141\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">With vehicles now collecting, accessing, and storing a large volume of data, cybersecurity has become a major focus for the automotive sector<\/span><span data-contrast=\"none\">. <\/span><span data-contrast=\"auto\">In fact, work\u2019s been underway for more than a decade to answer the unique security questions posed by the big auto industry disruptors \u2013 automation, connectivity, and e-mobility.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"none\">As early as\u202f<\/span><a href=\"https:\/\/unece.org\/2011-1\"><span data-contrast=\"none\">2011<\/span><\/a><span data-contrast=\"none\">, manufacturers were working with the <\/span><a href=\"https:\/\/unece.org\/wp29-introduction\"><span data-contrast=\"none\">United Nations Economic Commission for Europe\u202f(UNECE<\/span><\/a><span data-contrast=\"none\">)<\/span> <span data-contrast=\"none\">to develop a regulatory framework to support auto cybersecurity. Incidentally, the security risk received worldwide attention in 2015 when white hat hackers took control of a vehicle over the internet, leading to the\u202f<\/span><a href=\"https:\/\/www.theguardian.com\/business\/2015\/jul\/24\/fiat-chrysler-recall-jeep-hacking\"><span data-contrast=\"none\">recall of 1.4m vehicles<\/span><\/a><span data-contrast=\"none\">, and the industry responded by redoubling its efforts to tackle the issue.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0a52a0 elementor-widget elementor-widget-spacer\" data-id=\"a0a52a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79d787b gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79d787b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-de40057\" data-id=\"de40057\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65a84d9 elementor-widget elementor-widget-spacer\" data-id=\"65a84d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cba9ecd elementor-widget elementor-widget-text-editor\" data-id=\"cba9ecd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW73131947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW73131947 BCX0\">According to the UNECE,\u202f<\/span><\/span><a class=\"Hyperlink SCXW73131947 BCX0\" href=\"https:\/\/unece.org\/sustainable-development\/press\/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll#:~:text=Today%2C%20cars%20contain%20up%20to%20150%20electronic%20control,to%20300%20million%20lines%20of%20code%20by%202030.\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW73131947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span style=\"color: #ffffff;\"><strong><span class=\"NormalTextRun SCXW73131947 BCX0\">cars now con<\/span><span class=\"NormalTextRun SCXW73131947 BCX0\">t<\/span><\/strong><\/span><span class=\"NormalTextRun SCXW73131947 BCX0\"><span style=\"color: #ffffff;\"><strong>ain up to 150 electronic control units<\/strong><\/span><\/span><\/span><\/a><span class=\"TextRun SCXW73131947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW73131947 BCX0\">\u202fand about 100 million lines of\u202f code \u2013 four times more than a fighter jet \u2013 and that\u2019s projected to rise to 300 million lines of code by 2030<\/span><\/span><span class=\"TextRun SCXW73131947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW73131947 BCX0\">.\u00a0<\/span><\/span><span class=\"EOP SCXW73131947 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9dc09d elementor-widget elementor-widget-spacer\" data-id=\"c9dc09d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0ab3329 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0ab3329\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d833b0\" data-id=\"4d833b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbd20b1 elementor-widget elementor-widget-heading\" data-id=\"dbd20b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The new frontier: UN R155 and UN R156 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf66a3 elementor-widget elementor-widget-text-editor\" data-id=\"5cf66a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">To address th<\/span><span data-contrast=\"none\">e growing threat of cyberattacks<\/span><span data-contrast=\"auto\">, <\/span><span data-contrast=\"none\">the UNECE published the first regulations<\/span><span data-contrast=\"auto\"> in January 2021. UN R155 and UN R156, regulations aiming at enhancing the security of current and future car models, were implemented in July 2022 for new type approvals. From July 2024, they\u2019ll become mandatory for all new cars produced across\u202f<\/span><a href=\"https:\/\/unece.org\/sustainable-development\/press\/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll\"><span data-contrast=\"none\">54 countries<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><ol><li data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551500&quot;:3621201,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">UN R155 mandates that vehicles must have a Cybersecurity Management System (CSMS) in place, meaning applying cybersecurity practices and measures across the development process and life-cycle of vehicles. Although no CSMS is currently mandatory for suppliers, they tend to put in place the right processes, assessments and security concepts (e.g. ISO 21434) to comply with regulations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><li data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335551500&quot;:3621201,&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">UN R156 deals with the software update management system (SUMS). It provides all the requirements to achieve a secure software update during the life-cycle of a system.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-850f649 elementor-widget elementor-widget-heading\" data-id=\"850f649\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The players on the new frontier <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ff94c8 elementor-widget elementor-widget-image\" data-id=\"8ff94c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/01\/automotive-cyber-security-players-1.svg\" class=\"attachment-large size-large wp-image-18509\" alt=\"Automotive cyber security players\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87c4b73 elementor-widget elementor-widget-heading\" data-id=\"87c4b73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Three unique cybersecurity challenges facing automotive <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf26bcc elementor-widget elementor-widget-text-editor\" data-id=\"bf26bcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>One-size needs to fit all<br \/><\/strong>Cybersecurity is relatively new to automotive \u2013 it\u2019s been a focus for around ten years, so it\u2019s still work in progress. <span data-contrast=\"auto\">The current major challenge is to standardise the security concepts, to make sure all manufacturers and suppliers use the same. It was a success on the diagnostics feature, prioritised because it\u2019s a crucial security feature. Whether a manufacturer or a supplier wants to implement a diagnostic interface, they will always need to refer to the Unified Diagnostic Service (UDS) standard. &#8216;Unified&#8217; in this context means that it\u2019s an international and not a company-specific standard. The main goal today is to have a standard for all the security relevant features, which is obviously very complex to achieve, as all manufacturers will need to agree on them.<\/span><\/li><li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>An eternal update cycle<br \/><\/strong>An additional challenge comes from the length of the automotive product life-cycle, opposed to the rapid evolution of cyber-threats. Development life-cycles range up to five years, and the average age of a car at scrappage is\u202f<a href=\"https:\/\/www.acea.auto\/figure\/average-age-of-eu-motor-vehicle-fleet-by-vehicle-type\/\"><span data-contrast=\"none\">12 years<\/span><\/a><span data-contrast=\"none\">, therefore an end-to-end lifecycle of more than 15 years to account for. Add on top of that <\/span><span data-contrast=\"auto\">the embedded aspect of the automotive systems. Automotive manufacturers have limited resources and need to limit the cost of a new vehicle, so they can\u2019t always integrate the best security into the systems. When an algorithm or a hardware security is selected, it\u2019s based on international recommendations like NIST or FIPS and commit to providing unbreakable features for at least 10 years. If a security vulnerability is found, or if the algorithms are outdated, they\u2019ll need to be managed via software updates.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>A time of seismic change<br \/><\/strong>With increased connectivity comes greater threats. In the past, hacking events primarily resulted in inconvenience to infotainment users. Now cyber-attacks can impact the safety of drivers, passengers, and other road users. This means cyber protection is now on par with functional safety. On top of that, new transport on-demand or MaaS (Mobility as a Service) models will pose new problems to solve, like the security of payments, billing, and personal data.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:360,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2092b12 elementor-widget elementor-widget-heading\" data-id=\"2092b12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keeping up with innovation with Expleo  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45b3a40 elementor-widget elementor-widget-text-editor\" data-id=\"45b3a40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">In the battle between innovation and cybersecurity, innovation needs to keep winning. Automotive consumers prefer innovative features and are willing to share personal data to take advantage of them. Since market demand still favors innovation, OEMs and tier 1 and 2 suppliers need to keep up with the dynamics of automation and connectivity, or they take the risk of falling behind. But favouring innovation shouldn\u2019t mean accepting the risk of cyber incidents. The focus should be on the integration of innovation, cybersecurity, and functional safety to shape the future of the auto industry.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"none\">We draw skills and experience across engineering and technology \u2013 everything from Banking, Financial Services, and Insurance (BFSI) to automotive engineering \u2013 which means we offer a unique combination of design thinking to our clients that delivers innovation while ensuring safety and security. We also guide our customers to navigate the ever-changing regulatory landscape.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be06987 elementor-widget elementor-widget-spacer\" data-id=\"be06987\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5036d07 gg-container-small gg-expleo-form gg-contact-us-form elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5036d07\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d0afa\" data-id=\"5d0afa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20d1695e elementor-widget elementor-widget-gravity-advanced-cta\" data-id=\"20d1695e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"gravity-advanced-cta.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"gg-advanced-cta\">\r\n            \r\n        <span class=\"gg-advanced-cta__heading gg-tagline-heading-left\">\r\n                Let's talk                <\/span>\r\n        \r\n        <h2 class=\"gg-advanced-cta__subheading \">\r\n                <span>To find out more about regulation or to discuss other cybersecurity related services, contact our cybersecurity team.<\/span>                <\/h2>\r\n                <div class=\"gg-advanced-cta__description \">\r\n            <span>Please fill in the form below and we will get in touch with you shortly.<\/span>        <\/div>\r\n                <\/div>\r\n\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17492cd4 gg-button-v4 elementor-widget elementor-widget-form\" data-id=\"17492cd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contact us\" aria-label=\"Contact us\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"55241\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"17492cd4\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Global EN\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-first_name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-first_name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tFirst Name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[first_name]\" id=\"form-field-first_name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"First Name*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-surname elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-surname\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tLast name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[surname]\" id=\"form-field-surname\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Last name*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-phone elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-phone\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tPhone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[phone]\" id=\"form-field-phone\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Phone\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-country elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-country\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCountry\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[country]\" id=\"form-field-country\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Country*\">Country*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Australia\">Australia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Austria\">Austria<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Belgium\">Belgium<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Canada\">Canada<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"China\">China<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Egypt\">Egypt<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"France\">France<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Germany\">Germany<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"India\">India<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Ireland\">Ireland<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Italy\">Italy<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Malaysia\">Malaysia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Mexico\">Mexico<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Morocco\">Morocco<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Netherlands\">Netherlands<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Norway\">Norway<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Portugal\">Portugal<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Romania\">Romania<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Singapore\">Singapore<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"South Africa\">South Africa<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Spain\">Spain<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Sweden\">Sweden<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Switzerland\">Switzerland<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"United Kingdom\">United Kingdom<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"USA\">USA<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Other\">Other<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-company elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-company\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[company]\" id=\"form-field-company\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-reasons elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-reasons\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tDrop down top level reasons\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[reasons]\" id=\"form-field-reasons\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"I am contacting you because:*\">I am contacting you because:*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"I would like to work for Expleo\">I would like to work for Expleo<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"I am interested in the Expleo Services and solutions\">I am interested in the Expleo Services and solutions<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"I would like information on your training and certification\">I would like information on your training and certification<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Other (please specify your request below)\">Other (please specify your request below)<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"3\" placeholder=\"Message\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_gg_req elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_gg_req\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\t* = required fields\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_gg_req]\" id=\"form-field-field_gg_req\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_975cfc3 elementor-col-100 recaptcha_v3-inline\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_975cfc3\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6LcoTCkdAAAAAPXnkuxY7WbPscoClTtSh-SyXLi_\" data-type=\"v3\" data-action=\"Form\" data-badge=\"inline\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-marketing_subscription elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-marketing_subscription\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMarketing email Subscription Opt in\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[marketing_subscription]\" id=\"form-field-marketing_subscription\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\">\n\t\t\t\t<label for=\"form-field-marketing_subscription\">I would like to receive relevant updates from Expleo via e-mail and agree to commercial processing of my data.*<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-gdpr_opt elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-gdpr_opt\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tGDPR Opt In\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[gdpr_opt]\" id=\"form-field-gdpr_opt\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-gdpr_opt\">I accept the <a href=\"#empty-link\"data-href=\"data-protection\/\">Data Protection Policy<\/a>.*<br>You can revoke your privacy consent and stop receiving our updates at any time by notifying us via all known communication channels. For more information <a href=\"#empty-link\"data-href=\"terms-and-conditions\/\">click here<\/a>.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Let's Talk<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The automotive industry takes the issue of cybersecurity very seriously. The unique challenges posed by the four major developments of the sector (automation, connectivity, shared mobility, and alternative fuels) made it necessary to implement strict regulations, so innovation doesn\u2019t come at the expense of security.  <\/p>\n","protected":false},"author":90,"featured_media":60104,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"topic":[144,145],"insights-single-templates":[],"industry-taxonomy":[33],"content-type":[23],"country":[141],"service":[216,209,77],"class_list":["post-55241","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-business-transformation","topic-digital-transformation","industry-taxonomy-automotive","content-type-blog","country-global","service-digital-transformation","service-product-process-engineering","service-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo | Is automotive the new cybersecurity frontier?\u00a0<\/title>\n<meta name=\"description\" content=\"Developments in automotive present challenges. Implementing regulations is required so innovation doesn\u2019t come at the expense of security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is cybersecurity the new defining power of future vehicles?\" \/>\n<meta property=\"og:description\" content=\"Developments in automotive present challenges. Implementing regulations is required so innovation doesn\u2019t come at the expense of security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/\" \/>\n<meta property=\"og:site_name\" content=\"Global EN\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-12T05:42:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/03\/hacker_excerpt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/\",\"name\":\"Expleo | Is automotive the new cybersecurity frontier?\u00a0\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_excerpt.jpg\",\"datePublished\":\"2023-03-21T15:47:37+00:00\",\"dateModified\":\"2024-03-12T05:42:03+00:00\",\"description\":\"Developments in automotive present challenges. Implementing regulations is required so innovation doesn\u2019t come at the expense of security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_excerpt.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_excerpt.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Anonymous computer hacker over abstract digital background. Obscured dark face in mask and hood. Data thief, internet attack, darknet fraud, dangerous viruses and cyber security.; Shutterstock ID 1348055312; purchase_order: Cyber posting; job: ; client: ; other:\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/automotive-new-cybersecurity-frontier\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is cybersecurity the new defining power of future vehicles?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"name\":\"Expleo | EN\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\",\"name\":\"Expleo | EN\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | EN\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo | Is automotive the new cybersecurity frontier?\u00a0","description":"Developments in automotive present challenges. Implementing regulations is required so innovation doesn\u2019t come at the expense of security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/","og_locale":"en_GB","og_type":"article","og_title":"Is cybersecurity the new defining power of future vehicles?","og_description":"Developments in automotive present challenges. Implementing regulations is required so innovation doesn\u2019t come at the expense of security.","og_url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/","og_site_name":"Global EN","article_modified_time":"2024-03-12T05:42:03+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/03\/hacker_excerpt.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/","url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/","name":"Expleo | Is automotive the new cybersecurity frontier?\u00a0","isPartOf":{"@id":"https:\/\/expleo.com\/global\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/03\/hacker_excerpt.jpg","datePublished":"2023-03-21T15:47:37+00:00","dateModified":"2024-03-12T05:42:03+00:00","description":"Developments in automotive present challenges. Implementing regulations is required so innovation doesn\u2019t come at the expense of security.","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/#primaryimage","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/03\/hacker_excerpt.jpg","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/03\/hacker_excerpt.jpg","width":1280,"height":720,"caption":"Anonymous computer hacker over abstract digital background. Obscured dark face in mask and hood. Data thief, internet attack, darknet fraud, dangerous viruses and cyber security.; Shutterstock ID 1348055312; purchase_order: Cyber posting; job: ; client: ; other:"},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/en\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/expleo.com\/global\/en\/insights\/"},{"@type":"ListItem","position":3,"name":"Is cybersecurity the new defining power of future vehicles?"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/en\/#website","url":"https:\/\/expleo.com\/global\/en\/","name":"Expleo | EN","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/en\/#organization","name":"Expleo | EN","url":"https:\/\/expleo.com\/global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | EN"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/fr\/insights\/blog\/automobile-defi-cybersecurite\/\" hreflang=\"fr\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/insights\/blog\/automobilindustrie-neue-grenze-cybersicherheit\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":55241,"url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/automotive-new-cybersecurity-frontier\/","language":"en","default":true},{"blogId":5,"blogIsHidden":false,"postId":30464,"url":"https:\/\/expleo.com\/global\/fr\/insights\/blog\/automobile-defi-cybersecurite\/","language":"fr","default":false},{"blogId":6,"blogIsHidden":false,"postId":26167,"url":"https:\/\/expleo.com\/global\/de\/insights\/blog\/automobilindustrie-neue-grenze-cybersicherheit\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/55241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/users\/90"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/55241\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media\/60104"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media?parent=55241"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/topic?post=55241"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights-single-templates?post=55241"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/industry-taxonomy?post=55241"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/content-type?post=55241"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/country?post=55241"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/service?post=55241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}