Page 116 - Cyber Defense eMagazine for September 2020
P. 116
architecture or networks within the vehicle. Take network perimeter security as an example: perimeter
components are vulnerable to remote cyber attacks, meaning there are too many potential weak spots
residing in the network. Sometimes, there is no isolation between those perimeter networks to inner
safety systems at all - making fraught networks, with many potential weak spots, even more vulnerable
to attack. Therefore, OEMs need to apply additional layers to enhance security. A scalable, tailored, and
visible cybersecurity lifecycle management solution that overlays existing solutions will address all of
these needs seamlessly, creating optimal security for the vehicle and a cost-effective, streamlined
approach for each OEM.
Visibility enables OEMs and Tier 1s to customize their approach to cybersecurity
A transparent cybersecurity lifecycle management platform will give the automotive industry the visibility
required to perfect cybersecurity posture and achieve their cybersecurity and safety goals. This visibility-
first approach means that all OEMs and Tier 1s can practically address cybersecurity requirements of
each individual vehicle at scale, regardless of make or model, streamline communication across the
supply chain, and reduce the overall cost of cybersecurity per vehicle.
Visibility means security by design customised to the industry and its unique needs. While one OEM can’t
own their entire supply chain, they can now own all communications across it and prioritise cybersecurity
management throughout the vehicle lifecycle. OEMs will be able to orchestrate change and update
security across all different car variants, quickly and effectively. The result will be cost-effective
cybersecurity for every make, model and individual vehicle, even as cars and trucks become more
connected and complex.
Cyber Defense eMagazine – September 2020 Edition 116
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.

