Skip to Content
Curve ahead sign
Article

How safe is your car?

June 14, 2017 / 1 min read

Managing cybersecurity threats in today's rapidly changing technology landscape presents no small obstacle for OEMs. Collaboration is critical to identifying, detecting and resolving threats across all stages of production and suppliers.

 It’s imperative automotive companies competing in today’s market leverage information technology to maximize production efficiency while effectively controlling and securing their informational assets, customers’ private data, and more importantly, car safety. The technology landscape is rapidly changing with the introduction of connected car technology, mobile technology, open source development, cloud computing, and more.

There are multiple entry points in a car that need to be secured, from component production to design and assembly.

Managing cybersecurity threats in cars is not a simple task for any OEM. The safety of cars is at stake if risks are not mitigated at all stages of production. There are multiple entry points in a car that need to be secured from component production to design and assembly. In addition to OEMs, a number of third parties, from auto parts suppliers to technology companies, are involved in building a car. Cybersecurity needs to be addressed by each party in collaboration, and at the same level, with OEMs.

Preventing threats

Organizations value and view cybersecurity, risk, and control differently. Some of these differences are related to risk and threat profiles impacting an organization based on factors such as industry, location, product/services, etc. Other differences are related to management’s view of or commitment to security, and some are based on prior security incidents in the industry. Regardless, OEMs, auto parts suppliers, and after-market manufacturers need to evolve their security and control frameworks to meet the changing landscape.

Recognizing threats

It is just a matter of time before cybersecurity threats are realized in cars. Below are some examples of potential threats:

Addressing threats

To address cybersecurity threats in cars, OEMs will need to collaborate with auto suppliers, after-market suppliers, auto dealers, technology companies, and our cybersecurity experts. To assist in defining appropriate security practices or assessing existing control structures, Plante Moran has developed a comprehensive and proven methodology to assist our clients’ obligations to protect the confidentiality, availability, and integrity of their information and IT assets, as well as compliance with various security and privacy regulations. Plante Moran’s “House of Security” framework allows an organization to address cybersecurity from the IT infrastructure to the automobiles.

Related Thinking

Parents and their children smiling and taking a selfie.
July 2, 2024

Cybersecurity for families: 5 ways to help protect children and adults

Article 10 min read
CFO reading an article on their tablet and learning about the importance of privacy and security.
July 2, 2024

Hidden threats: The role of the CFO in privacy and security

Podcast 48 min listen
Two business professionals in casual clothing using a handheld tablet device together while standing.
June 18, 2024

Cybersecurity essentials for franchises: Prevent, respond, comply

Article 7 min read