logo
How AI Is Reinventing Cybersecurity For The Automotive Industry

How AI Is Reinventing Cybersecurity For The Automotive Industry

By Alain Penel, VP of Middle East, CIS & Turkey at Fortinet
Autonomous and electric vehicle uptake is rising across the Middle East, driven by national agendas and a growing push for sustainable mobility. With this rapid growth however comes an urgent need to address cybersecurity at every stage of the automotive value chain.
Artificial Intelligence (AI) is at the heart of this shift; transforming not only how vehicles operate, but also how cyber threats are identified, mitigated, and prevented. From predictive maintenance to driver behaviour analytics, AI is streamlining processes and unlocking efficiencies. But it is also redefining the security perimeter for automotive organisations.
Forces Influencing AI Adoption in Automotive
As the industry evolves, three forces are shaping the current landscape: stricter regulations, rapid AI integration, and a fundamental change in communication infrastructure. Regulations such as the Cyber Resilience Act and NIS2 for example are introducing more granular compliance mandates, especially for sectors handling critical infrastructure.
Meanwhile, AI is accelerating business and individual learning processes. At the network level, the need for faster communication and bandwidth adaptability is giving rise to next-generation connectivity frameworks that can support AI-native systems.
This evolution in infrastructure and intelligence also promotes a significant shift in cybersecurity from reactive to preventive. AI is increasingly being used to analyse threat landscapes and internal vulnerabilities in real-time. This shift enables organisations to prepare for attacks before they happen, leveraging behavioural analytics and high-speed correlation to stay ahead of potential breaches. Hardware acceleration and software development, guided by AI, are now setting the pace for how cybersecurity evolves across the industry.
The Impact of Cybersecurity
Unsurprisingly, automotive enterprises are becoming high-value targets for cybercriminals. Three core factors contribute to this trend; the financial opportunity of holding connected services hostage, the complexity of digital supply chains, and the vast amount of sensitive data being generated.
With every vehicle connected to cloud-based services, a single breach can have wide-ranging brand, operational, and financial repercussions. Moreover, the ecosystem of third-party vendors involved in producing autonomous and electric vehicles significantly expands the attack surface.
The use of digital twins and advanced manufacturing technologies further intensifies the volume of valuable data. This information ranging from user behaviour patterns to proprietary designs is not only attractive to attackers but also becomes a tool for launching future attacks or selling on the dark web.
AI Transformations in the Automotive Supply Chain
AI is also transforming the automotive supply chain. Predictive maintenance for example – as opposed to scheduled or reactive vehicle maintenance, which until now has been the norm – enables companies to forecast part failures, optimise distribution, and reduce warehousing costs. AI can analyse and synthesise so many data streams that this guessing game becomes much more accurate. Not only does this mean more reliable vehicles for the consumer, but it also means that each element of demand can be optimised.
Driver behaviour analysis and in-cabin monitoring systems powered by AI are also enhancing safety, particularly for long-haul truck drivers exposed to risks such as fatigue and theft. These AI-powered innovations are already helping companies reduce operational costs while improving customer satisfaction.
Strengthening security across the supply chain means embedding real-time monitoring, mapping data flows, and building a fast, coordinated response to incidents. The introduction of cyber resilience principles encouraged by regulatory bodies requires organisations to maintain robust and sustainable response mechanisms. AI can help with this.
AI's Role in Automotive Cybersecurity
The future of AI in automotive cybersecurity lies in its ecosystem-wide integration. Multimodal AI models that can process text, images, and design data are already in use.
But the next phase involves combining internal and external intelligence to strengthen risk postures. Synthetic data created specifically to train internal models without exposing real user data is becoming an important asset in speeding up AI development while preserving privacy.
The impact of AI can be summarised as transformative, dual-edged, and adaptable. It is enhancing cybersecurity readiness, being weaponised by attackers, and empowering businesses to evolve quickly in a changing environment.
As the Middle East embraces connected mobility and smart transportation, the conversation must move beyond adopting AI to implementing it securely and intelligently. The road to the future may be autonomous, but its success will hinge on cybersecurity built for adaptability, speed, and scale. 0 0
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Startups Can't Afford to Ignore Cybersecurity: Interview
Startups Can't Afford to Ignore Cybersecurity: Interview

TECHx

timea day ago

  • TECHx

Startups Can't Afford to Ignore Cybersecurity: Interview

Home » Startups » Startups Can't Afford to Ignore Cybersecurity: Interview Fresh off an award win at GISEC North Star 2025, TECHx Media spoke with Vivek Chandran, CEO of RISKNOX Private Limited, for an interview featured in the recent June–July 2025 edition of CodeRED. In this conversation, he explains why cybersecurity has become a survival issue for startups. Size and speed no longer guarantee success. As cyberattacks grow more sophisticated, even early-stage startups are in the crosshairs. Once dismissed as too small to target, they now face the same threats as global enterprises. To understand what's at stake and what emerging businesses should do, Vivek brings a grounded, tactical view of the evolving threat landscape and how startup leaders can survive and thrive in 2025 and beyond. What are the top cybersecurity threats that startups should be most concerned about in 2025 and the coming years? The cybersecurity threat landscape isn't what it was even five years ago, it's evolving constantly. That's the first thing startups need to understand: it's not a static problem. The tools and tactics used by cybercriminals change every few months, if not weeks. If I had to pick the top three threats right now, AI-enabled cyberattacks would top the list. We're seeing a rise in sophisticated attacks powered by artificial intelligence, from deepfake phishing to automated vulnerability scanning and exploitation. These are faster, more adaptive, and harder to detect than traditional threats. Second, and this may surprise some, is human negligence. It's not a 'threat' in the classic sense, but it's often the root cause of security breaches. You can spend millions on tech, but one employee clicking the wrong link can still bring the system down. Humans remain the weakest link. And third, phishing is still a huge problem. It's old-school, but highly effective. Startups are particularly vulnerable because they often lack the infrastructure to detect and respond to social engineering attacks quickly. Phishing doesn't need to be advanced to be dangerous, it just needs to be convincing. How has the cybersecurity landscape changed over the past five years? What trends should startups keep an eye on? The past five years have been transformational. The biggest disruptor has been AI and, again, it's a double-edged sword. AI is helping us build smarter, more efficient cybersecurity tools that automate detection and response. But on the flip side, attackers are using the same AI to supercharge their campaigns. Another major shift is that every new technology introduces new vulnerabilities. AI, blockchain, IoT they all come with their own security challenges. And often, organizations adopt these technologies faster than they can secure them. Finally, governmental and regulatory forces are playing a bigger role. From GDPR to CCPA and now the Cyber Resilience Act, we're seeing a global trend toward mandatory cybersecurity compliance. This is actually a good thing it forces businesses to maintain at least a minimum viable security posture. Should cybersecurity be a legal responsibility for startups, or is that too ambitious at an early stage? In an ideal world, yes, cybersecurity would be a legal responsibility for every business, regardless of size. But in the real world, especially for startups, it's complicated. Startups often don't have the budget or the team to build a full-fledged cybersecurity framework. As a founder myself, I know how tough it is, cybersecurity can feel like a luxury when you're trying to stay afloat. But that doesn't mean startups are off the hook. What I believe and advocate is a shared responsibility model. Cybersecurity shouldn't be one person's job. Everyone, from founders to interns, should be aware of the basic principles of digital safety. Startups may not be able to do everything, but they can start with the basics: secure passwords, multi-factor authentication, data access control, and regular backups. These don't cost much but can go a long way. How do global data regulations like GDPR, CCPA, and the Cyber Resilience Act shape the way startups operate? They're reshaping the mindset and that's crucial. A few years ago, cybersecurity was often viewed as a luxury. Many smaller companies thought, 'Why would anyone target us?' That thinking no longer holds. These regulations are forcing accountability. They're saying: If you're collecting user data, you're responsible for securing it. No exceptions. And that accountability builds trust not just with regulators, but with customers. What these regulations have done is establish a baseline culture of cybersecurity. Even if a company isn't directly under the purview of something like GDPR, they often adopt the practices anyway to future-proof their operations. This is especially important as startups scale globally. Do you believe governments should impose stricter cybersecurity regulations on startups, or offer more support instead? Support first, regulations later. Imposing strict rules too early can backfire. Startups, already stretched thin, might try to find workarounds just to stay in business. What governments should do instead is invest in capacity-building offer grants, training programs, and subsidized tools. Help small businesses adopt best practices without breaking their budgets. Once there's a baseline maturity in the ecosystem, then phase in stricter compliance rules. This layered or phased approach is more sustainable and more effective in the long run. There's talk of a cybersecurity talent shortage. Is it really that hard to find skilled professionals? There's no shortage of interest but there is a gap between certifications and real-world skills. Many candidates have credentials but lack hands-on experience. Startups, in particular, need practical problem-solvers, not just textbook experts. What we need more of are experiential learning platforms, internships, cyber ranges, environments where people can learn by doing. For founders, my advice is to hire based on potential and adaptability. You might not be able to compete with tech giants on salary, but you can offer learning, autonomy, and purpose, which many securities professionals' values just as much. If you could give one piece of cybersecurity advice to every new founder, what would it be? Don't let lack of budget stop you from doing something. There are tons of free and low-cost resources out there from SANS to OWASP to NIST guidelines. You can absolutely build a minimal, but meaningful, cybersecurity foundation even if you're bootstrapping. Treat cybersecurity like any other critical function, your dev team, your HR, your marketing. It's not optional anymore. Even a basic security hygiene culture can drastically reduce your risk. Do you think cybersecurity will eventually be seen as a fundamental utility, as essential as electricity or water? Without a doubt. We already rely on digital infrastructure for everything, finance, healthcare, transportation, energy. If any of these go down due to a cyberattack, the consequences are devastating. Cybersecurity is no longer just about protecting data. It's about protecting lives and national security. We're also seeing how cyber warfare is becoming a central strategy in geopolitical conflicts. So yes, cybersecurity will and should, become a default layer of modern society. It's the new electricity. Invisible, but absolutely essential. Vivek Chandran's message to founders is clear: cybersecurity is a necessity, not a luxury. Startups may face budgetary and staffing constraints, but that's no excuse for ignoring the risks. From AI-driven threats to phishing scams and regulatory pressures, the cyber battlefield is real, and unforgiving. Fortunately, knowledge is power. And as Vivek points out, the tools to get started are already out there, many of them free. For founders in 2025, the goal isn't perfection, it's proactive protection

Fortinet Reveals 2025 OT Cybersecurity Report Findings
Fortinet Reveals 2025 OT Cybersecurity Report Findings

TECHx

time14-07-2025

  • TECHx

Fortinet Reveals 2025 OT Cybersecurity Report Findings

Home » Emerging technologies » Cyber Security » Fortinet Reveals 2025 OT Cybersecurity Report Findings Fortinet® (NASDAQ: FTNT), announced the findings of its global 2025 State of Operational Technology and Cybersecurity Report. The report presents insights into the current state of operational technology (OT) cybersecurity. It also highlights key trends, challenges, and best practices for securing IT and OT environments. According to Fortinet, organizations are showing greater maturity in OT cybersecurity. The assignment of OT risk responsibilities to executive leadership, especially the CISO or CSO, has significantly increased. In 2025, 52% of organizations reported the CISO/CSO now oversees OT security, up from 16% in 2022. 'The seventh installment of the Fortinet State of Operational Technology and Cybersecurity Report shows that organizations are taking OT security more seriously. We see this trend reflected in a notable increase in the assignment of responsibility for OT risk to the C-suite, alongside an uptick in organizations self-reporting increased rates of OT security maturity,' said Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. 'Alongside these trends, we're seeing a decrease in the impact of intrusions in organizations that prioritize OT security. Everyone from the C-suite on down needs to commit to protecting sensitive OT systems and allocating the necessary resources to secure their critical operations.' Fortinet revealed that self-reported OT security maturity is improving. At Level 1 maturity, 26% of organizations have implemented visibility and segmentation, compared to 20% last year. Most organizations now fall under Level 2, involving access and profiling. The company reported a decline in the impact of cyber intrusions. Notably, operational outages that impacted revenue dropped from 52% to 42%. Organizations with higher OT maturity levels are facing fewer attacks or are better prepared to respond to basic threats like phishing. Fortinet also highlighted that adopting cybersecurity best practices, such as cyber hygiene and employee training, has led to a significant reduction in business email compromise. There has also been a notable increase in the use of OT-specific threat intelligence. The report showed that vendor consolidation is a sign of growing cybersecurity maturity. In 2025, 78% of organizations are working with one to four OT vendors, compared to previous years. Fortinet reported that its platform approach resulted in a 93% reduction in cyber incidents and a 7x improvement in setup and triage performance. Key recommendations in the report include: Establish visibility and compensating controls for OT assets. Deploy segmentation aligned with standards like ISA/IEC 62443. Integrate OT into SecOps and incident response plans. Adopt a platform-based security architecture. Use OT-specific, AI-powered threat intelligence. Fortinet's report is based on a global survey of over 550 OT professionals. Respondents came from industries including manufacturing, healthcare, energy, oil and gas, and utilities. Participants were from countries such as the U.S., UK, Germany, India, Japan, and others. Most respondents are actively involved in cybersecurity purchasing decisions or OT operations. Fortinet continues to emphasize the need for executive-level commitment and strategic investment to protect critical OT systems and infrastructure.

Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks
Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks

Zawya

time14-07-2025

  • Zawya

Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks

More than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022, while 95% of organizations report that the C-suite is responsible for OT, up from 41% in 2022 Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced the findings from its global 2025 State of Operational Technology and Cybersecurity Report. The results represent the current state of operational technology (OT) cybersecurity and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In addition to trends and insights impacting OT organizations, the report offers best practices to help IT and OT security teams better secure their cyber-physical systems. 'The seventh installment of the Fortinet State of Operational Technology and Cybersecurity Report shows that organizations are taking OT security more seriously. We see this trend reflected in a notable increase in the assignment of responsibility for OT risk to the C-suite, alongside an uptick in organizations self-reporting increased rates of OT security maturity,' said Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. 'Alongside these trends, we're seeing a decrease in the impact of intrusions in organizations that prioritize OT security. Everyone from the C-suite on down needs to commit to protecting sensitive OT systems and allocating the necessary resources to secure their critical operations.' Key findings from the global survey include: Responsibility for OT security continues to elevate within executive ranks: There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives. As accountability continues to shift into executive leadership, OT security is elevated to a high-profile issue at the board level. The top internal leaders who influence OT cybersecurity decisions are now most likely to be the CISO or CSO by an increasingly wide margin. Now more than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022. For all C-suite roles, this has spiked to 95%. Additionally, the number of organizations intending to move OT cybersecurity under CISO in the next 12 months has increased from 60% to 80% in 2025. OT cybersecurity maturity is affecting the impact of intrusions: Self-reported OT security maturity has made notable progress this year. At the basic Level 1, 26% of organizations report establishing visibility and implementing segmentation, up from 20% in the previous year. The largest number of organizations state their security maturity is at the Level 2 access and profiling phase. The report also found a correlation between maturity and attacks. Those organizations that report being more mature (higher of Levels 0–4) are seeing fewer attacks or indicate that they are better able to handle lower-sophistication tactics, such as phishing. It's worth noting that some tactics, such as advanced persistent threats (APT) and OT malware, are difficult to detect, and less mature organizations may not have the security solutions in place to determine they exist. Overall, although nearly half of organizations experienced impacts, the impact of intrusions on organizations is declining, with a noteworthy reduction in operational outages that impacted revenue, which dropped from 52% to 42%. Adopting cybersecurity best practices is having a positive impact: In addition to the Levels of maturity affecting the impact of intrusions, it appears that adopting best practices such as implementing basic cyber hygiene and better training and awareness are having a real impact, including a significant drop in business email compromise. Other best practices include incorporating threat intelligence, which spiked (49%) since 2024. Additionally, the report saw a significant decrease in the number of OT device vendors, which is a sign of maturity and operational efficiency. More organizations (78%) are now using only one to four OT vendors, which indicates that many of these organizations are consolidating vendors as part of their best practices. Cybersecurity vendor consolidation is also a sign of maturity and corresponds to Fortinet customer experiences with the Fortinet OT Security Platform. Unified networking and security at remote OT sites enhanced visibility and reduced cyber risks, leading to a 93% reduction in cyber incidents vs. a flat network. The simplified Fortinet solutions also led to a 7x improvement in performance through reductions in triage and setup.1 Best Practices Fortinet's global 2025 State of Operational Technology and Cybersecurity Report provides actionable insights for organizations to strengthen their security posture. Organizations can address OT security challenges by adopting the following best practices: Establish visibility and compensating controls for OT assets: Organizations need the ability to see and understand everything that's on their OT networks. Once visibility is established, organizations then need to protect critical devices and ones that may be vulnerable, which requires protective compensating controls that are designed for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent compromise of vulnerable assets. Deploy segmentation: Reducing intrusions requires a hardened OT environment with strong network policy controls at all access points. This kind of defensible OT architecture starts with creating network zones or segments. Standards such as ISA/IEC 62443 specifically call for segmentation to enforce controls between OT and IT networks and between OT systems. Teams should also evaluate the overall complexity of managing a solution and consider the benefits of an integrated or platform-based approach with centralized management capabilities. Integrate OT into security operations (SecOps) and incident response planning: Organizations should be maturing toward IT/OT SecOps. To get there, OT needs to be a specific consideration for SecOps and incident response plans, largely because of some of the distinctions between OT and IT environments, from unique device types to the broader consequences of an OT breach impacting critical operations. One key step in this direction is to have playbooks that include your organization's OT environment. This kind of advanced preparation will foster better collaboration across IT, OT, and production teams to adequately assess cyber and production risks. It can also ensure that the CISO has proper awareness, prioritization, budget, and personnel allocations. Consider a platform approach to your overall security architecture: To address rapidly evolving OT threats and an expanding attack surface, many organizations have assembled a broad array of security solutions from different vendors. This has yielded an overly complex security architecture that inhibits visibility while placing an increased burden on limited security team resources. A platform-based approach to security can help organizations consolidate vendors and simplify their architecture. A robust security platform with specific capabilities for both IT networks and OT environments can provide solution integration for improved security efficacy while enabling centralized management for enhanced efficiency. Integration can also provide a foundation for automated responses to threats. Embrace OT-specific threat intelligence and security services: OT security depends on timely awareness and precise analytical insights about imminent risks. A platform-based security architecture should also apply AI-powered threat intelligence for near-real-time protection against the latest threats, attack variants, and exposures. Organizations should ensure their threat intelligence and content sources include robust, OT-specific information in their feeds and services. Report Overview The Fortinet 2025 State of Operational Technology and Cybersecurity Report is based on data from a global survey of more than 550 OT professionals, conducted by a third-party research company. Survey respondents were from different locations around the world, including Australia, New Zealand, Argentina, Brazil, Canada, Mainland China, Colombia, Denmark, Egypt, France, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Philippines, Poland, Portugal, Singapore, South Africa, South Korea, Spain, Taiwan, Thailand, United Kingdom, and the United States, among others. Respondents represent a range of industries that are heavy users of OT, including: manufacturing, transportation/logistics, healthcare/pharma, oil, gas, and refining, energy/utilities, chemical/petrochemical, and water/wastewater. Most of those surveyed, regardless of title, are deeply involved in cybersecurity purchasing decisions. Many respondents are responsible for operations technology at their organization and/or have reporting responsibility for manufacturing or plant operations. About Fortinet Fortinet (Nasdaq: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere our customers need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. Collaboration with esteemed organizations from both the public and private sectors, including Computer Emergency Response Teams ('CERTS'), government entities, and academia, is a fundamental aspect of Fortinet's commitment to enhance cyber resilience globally. FortiGuard Labs, Fortinet's elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store