{"id":31830,"date":"2026-04-10T10:15:00","date_gmt":"2026-04-10T09:15:00","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=31830"},"modified":"2026-04-09T17:49:16","modified_gmt":"2026-04-09T16:49:16","slug":"automotive-cybersecurity-and-the-confidence-to-transform","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/","title":{"rendered":"Automotive cybersecurity and the confidence to transform"},"content":{"rendered":"\n<p><strong>As vehicles, production systems and supply chains become more interconnected, the Bodo Philipp details why cybersecurity is now central to operational resilience, and the need to embed it across engineering, manufacturing and organisational culture to enable confident, secure transformation.<\/strong><\/p>\n\n\n\n<p>The automotive industry has been talking about digital transformation for years, but the reality we\u2019re living through now has taken things to a different level. A modern car contains layer upon layer of software. Plants run on networks of sensors and controllers that rarely sleep. And suppliers \u2014 hundreds of them, in some cases \u2014 exchange data constantly just to keep programmes on track. It\u2019s a remarkable system when you stand back and look at it. But as system functions become more integrated and software-driven, the more obvious it becomes how fragile it can be.<\/p>\n\n\n\n<p>In the UK,\u00a0<a href=\"https:\/\/www.gov.uk\/government\/publications\/independent-research-on-the-economic-impact-of-cyber-attacks-on-the-uk\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>independent research<\/strong><\/a>\u00a0commissioned by the Department for Science, Innovation and Technology estimates the average cost of a significant cyber attack on a business is almost \u00a3195,000, and that when you scale this across the economy, the annual bill comes to around \u00a314.7 billion (roughly 0.5% of UK GDP). Combined with the fact that the UK is now the most targeted country in Europe for cyber attacks, and a series of high-profile incidents across manufacturing and the automotive sector, it\u2019s clear the economic impact is no longer abstract.<\/p>\n\n\n\n<p>The message is clear. The industry\u2019s digital backbone has become critical to its ability to operate, compete, and comply with regulation. That means building cybersecurity directly into engineering practice, using the same rigour that underpins the sector\u2019s approach to safety and quality, is fast becoming essential. And that shift in focus on cybersecurity is increasingly driven by the reality that deeper integration bring both greater capability and greater exposure. And this is already beginning to reshape how many leading automotive organisations think about business resilience against the backdrop of these rising threats.\u00a0<\/p>\n\n\n\n<p><strong>Interconnected systems, interconnected risks<\/strong><\/p>\n\n\n\n<p>If you follow a vehicle development programme from concept to production, the degree of interdependence is striking. A team developing an Advanced Driver Assistance System (ADAS) feature might be working in a shared cloud environment with colleagues several time zones away. A small supplier may be responsible for a line of code that ends up deep inside a critical control system. And the factory building the car depends on real-time analytics that sit in off-site data centres.<\/p>\n\n\n\n<p>It all works perfectly until the day it does not. One leaked password can shut down a line. A forgotten test server can expose a design file no one realised was sitting there. In one recent incident within the automotive sector, a single, routine action, carried out without any malicious intent by a single person was enough to trigger a chain of events that disrupted operations for an extended period. An incident such as this, or a ransomware hit on a Tier 2 supplier can leave an OEM scrambling to keep a launch on schedule. The traditional idea of protecting a single, well-defined perimeter doesn\u2019t stand up well to this kind of architecture. Data and control systems now live everywhere.\u00a0\u00a0<\/p>\n\n\n\n<p>The real sticking point, though, is visibility. Many organisations are still discovering what their digital estate actually looks like. Which systems talk to each other? Which suppliers have access to which platforms? And, what would break if one component went offline? As vehicle functions, production systems and back-end enterprise systems become more tightly integrated, gaps in that understanding add both complexity and increased vulnerability. A clear map of that landscape, and some discipline around how it is maintained, is increasingly becoming one of the most important building blocks of resilience and protection from cyberattacks.<\/p>\n\n\n\n<p>Industry regulations such as\u00a0<a href=\"https:\/\/unece.org\/transport\/documents\/2021\/03\/standards\/un-regulation-no-155-cyber-security-and-cyber-security\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>UNECE WP.29 R155 and R156<\/strong><\/a>\u00a0only reinforce this. If a manufacturer cannot demonstrate control over cybersecurity risks across suppliers, software and in-life updates, they can\u2019t sell vehicles into key markets. Therefore, they risk a significant hit on their bottom line. That reality is forcing a mindset shift that, frankly, is overdue.<\/p>\n\n\n\n<p><strong>People, process and the everyday nature of cyber risk<\/strong><\/p>\n\n\n\n<p>For all the sophistication of modern automotive systems, many incidents still start with the most ordinary of moments and simple\u00a0<a href=\"https:\/\/www.mimecast.com\/resources\/ebooks\/state-of-human-risk-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>human error<\/strong><\/a>. For example, someone rushing to get a task finished. A patch put off until later. A device plugged in without a second thought. None of these actions are unusual. But, in a highly connected automotive engineering and manufacturing environment, their impact can be wider than anyone expects, and they can open the door to significant problems that can take hold and escalate quickly.<\/p>\n\n\n\n<p>The organisations that deal with this best make cybersecurity feel like it\u2019s just part of how work gets done, not something bolted on from the outside.\u00a0<strong><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.29.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Training tends to be short, regular and tied directly to day-to-day tasks<\/a>\u00a0<\/strong>too. Factory teams begin to see why skipping one small step can cause issues elsewhere. Engineers understand that security isn\u2019t the final hurdle before release either. It\u2019s part of the design process. And leadership treats security in the same tone as quality or delivery because it genuinely affects everything downstream.<\/p>\n\n\n\n<p><strong>A new kind of operational resilience<\/strong><\/p>\n\n\n\n<p>One of the more unsettling developments in recent years is how often cyber incidents now spill out of the IT domain and into physical operations.\u00a0<a href=\"https:\/\/www.ibm.com\/downloads\/documents\/us-en\/1227cc9e83cb97ae\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>IBM\u2019s recent threat intelligence report<\/strong><\/a>\u00a0highlights that manufacturing remains one of the most targeted sectors globally. Nowadays, ransomware doesn\u2019t just lock up spreadsheets. It can freeze robots, shut down paint shops and leave whole manufacturing facilities in limbo. In many factories, IT and Operational Technology (OT) systems have grown together over decades. A security gap in one area can create consequences no one anticipated.<\/p>\n\n\n\n<p>Trying to &#8216;seal every gap&#8217; is not possible though. What matters is understanding which systems absolutely must stay online, which can be taken down safely, and how to recover in a controlled way. Some manufacturers now run scenario workshops for this reason, following the sort of best practice put forward by the UK\u2019s\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/section\/exercise-in-a-box\/overview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>National Cyber Security Centre (NCSC)<\/strong><\/a>. They rehearse a cyber incident as they would any other business-critical disruption. Who calls whom? What information is needed? What trade-offs must be made in the first half hour? These exercises often reveal dependencies that were entirely invisible beforehand.<\/p>\n\n\n\n<p><strong>Securing innovation at scale<\/strong><\/p>\n\n\n\n<p>The industry\u2019s direction is evident. Electrification, advanced driver assistance, digital diagnostics and connected services are becoming central to vehicle programmes. All of these rely on software behaving predictably. Not just in the plant but out in the world too.<\/p>\n\n\n\n<p>Over-the-air (OTA) updates are a good example. They let manufacturers improve vehicles long after they\u2019ve left the factory, which is a powerful tool to have. But they also create a permanent route into the car\u2019s software. As<strong>\u00a0<a href=\"https:\/\/unece.org\/sites\/default\/files\/2021-03\/R156e.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">UNECE R156 notes<\/a><\/strong>, if update servers, signing processes or key-management systems are not watertight, vulnerabilities can end up being delivered straight into an in-life vehicle. As system integration deepens, the potential impact of any weakness grows in parallel, and that\u2019s a risk no OEM wants to carry.<\/p>\n\n\n\n<p>The encouraging thing is that when cybersecurity is baked into development pipelines and data flows from the start, work tends to move faster rather than slower.<strong>\u00a0<a href=\"https:\/\/www.iso.org\/standard\/70918.html\" target=\"_blank\" rel=\"noreferrer noopener\">ISO\/SAE 21434<\/a><\/strong>\u00a0points in the same direction too. Early integration reduces rework, supports compliance and gives teams the confidence to make decisions quickly. It also makes collaboration smoother, because suppliers know they are working inside a secure and well-managed environment.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1024x683.jpg\" alt=\"\" class=\"wp-image-31831\" srcset=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1024x683.jpg 1024w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-300x200.jpg 300w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-768x512.jpg 768w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1536x1024.jpg 1536w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg 2047w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Bodo Philipp, CEO,\u00a0MHP Consulting UK<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Automotive has long been associated with trust: trust in engineering, trust in safety, trust in the people making decisions every day. Cyber resilience is simply that same mindset expressed in a digital world. The organisations that weave it into their culture, not just their compliance schedule, will be better placed to adapt to whatever the next few years bring.<\/p>\n\n\n\n<p>Technology will keep changing. New vulnerabilities will appear. Some, including those driven by leaps forward in computing power and quantum technology, will challenge today\u2019s assumptions about security. But the industry\u2019s long-standing principles of discipline, precision, and collective responsibility still hold. Cybersecurity gives those principles a new arena, and increasingly, it will define how confidently companies can transform in the face of rising threats.&nbsp;<\/p>\n\n\n\n<p>Bodo Philipp is CEO,\u00a0<a href=\"https:\/\/www.mhp.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>MHP Consulting UK<\/strong><\/a>, a Porsche-owned global management and IT consulting firm specialising in digital transformation and process optimisation for the automotive and manufacturing industries.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As vehicles, production systems and supply chains become more interconnected, the Bodo Philipp details why cybersecurity is now central to operational resilience, and the need to embed it across engineering, manufacturing and organisational culture to enable confident, secure transformation. The automotive industry has been talking about digital transformation for years, but the reality we\u2019re living &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[14689,5305,13430],"class_list":["post-31830","post","type-post","status-publish","format-standard","","category-news-views-and-opinion","tag-automotive-cybersecurity","tag-cybersecurity","tag-mhp-consulting-uk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Automotive cybersecurity and the confidence to transform - Engineer News Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automotive cybersecurity and the confidence to transform - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"As vehicles, production systems and supply chains become more interconnected, the Bodo Philipp details why cybersecurity is now central to operational resilience, and the need to embed it across engineering, manufacturing and organisational culture to enable confident, secure transformation. The automotive industry has been talking about digital transformation for years, but the reality we\u2019re living &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-10T09:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2047\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Automotive cybersecurity and the confidence to transform\",\"datePublished\":\"2026-04-10T09:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\"},\"wordCount\":1411,\"image\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1024x683.jpg\",\"keywords\":[\"Automotive cybersecurity\",\"cybersecurity\",\"MHP Consulting UK\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\",\"name\":\"Automotive cybersecurity and the confidence to transform - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1024x683.jpg\",\"datePublished\":\"2026-04-10T09:15:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg\",\"contentUrl\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg\",\"width\":2047,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.engineernewsnetwork.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automotive cybersecurity and the confidence to transform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#website\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automotive cybersecurity and the confidence to transform - Engineer News Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/","og_locale":"en_GB","og_type":"article","og_title":"Automotive cybersecurity and the confidence to transform - Engineer News Network","og_description":"As vehicles, production systems and supply chains become more interconnected, the Bodo Philipp details why cybersecurity is now central to operational resilience, and the need to embed it across engineering, manufacturing and organisational culture to enable confident, secure transformation. The automotive industry has been talking about digital transformation for years, but the reality we\u2019re living &hellip;","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/","og_site_name":"Engineer News Network","article_published_time":"2026-04-10T09:15:00+00:00","og_image":[{"width":2047,"height":1365,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Automotive cybersecurity and the confidence to transform","datePublished":"2026-04-10T09:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/"},"wordCount":1411,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1024x683.jpg","keywords":["Automotive cybersecurity","cybersecurity","MHP Consulting UK"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/","name":"Automotive cybersecurity and the confidence to transform - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2-1024x683.jpg","datePublished":"2026-04-10T09:15:00+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2026\/04\/061-2.jpg","width":2047,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/automotive-cybersecurity-and-the-confidence-to-transform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Automotive cybersecurity and the confidence to transform"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/31830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=31830"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/31830\/revisions"}],"predecessor-version":[{"id":31832,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/31830\/revisions\/31832"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=31830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=31830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=31830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}