Market Research Logo

State of Automotive Cybersecurity—Key Trends, Solutions, OEM Activities, and Vendor Profiles

State of Automotive Cybersecurity—Key Trends, Solutions, OEM Activities, and Vendor Profiles

Government and consumers are concerned about cyber security in cars, as researchers were able to hack into various OEM models in 2015. This research service identifies key areas that offer scope for technology innovation and discusses cybersecurity initiatives for the automotive industry. In 2015, cybersecurity, secure data transfers, and data privacy were key challenges for consumers and government authorities. The study discusses OEM initiatives, Tier-1 supplier activities, key trends, specialist security company roles, and future business models for automotive cybersecurity.


  • Executive Summary-Key Findings and Changes from 2014
    • Executive Summary-2014 Key Findings vs. 2015 Actuals
    • Automotive Cybersecurity in 2015
    • Connected Cars and Autonomous Vehicles-Threat Vectors
    • Automotive Hacking Incidents-Quick Recap
    • Exhibit A-BMW ConnectedDrive Hacking Incident
    • OEM Challenges and SPY Car Act Findings
    • 2014 Automotive Security Investments
    • Security Initiatives-2015 OEM Activities
    • OEM Channel to V2X Security
    • OEMs and Tier-1 Suppliers-Focus and Investment Range
    • OEMs and Tier-1 Suppliers-Key Trends and Business Models
    • 2014/2025 Future Outlook of Vehicle Cybersecurity
  • Research Scope, Objectives, Background, and Methodology
    • Research Scope
      • Table Passenger Car Market: Unit Shipment Forecast, NA and Europe, 2014-2021
    • Research Aims and Objectives
    • Key Questions This Study Will Answer
    • Related Research
    • Research Methodology
  • Review of Threats and Overall Security Posture
    • Automotive Cybersecurity-Road Ahead to 2025
    • Automotive Cybersecurity-Risks and Vulnerabilities
    • Distributed Security Architecture
    • Automotive Cybersecurity-Enterprise Security
    • Enterprise Security-Data Privacy and Leakage
    • Supply Chain Security
    • Automotive Retail Security
  • Overview of Cybersecurity Ecosystem
    • Automotive OEMs and Cybersecurity Initiatives
    • Automotive Product Security-Tier-1 Activities
    • Cybersecurity Specialist Companies
    • Cellular Infrastructure, Semiconductor and Technology Companies
  • OEM Partnerships and Cybersecurity Activities
    • V2X-V2V + V2I Technology
    • 802.11P-Consortiums and Benefits
    • V2X Regional Protocols, Developments, and Adoption-Japan
    • V2X Regional Protocols, Developments and Adoption-Europe
    • V2X Regional Protocols, Developments, and Adoption-US
    • V2X-Key Partnerships and Initiatives
    • V2V Cost
    • GM 2017 Cadillac and V2X
    • Volkswagen and German Companies-Cybersecurity Organization
    • Volvo Cars-Cybersecurity Project
    • Tesla Big Bounty Program with White Hat Hackers
    • Honda V2X Test Drive-Europe
    • Safety Pilot Model Deployment (SPMD) Program
      • Table SPMD Program, North America, 2013-2014
  • Vendor Profiles
    • Automotive Cybersecurity Ecosystem Participants
    • TowerSec
    • Harman 5+1 Layer Security Framework
    • Argus Cybersecurity
    • Security Innovation V2X Solutions
    • Cohda Wireless
    • Renesas Electronics Corporation
  • Automotive Cybersecurity-Recap and Conclusions
    • Automotive Cybersecurity and Alliances-Quick Recap
    • Automotive Companies Security Adoption-Current Status
    • Cybersecurity-Automotive Participants Perspective
    • Automotive Cybersecurity-Industry Participants Mind Share
    • Secure Code Challenges and Current Coding Practices
    • Cybersecurity-Industry Alliances and Partnerships
    • Automotive Cybersecurity-Business Impact and Timeline
    • Future Connected Car Use Cases Demand Security Specialists
    • Automotive Cybersecurity and Next Generation Vehicles
    • Automotive Cybersecurity-Extended Ecosystem
    • Automotive OEMs-OTA Approach
    • Automotive Cybersecurity and OTA
    • V2X Cost-DSRC Field Trials and Adoption Rate
    • Automotive Security Investments-Key Trends
    • Connected Car and Cybersecurity-Initiatives and Impact Analysis
    • The Last Word-3 Big Predictions
  • Appendix
    • Table of Abbreviations and Acronyms Used

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report