ON-DEMAND WEBINAR
Product-focused Threat Intelligence
for Automotive and Embedded
Device Manufacturers
If you missed Our Free Webinar - request the recording by filling out the form
Turning Intelligence into Action - Fixing Product Vulnerabilities
Recorded: Wednesday, June 04, 2025
Platform: Microsoft Teams
Duration: 45 mins
In today’s rapidly evolving cybersecurity landscape, understanding and addressing product
vulnerabilities is more critical than ever.
The Cyber Resilience Act (CRA) significantly impacts industries that rely on connected devices, embedded
systems, and software-driven products, making Threat Intelligence services crucial
for compliance and security.
Since CRA mandates continuous vulnerability monitoring and risk assessment, Threat Intelligence
services play a key role in helping businesses detect, analyse, and respond to emerging cyber threats
across regulated industries.
Join PCA Cyber Security in cooperation with Quointelligence for an insightful webinar aimed at equipping
business leaders with the knowledge they need to transform threat intelligence into actionable strategies.
Speakers:
- Andrei MOLDOVAN, Senior Threat Researcher, Quointelligence
- Tamás PENTZ, Threat Intelligence Analyst, PCA Cyber Security
Key Topics Include:
- How Threat Intelligence (TI) can reveal unknown product vulnerabilities
- The difference between general TI and product-related TI
- Navigating the cybersecurity challenges in manufacturing products
- The role of compliance and legislative frameworks (CRA, NIS2, DORA)
- Real-world examples of product-related incidents
- The importance of a dedicated Product TI team
Who Should Attend:
This webinar is tailored for product security managers and engineers, CISOs, CTOs, analysts, engineers
and product security managers representing manufacturers from various sectors including:
- Embedded Device Manufacturers (Financial, Energy, Consumer IoT)
- Industrial Equipment Manufacturers
- Automotive Suppliers & OEMs
- Product Security Managers from other sectors.
- Industrial Equipment Manufacturers
- Embedded Device Manufacturers (Financial, Energy, Utilities, Consumer IoT)
Agenda
Turning Intelligence into Action - Fixing Product Vulnerabilities
Key Topics Include:
- How Threat Intelligence (TI) can reveal unknown product vulnerabilities
- The difference between general TI and product-related TI
- Navigating the cybersecurity challenges in manufacturing products
- The role of compliance and legislative frameworks (CRA, NIS2, DORA)
- Real-world examples of product-related incidents
- The importance of a dedicated Product TI team
DURATION: 00:45
Get to know our speakers
Tamás Pentz
Senior Threat Intelligence Analyst, PCA
Andrei MOLDOVAN
Senior Threat Researcher, Quointelligence