Upcoming events

Stay up to date with the latest PCA Cyber Security events, explore our webinars, and study our expert research. We highlight the most important and valuable trends in the automotive security industry

See all events about event

ON-DEMAND WEBINAR

Product-focused Threat Intelligence 
for
Automotive and Embedded
Device Manufacturers
 

If you missed Our Free Webinar  - request the recording and the slides by filling out the form

Turning Intelligence into Action - Fixing Product Vulnerabilities 

Recorded: Wednesday, June 04, 2025 
Platform: Microsoft Teams
Duration: 45 mins

In today’s rapidly evolving cybersecurity landscape, understanding and addressing product
vulnerabilities is more critical than ever.  

The Cyber Resilience Act (CRA) significantly impacts industries that rely on connected devices, embedded
systems, and software-driven products, making Threat Intelligence services crucial
for compliance and security. 
Since CRA mandates continuous vulnerability monitoring and risk assessment, Threat Intelligence
services play a key role in helping businesses detect, analyse, and respond to emerging cyber threats
across regulated industries. 
Join PCA Cyber Security in cooperation with Quointelligence for an insightful webinar aimed at equipping
business leaders with the knowledge they need to transform threat intelligence into actionable strategies. 

Speakers: 

  • Andrei MOLDOVAN, Senior Threat Researcher, Quointelligence
  • Tamás PENTZ, Threat Intelligence Analyst, PCA Cyber Security 

Key Topics Include: 

  • How Threat Intelligence (TI) can reveal unknown product vulnerabilities
  • The difference between general TI and product-related TI
  • Navigating the cybersecurity challenges in manufacturing products
  • The role of compliance and legislative frameworks (CRA, NIS2, DORA)
  • Real-world examples of product-related incidents
  • The importance of a dedicated Product TI team 

Who Should Attend:

This webinar is tailored for product security managers and engineers, CISOs, CTOs, analysts, engineers
and product security managers representing manufacturers from various sectors including: 

  • Embedded Device Manufacturers (Financial, Energy, Consumer IoT)
  • Industrial Equipment Manufacturers
  • Automotive Suppliers & OEMs
  • Product Security Managers from other sectors.
  • Industrial Equipment Manufacturers
  • Embedded Device Manufacturers (Financial, Energy, Utilities, Consumer IoT) 

Agenda

Turning Intelligence into Action - Fixing Product Vulnerabilities

Key Topics Include:  

  • How Threat Intelligence (TI) can reveal unknown product vulnerabilities
  • The difference between general TI and product-related TI
  • Navigating the cybersecurity challenges in manufacturing products
  • The role of compliance and legislative frameworks (CRA, NIS2, DORA)
  • Real-world examples of product-related incidents
  • The importance of a dedicated Product TI team 

DURATION: 00:45

Get to know our speakers

Tamas

Tamás Pentz

Senior Threat Intelligence Analyst

Tamás is a Cyber Threat Intelligence Analyst with over a decade of experience spanning security consulting, SOC operations, SIEM, and industrial cybersecurity. He specializes in securing embedded systems and industrial environments, with deep expertise in automotive ECUs and CAN bus protocols. Tamás has led the development of an Industrial SOC in the energy sector and actively contributes to automotive diagnostics and hacking communities. With a strong background in OSINT, HUMINT, and threat detection, he translates complex threats into actionable insights for PCA customers across critical industries.
Andrei Moldovan Pfp Square

Andrei MOLDOVAN

Senior Threat Researcher, Quointelligence

Andrei is a Senior Threat Researcher at QuoIntelligence, specializing in threat intelligence, malware analysis and reverse engineering. His expertise focuses on identifying, tracking, and disrupting sophisticated cyber threats through meticulous analysis and proactive research. Andrei is passionate about exploring emerging attack techniques, dissecting exotic malware, and developing detection strategies to empower proactive defense.