{"id":984,"date":"2024-05-23T23:09:57","date_gmt":"2024-05-23T20:09:57","guid":{"rendered":"https:\/\/www.optival.com.tr\/cyber-security\/"},"modified":"2025-06-19T23:00:58","modified_gmt":"2025-06-19T20:00:58","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.optival.com.tr\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-ee16d49 stk-block-background stk--has-background-overlay\" data-block-id=\"ee16d49\"><style>.stk-ee16d49 {background-color:linear-gradient(to top, #dfe9f3 0%, white 100%) !important;min-height:900px !important;align-items:center !important;margin-bottom:42px !important;display:flex !important;}.stk-ee16d49:before{background-image:linear-gradient(to top, #dfe9f3 0%, white 100%) !important;}.stk-ee16d49-column{--stk-column-gap:48px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-ee16d49-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-bdc7430\" data-v=\"4\" data-block-id=\"bdc7430\"><style>.stk-bdc7430-inner-blocks{justify-content:center !important;}.stk-bdc7430-container{display:flex !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-bdc7430-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-bdc7430-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-539b3ca\" id=\"siber-guvenlik\" data-block-id=\"539b3ca\"><h1 class=\"stk-block-heading__text\">Cyber Security<\/h1><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-a83744f\" data-block-id=\"a83744f\"><p class=\"stk-block-text__text\">Today&#8217;s vehicles are equipped with complex electronic and software components, not just mechanical systems. This transformation has led to the critical importance of cyber security in the automotive industry.   <\/p><\/div>\n\n\n\n<p>As Optival, we support you to ensure the security of your vehicles throughout their lifecycle by offering cyber security solutions that comply with <strong>ISO\/SAE 21434 and UNECE R155<\/strong> standards.<\/p>\n\n\n\n<p>Our service portfolio includes <strong>cyber security management system (CSMS) installation<\/strong>, <strong>threat analysis and risk assessment (TARA)<\/strong>, <strong>security architecture design<\/strong>, <strong>penetration and fuzz tests<\/strong>, <strong>security verification of systems such as V2X, CAN, OTA<\/strong>, and <strong>corporate trainings<\/strong>.  <\/p>\n\n\n\n<p>We perform in-depth testing in key focus areas such as security of on- and off-vehicle connections, data confidentiality and robustness of update mechanisms. Our consultancy and technical testing services are of strategic value not only for OEMs but also for suppliers in <strong>type approval processes (CoC\/COP)<\/strong> and <strong>R155 compliance assessments<\/strong>.   <\/p>\n\n\n\n<p>Our teams of experts in Turkey and Germany develop customized solutions for your projects, empowering you both technically and in terms of legal compliance.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-e97c67c\" data-v=\"4\" data-block-id=\"e97c67c\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-e97c67c-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-e97c67c-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-eb4777e\" data-block-id=\"eb4777e\"><style>.stk-eb4777e .stk-img-wrapper{height:600px !important;filter:drop-shadow(25px 10px 30px rgba(18, 63, 82, 0.3)) !important;}.stk-eb4777e .stk-img-wrapper::after{background-color:#00000000 !important;}.stk-eb4777e .stk-img-wrapper:hover::after{background-color:var(--theme-palette-color-2, #009bdd) !important;}.stk-eb4777e .stk-img-wrapper::before{--stk-gradient-overlay:0.2 !important;}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch stk--shadow-25px 10px 30px rgba(18, 63, 82, 0.3)\"><img decoding=\"async\" class=\"stk-img wp-image-1211\" src=\"https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434-1.webp\" width=\"1920\" height=\"1080\" alt=\"Automotive Cyber Security - Cyber Security - CSMS - R155 21434.webp\" title=\"\" srcset=\"https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434-1.webp 1920w, https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434-1-300x169.webp 300w, https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434-1-1024x576.webp 1024w, https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434-1-768x432.webp 768w, https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434-1-1536x864.webp 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/span><\/figure><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-9ac9d8f stk-block-background stk--has-background-overlay\" data-block-id=\"9ac9d8f\"><style>.stk-9ac9d8f {background-color:linear-gradient(11deg,#dfe9f3 0%,white 100%) !important;}.stk-9ac9d8f:before{background-image:linear-gradient(11deg,#dfe9f3 0%,white 100%) !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-9ac9d8f-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-9f32ebe\" data-v=\"4\" data-block-id=\"9f32ebe\"><style>.stk-9f32ebe-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}.stk-9f32ebe-inner-blocks{justify-content:space-around !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-9f32ebe-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center stk--block-horizontal-flex stk--column-flex stk-block-content stk-inner-blocks stk-9f32ebe-inner-blocks\">\n<div class=\"wp-block-rank-math-toc-block aligncenter\" style=\"margin-top:var(--wp--preset--spacing--40);margin-right:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);margin-left:var(--wp--preset--spacing--40);padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--80)\" id=\"rank-math-toc\"><p><strong>You can examine the details of the services we offer within the scope of automotive cyber security.<\/strong><\/p><nav><div><div class=\"\"><a href=\"#gap-analizi-ve-siber-guvenlik-yonetim-sistemi-csms-kurulumu\">GAP Analysis and Cyber Security Management System (CSMS) Installation<\/a><\/div><div class=\"\"><a href=\"#tehdit-analizi-tara-uygulamasi-ve-siber-guvenlik-konseptinin-olusturulmasi\">Threat Analysis (TARA) Application and Creation of Cyber Security Concept<\/a><\/div><div class=\"\"><a href=\"#test-ve-dogrulama-stratejisinin-belirlenmesi-ve-uygulanmasi\">Determination and Implementation of Testing and Validation Strategy<\/a><\/div><div class=\"\"><a href=\"#tedarikci-yonetimi\">Supplier Management<\/a><\/div><div class=\"\"><a href=\"#denetim-belgelendirme-ve-tip-onayi\">Audit, Certification and Type Approval<\/a><\/div><\/div><\/nav><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"gap-analizi-ve-siber-guvenlik-yonetim-sistemi-csms-kurulumu\"><strong><strong>GAP Analysis and Cyber Security Management System (CSMS) Installation<\/strong><\/strong><\/h2>\n\n<p>The GAP analysis service we offer as Optival compares your organization&#8217;s current cyber security practices with <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong> requirements and systematically reveals areas that are missing or need improvement.  <\/p>\n\n<p>Thanks to this analysis:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>The extent to which your current organizational structure is compliant with the regulations is determined,<\/li>\n\n\n\n<li>Weak links in process, documentation and technical implementation are clarified,<\/li>\n\n\n\n<li>A strategic roadmap is created to reach the targeted level of compliance.<\/li>\n<\/ul>\n\n<p>After the GAP analysis, a <strong>CSMS infrastructure<\/strong> tailored specifically for your organization is created based on the findings. In this process <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Management policies and responsibility matrix are created,<\/li>\n\n\n\n<li>TARA (Threat Analysis and Risk Assessment) process is integrated,<\/li>\n\n\n\n<li>Traceability of cyber security work products is ensured,<\/li>\n\n\n\n<li>Ensure that processes are documented in a manner consistent with ISO\/SAE 21434,<\/li>\n\n\n\n<li>Internal audit, corrective action and continuous improvement mechanisms are established.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"neden-onemlidir\"><strong>Why is it Important?<\/strong><\/h4>\n\n<p>CSMS is not just a set of documents; it is <strong>a culture of security that ensures<\/strong>your organization <strong>is systematically prepared for cyber threats throughout the vehicle lifecycle<\/strong>. Successful establishment of this system is a prerequisite <strong>for obtaining R155 type approval<\/strong> and offers <strong>a strong competitive advantage<\/strong> in cooperation with OEMs. <\/p>\n\n<p><\/p>\n\n<h2 class=\"wp-block-heading\" id=\"tehdit-analizi-tara-uygulamasi-ve-siber-guvenlik-konseptinin-olusturulmasi\"><strong>Threat Analysis (TARA) Application and Creation of Cyber Security Concept<\/strong><\/h2>\n\n<p>The electronic control units (ECUs), wireless communication protocols and software systems in modern vehicles are vulnerable to increasingly sophisticated threats. Therefore, <strong>recognizing cyber threats early<\/strong> in the vehicle development process <strong>and taking risks under control<\/strong> is fundamental to both security and regulatory compliance. <\/p>\n\n<p>As Optival, with the <strong>TARA applications<\/strong> we carry out in accordance with the <strong>ISO\/SAE 21434<\/strong> standard; we determine how vulnerable the system components are to potential threats. In this process <\/p>\n\n<ul class=\"wp-block-list\">\n<li>System assets and valuable resources (assets) are identified,<\/li>\n\n\n\n<li>Potential attack paths are modeled,<\/li>\n\n\n\n<li><strong>Risk score<\/strong> is calculated through damage scenarios and probability analysis,<\/li>\n\n\n\n<li>Based on the results, <strong>cybersecurity goals<\/strong> are created and prioritized.<\/li>\n<\/ul>\n\n<p>TARA outputs are used to create work products that are the cornerstone of cyber security engineering and are structured to be consistent with <strong>UNECE R155 Annex 5<\/strong>.<\/p>\n\n<p>Solutions developed to mitigate identified security risks are integrated into the system architecture as <strong>a cybersecurity concept<\/strong>. In this context: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Technical controls and countermeasures for security objectives are defined,<\/li>\n\n\n\n<li>Solutions are developed in areas such as communication security, data integrity, access control and software update mechanisms,<\/li>\n\n\n\n<li>Security requirements are traceable throughout the design process.<\/li>\n<\/ul>\n\n<p>This process forms the basis for sustainable cybersecurity throughout the entire product lifecycle.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"test-ve-dogrulama-stratejisinin-belirlenmesi-ve-uygulanmasi\"><strong>Determination and Implementation of Testing and Validation Strategy<\/strong><\/h2>\n\n<p>The success of cyber security measures is demonstrated not only by policies defined at a theoretical level, but also by testing the effectiveness of these measures in the field. Optival makes vehicle cybersecurity measurable by ensuring both the development of a testing strategy and the professional <strong>implementation of<\/strong> that strategy, in accordance with the requirements of <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong>. <\/p>\n\n<h4 class=\"wp-block-heading\" id=\"&#x1F4CB;-stratejinin-belirlenmesi\"><strong>Identifying the Strategy<\/strong><\/h4>\n\n<p>The first step of the testing process is to create <strong>verification plans<\/strong> in accordance with the security requirements and system architecture. In this context <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Appropriate test methods are matched for each security objective,<\/li>\n\n\n\n<li>Attack surfaces for critical system components are identified (CAN, TCU, OTA, Bluetooth, Wi-Fi, etc.),<\/li>\n\n\n\n<li>Test scope, methodology, success criteria are defined,<\/li>\n\n\n\n<li>When necessary, test repetitions are optimized with automation infrastructures.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"uygulamanin-gerceklestirilmesi\"><strong>Implementation of the Application<\/strong><\/h4>\n\n<p>Depending on the strategy, Optival experts perform comprehensive test applications in the field or in a laboratory environment:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Functional Testing<\/strong>: Tests whether the defined security requirements are functionally working correctly on the system.<\/li>\n\n\n\n<li><strong>Fuzz Testing<\/strong>: Measures the fault tolerance of software by applying unexpected data inputs to interfaces and protocols.<\/li>\n\n\n\n<li><strong>Penetration Tests<\/strong>: The vulnerabilities of the system are detected by imitating real attack techniques.<\/li>\n\n\n\n<li><strong>OTA and Wireless Security Tests<\/strong>: Software updates, Bluetooth and LTE connections are tested for encryption, authentication and access control.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"guvenlik-performansinin-kanitlanmasi\"><strong>Evidence of Safety Performance<\/strong><\/h4>\n\n<p>Documenting tests is the most powerful way to gain the trust of your customers and prove your technical competence in <strong>R155 type approval<\/strong> processes. Optival&#8217;s testing expertise not only identifies problems, but also provides remedial recommendations for sustainable cybersecurity. <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"tedarikci-yonetimi\"><strong>Supplier Management<\/strong><\/h2>\n\n<p>In the automotive sector, the cybersecurity obligations of vehicle manufacturers are not limited to their own systems. <strong>UNECE R155<\/strong> mandates a security approach that covers the entire supply chain and expects manufacturers to establish structures that can audit the processes of their suppliers. At this point, supplier management becomes a strategic responsibility for cybersecurity compliance. <\/p>\n\n<p>Optival&#8217;s supplier management service supports <strong>OEMs and primary suppliers<\/strong> to align their technical and process relationships with their sub-suppliers in accordance with <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong>. In this context <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Compliance requirements are set for suppliers and minimum safety criteria are defined,<\/li>\n\n\n\n<li>Work products (security goals, TARA outputs, V&amp;V records) are checked for accuracy and consistency,<\/li>\n\n\n\n<li>Supplier risk level is analyzed and prioritized,<\/li>\n\n\n\n<li>Audit plans and evaluation criteria are prepared,<\/li>\n\n\n\n<li>CIA (cybersecurity interface agreement) process is carried out.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"&#x1F50D;-tedarikci-denetimi-ve-egitim-destegi\"><strong>Supplier Audit and Training Support<\/strong><\/h4>\n\n<p>Optival not only evaluates technical documentation, but also conducts <strong>internal audits<\/strong>, <strong>training<\/strong> and <strong>awareness activities<\/strong> for suppliers. This way: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Suppliers&#8217; cyber security competence is increased,<\/li>\n\n\n\n<li>Integrated contribution to the OEM&#8217;s safety objectives,<\/li>\n\n\n\n<li>Unexpected incompatibilities in type approval processes are prevented.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"&#x1F3AF;-fayda-ve-etki\"><strong>Benefit and Impact<\/strong><\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Vendor security vulnerabilities are minimized,<\/li>\n\n\n\n<li>Regulatory compliance is ensured throughout the chain,<\/li>\n\n\n\n<li>Suppliers&#8217; technical competence and liability awareness are increased.<\/li>\n<\/ul>\n\n<p><strong>Optival<\/strong> sees supplier management not only as a control mechanism but as part of a long-term safety culture.<\/p>\n\n<div class=\"wp-block-stackable-call-to-action alignfull stk-block-call-to-action stk-has-bottom-separator stk-block stk-2587e0c stk-block-background stk--has-background-overlay\" data-v=\"2\" data-block-id=\"2587e0c\"><style>.stk-2587e0c {background-color:#000000 !important;background-image:url(https:\/\/www.optival.com.tr\/wp-content\/uploads\/2025\/06\/Automotive-Cyber-Security-Siber-Guvenlik-CSMS-R155-21434.webp) !important;min-height:500px !important;align-items:center !important;display:flex !important;}.stk-2587e0c:before{background-color:#000000 !important;opacity:0.8 !important;}.stk-2587e0c > .stk-separator__bottom svg{fill:var(--theme-palette-color-6, #f2f5f7) !important;}<\/style><div class=\"stk-block-call-to-action__content stk-content-align stk-2587e0c-column alignwide stk-container stk-2587e0c-container stk--no-background stk--no-padding\"><div class=\"has-text-align-center stk-block-content stk-inner-blocks stk-2587e0c-inner-blocks\">\n<h2 class=\"wp-block-heading has-palette-color-8-color has-text-color has-link-color has-48-font-size wp-elements-b56e318692435c23bacf9f47ca1886be\" id=\"denetim-belgelendirme-ve-tip-onayi\"><strong>Audit, Certification and Type Approval<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-19914ac\" data-block-id=\"19914ac\"><style>.stk-19914ac .stk-block-text__text{color:#FFFFFF !important;}<\/style><p class=\"stk-block-text__text has-text-color has-white-color\">The UNECE R155 regulation and the ISO\/SAE 21434 standard require that automotive products are not only technically safe, but also that this safety is managed in a <strong>documented, auditable and sustainable<\/strong> manner. Optival provides comprehensive <strong>audit, certification and type approval consultancy services<\/strong> for vehicle manufacturers and suppliers in this framework. <\/p><\/div>\n<\/div><\/div><div class=\"stk-separator stk-separator__bottom\"><div class=\"stk-separator__wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1600 200\" class=\"stk-separator__layer-1\" preserveAspectRatio=\"none\" aria-hidden=\"true\"><path class=\"slant-1_svg__st2\" d=\"M-10 210h1620V.5L-10 183.9z\"><\/path><\/svg><\/div><\/div><\/div>\n\n<h4 class=\"wp-block-heading\" id=\"ic-ve-dis-denetim-destegi\"><strong>Internal and External Audit Support<\/strong><\/h4>\n\n<ul class=\"wp-block-list\">\n<li>In-house pre-assessment audits are conducted to analyze the level of regulatory compliance,<\/li>\n\n\n\n<li>CSMS processes are audited according to <a href=\"https:\/\/unece.org\/transport\/vehicle-regulations\" data-type=\"link\" data-id=\"https:\/\/unece.org\/transport\/vehicle-regulations\" target=\"_blank\" rel=\"noopener\">UNECE R155<\/a> and ISO\/SAE 21434 criteria,<\/li>\n\n\n\n<li>Internal audit procedures are established in processes extending to the supplier chain,<\/li>\n\n\n\n<li>Corrective and preventive action plans are developed for nonconformities and deficiencies.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"belgelendirme-sureci-danismanligi\"><strong>Certification Process Consultancy<\/strong><\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Support the preparation of <strong>CSMS compliance reports<\/strong> (audit reports) as defined in ISO\/SAE 21434,<\/li>\n\n\n\n<li>Work products based on ISO\/SAE 21434 are technically reviewed for submission to independent assessors,<\/li>\n\n\n\n<li>Technical guidance is provided in audits to be conducted with third party certification bodies.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\" id=\"tip-onayi-surec-yonetimi\"><strong>Type Approval Process Management<\/strong><\/h4>\n\n<p>Optival provides type approval services at vehicle level as an appointed technical service under UN ECE R155. This includes <\/p>\n\n<ul class=\"wp-block-list\">\n<li>CSMS audit (cybersecurity audit) and CSMS CoC (certificate of compliance) certification process is carried out,<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Type approval processes are carried out by applying cybersecurity assessment at vehicle level,<\/li>\n\n\n\n<li>Manage CSMS audits that must be performed every 3 years,<\/li>\n\n\n\n<li>In case of design changes, the type approval effect is evaluated and necessary update studies are carried out.<\/li>\n<\/ul>\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-7a583b3 stk-block-background stk--has-background-overlay\" data-block-id=\"7a583b3\"><style>.stk-7a583b3 {background-color:linear-gradient(135deg,rgb(238,238,238) 0%,rgb(205,229,255) 100%) !important;padding-top:80px !important;padding-bottom:80px !important;margin-bottom:0px !important;}.stk-7a583b3:before{background-image:linear-gradient(135deg,rgb(238,238,238) 0%,rgb(205,229,255) 100%) !important;}.stk-7a583b3-column{--stk-column-gap:64px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-7a583b3-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-25f9000\" data-v=\"4\" data-block-id=\"25f9000\"><style>@media screen and (min-width:690px){.stk-25f9000 {flex:var(--stk-flex-grow, 1) 1 calc(60% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-25f9000-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-25f9000-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-af64da1\" id=\"strong-neden-optival-strong\" data-block-id=\"af64da1\"><h2 class=\"stk-block-heading__text\"><strong>Why Optival?<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-dc8b4a9\" data-block-id=\"dc8b4a9\"><p class=\"stk-block-text__text\">Optival&#8217;s experienced team is always with you in your projects. Meet the experienced team with cyber security consultancy integrated with homologation experience, full range of project management experiences at both OEM and supplier level and cyber security technical infrastructure. <\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-64f754b\" data-block-id=\"64f754b\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-d400cc1\" data-block-id=\"d400cc1\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/www.optival.com.tr\/en\/contact-us\/\"><span class=\"stk-button__inner-text\">Contact us<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-76535f8\" data-v=\"4\" data-block-id=\"76535f8\"><style>.stk-76535f8-inner-blocks{justify-content:center !important;}.stk-76535f8-container{display:flex !important;}@media screen and (min-width:690px){.stk-76535f8 {flex:var(--stk-flex-grow, 1) 1 calc(40% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-76535f8-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-76535f8-inner-blocks\">\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-0d7e088\" data-block-id=\"0d7e088\"><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-0d7e088\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"\/><\/svg><\/g><\/defs><\/svg><ul class=\"stk-block-icon-list__ul stk-block-icon-list--column\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-a7a6196\" data-block-id=\"a7a6196\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-0d7e088\"\/><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Homologation Experience<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-1e95e12\" data-block-id=\"1e95e12\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-0d7e088\"\/><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Project Management Experience<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-bd5deec\" data-block-id=\"bd5deec\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" width=\"32\" height=\"32\"><use xlink:href=\"#stk-icon-list__icon-svg-def-0d7e088\"\/><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Experienced team<\/span><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Today&#8217;s vehicles are equipped with complex electronic and software components, not just mechanical systems. This transformation has led to the critical importance of cyber security in the automotive industry. As Optival, we support you to ensure the security of your vehicles throughout their lifecycle by offering cyber security solutions that comply with ISO\/SAE [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_gspb_post_css":"","_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-984","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","vertical_spacing_source":"custom","content_area_spacing":"bottom","disable_featured_image":"yes","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"optival_8yofdn","author_link":"https:\/\/www.optival.com.tr\/en\/author\/optival_8yofdn\/"},"uagb_comment_info":0,"uagb_excerpt":"Cyber Security Today&#8217;s vehicles are equipped with complex electronic and software components, not just mechanical systems. This transformation has led to the critical importance of cyber security in the automotive industry. As Optival, we support you to ensure the security of your vehicles throughout their lifecycle by offering cyber security solutions that comply with ISO\/SAE&hellip;","_links":{"self":[{"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/pages\/984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/comments?post=984"}],"version-history":[{"count":6,"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/pages\/984\/revisions"}],"predecessor-version":[{"id":1231,"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/pages\/984\/revisions\/1231"}],"wp:attachment":[{"href":"https:\/\/www.optival.com.tr\/en\/wp-json\/wp\/v2\/media?parent=984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}