Cyber Initiative

Cyber Initiative

Cyberattacks are the fastest growing crime globally – and new vulnerabilities are discovered every day.

With more people working remotely than ever before, and new technologies facilitating an increasingly connected world, the threats to our corporate and home systems are growing exponentially. And while many organizations recently increased IT security investments in response to these concerns, nearly 80% of senior IT professionals and leaders still believe their organizations lack sufficient protection against cyberthreats.

Now is the time to take action. To avoid the lasting and devasting impact of a cyberattack on your organization, we’ve gathered critical cybersecurity tools and resources to help keep your systems secure.

Learn More

Do what hackers do – and see what they see – with virtual audit resources by NQC, a global leader in cyberthreat detection. NQC offers non-intrusive scans of your organization’s internet facing systems to provide immediate insights into vulnerabilities and weak cybersecurity controls. Their comprehensive scan checks for more than 79,000 vulnerabilities, including those newly identified, and provides a corrective action report for addressing security concerns found during the virtual audit.

Supplier Cyber Toolkit

Looking for free access to tools and information to get started? The following guides were created by the Cyber Readiness Institute – with contributions from AIAG and tech savvy organizations of all sizes – to better identify your needs and provide options for outside support. Additional guides will be added as they are available.

Publications - Order Today

This product contains a common set of minimal security guidelines, General Computing Controls, that apply to all 3rd Parties who create, collect, store, transmit, manage, process an OEM's data and information in an environment external to the OEM's.


ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization's information security risk environment(s).

Upcoming Supply Chain Events