Cyber Initiative

FACT: Your web connections are constantly being targeted by hackers for vulnerabilities

With new vulnerabilities discovered every day and with more people working remotely, the threat to our corporate and home systems is growing exponentially. To avoid the lasting and devastating impact of a cyberattack, action is needed. To combat this critical and persistent threat, we have enhanced our Supply Safe™: CYBERSAFE CHECK to give you even greater protection.

Now, everyone in the auto industry has access to the CYBERSAFE CHECK assessment and a comprehensive scan of one IP address – FREE. NO STRINGS ATTACHED, NO LOGIN REQUIRED - via the Get Started Now link below.

* You will be directed the the NQC Supplier assurance site. AIAG has partnered with NQC, a global leader in cyberthreat detection to offer this industry benefit.

Learn More

The new Supply Safe™: CYBERSAFE CHECK is an improved and innovative approach that guides you through the same steps hackers take, allowing you to do what hackers do and see what they see. Comprised of a quick scan of your one of your web facing services and an assessment of your cyber controls, you’ll benefit from a detailed report outlining weaknesses that cyber criminals can exploit and a corrective action plan to secure your organization from cyber attacks.

Don’t wait until it’s too late – safeguard your organization today with Supply Safe™: CYBERSAFE CHECK, provided by NQC, a global leader in threat detection. The “Get Started Now” link will direct you safely to the NQC Supplier Assurance platform where you can immediately gain insight into your cyber vulnerabilities. Additional monthly scans are available for as little as $10 per month directly from NQC, but All AIAG members and non-members have access to the initial assessment and one quick scan, free.

Do what hackers do and see what they see

Supply Safe™: CYBERSAFE CHECK allows you to do what hackers do and see what they see – and most importantly, take the necessary steps to secure your organization from attack.

SCAN: A non-intrusive yet comprehensive quick vulnerability scan of your organization’s internet facing systems which enables you to regularly monitor your systems against a database of 79,000 known vulnerabilities including newly discovered ones.

STUDY: An automotive industry approved cybersecurity assessment and report which provides insight into vulnerabilities identified and weak cybersecurity controls. The report sets out the steps you can take to remediate and fix cybersecurity weaknesses found, including direct links to the NIST and CVE databases for further information.

SECURE: You now have the insight a cyber criminal has and are equipped with the knowledge to secure your organization against malicious cyber attacks. Schedule a vulnerability scan once every month and assess your cyber security controls regularly to safeguard your organization from malicious cyber attacks.

Publications - Order Today

This product contains a common set of minimal security guidelines, General Computing Controls, that apply to all 3rd Parties who create, collect, store, transmit, manage, process an OEM's data and information in an environment external to the OEM's.

ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization's information security risk environment(s).