Industry Profile: How a Fortune 1000 Manufacturing Leader Built a System for Cyber Maturity

How a Fortune 1000 Company Built a System for Cybersecurity Maturity

The Challenge

With the current industry maze of framework goals and compliance mandates, privacy rules and overall increased risk to organizational data, third party vendor risk and increased threats both economic and cyber/risk, it is sometimes difficult to know where to start. (Understanding not just where your organization is and where you need to be, but building a map to get there.)

Solutions For Baselining and Ongoing Management

Cyturus Technologies and the Cloud Security Alliance Detroit Chapter hosted a moderated discussion with Erik Wille, the CISO for American Axle and Manufacturing on November 1, 2022. Walk through the process that he and his team are going through to partner with their business and technology stakeholders to build a system that not only helps them meet objectives of compliance requirements like CMMC, TISAX, and others, but also helps them align with their organizations chosen frameworks like NIST & ISO 27001. We discuss how the Cyturus platform provides a foundational model for continual improvement and prioritized risk remediation for TISAX and dozens of other frameworks and compliance mandates.

In this session Erik talks about his corporate journey and provides his real-world practical advice on how he and his peers in manufacturing are evaluating their policies, procedures, people and technology. Practically identifying cyber risks, measure, then strategically prioritize identified gaps, and managing ongoing remediation and reporting.

Robert Hill from Cyturus Technologies shares how the technology platform he and his team developed, dramatically helps organizations reduce the time it takes to build a baseline, measure risk, prioritize remediation, track improvements.  In real time the CRT (Compliance & Risk Tracker) platform provides relevant metrics and reporting to both inside stakeholders and outside business partners.

We discuss practical steps strengthen risk posture and gain competitive advantage and ensure continuous improvement.

Contributor Bios

Erik Wille is the Chief Information Security Officer for American Axle & Manufacturing.  In this role he is responsible for the Global Information Security program, Networking Operations and End User Computing.  He is passionate about transforming security into a game changing business differentiator driving risk centric results in a complex environment while empowering employees to make sound risk decisions in and out of the office.

Prior to joining AAM, Erik was the Head of Information Security for Penske Automotive Group where he had the opportunity to build a global information security program from the ground up

Erik is the VP and Treasurer for the Detroit CSA chapter, Co-Host on the Great Security Debate Podcast, holds a bachelor’s and master’s degree in Information Assurance from Walsh College and is certified as a CISSP, GPEN, GWAPT and CCSK.

Robert Hill is the Founder and CEO of Cyturus Technologies, Inc., and has spent over 30 years in the IT space promoting significant and measurable reductions in business risk through applied cybersecurity practices, programs, and technologies. Prior to founding Cyturus, Robert worked as an industry leading cybersecurity consultant often featured on Network News broadcasts, seen on stage as a forum panelist, and found in Fortune 500 conference rooms discussing cybersecurity risk in business terms.

Robert is a member of the FBI InfraGard, is a Certified Information Systems Security Professional (CISSP) and attended the University of Alabama at Birmingham where he received his degree in Biomedical Clinical Engineering. Robert has received recognition from the Department of Homeland Security for his efforts as a First Responder and Disaster Relief Coordinator for ADRA International, a Humanitarian Relief organization.

David Glenn (moderator) is the Chief Revenue Officer for Cyturus Technologies, Inc. and has 30 years in Information Technology, and 20+ years in Cybersecurity business and technical leadership and innovation.


Add a Comment

Your email address will not be published. Required fields are marked *