Outdated Strategies In Maritime Cyber Security

The process of digital transformation has impacted all sectors of society, including the maritime shipping and port sector. Many port operators have increasingly tried to integrated cyber technology into port activities to increase their competitiveness. Unfortunately, digitalisation has become the major vulnerability for the emerging cyber threat.

The International Association of Ports and Harbors’ (IAPH) cyber security guidelines are intended to help senior executive decision makers make an objective assessment on the readiness of ports and port facilities to prevent, stop and recover from a cyber attack.

Patrick Verhoeven, IAPH managing director, commented: “We have produced this set of port and port facilities cybersecurity guidelines targeting the strategic rather than technical level. They are designed to create awareness among the C-level management of port authorities.” 

In June 2017 the Maersk shipping company was hit by a cyber attack from the purely destructive NotPetya virus. The virus entered Maersk’s systems through a widely used piece of tax accounting software in Ukraine. Maersk was not the intended target for the attack, but the consequences for the company were very real. The virus spread through the company globally and made all their applications and data unavailable for several days. Real world operations, including its Rotterdam terminal, were seriously affected, with losses in the region of $200-300million. 

What Are The Resources Needed?

The new guidelines address the question of what port organisations need in terms of resources to effectively manage cyber security risks. These guidelines have been produced from the work of 22 experts from IAPH member ports from around the world as well as Associate Member cyber security specialists and contributors from the World Bank.

The guidelines have been submitted to both the IMO Facilitation and Maritime Safety Committees for consideration. They form part of the joint industry call Accelerating Digitalisation of Maritime Trade and Logistics: A Call to Action led by IAPH in June last year, which includes reviewing existing IMO guidance on Maritime Cyber Risk Management on its ability to address cyber risks in ports, developing additional guidance where needed.

Gov.UK:        Kaspersky:         Thetius:        Port Strategy:        Science Direct:     Springer

You Might Also Read:

Maritime Cyber Security Has Missing Parts:

 

« Police Get New Tools To Process Digital Evidence
Ransomware: One Percent Makes A Big Impact »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Bunifu Technologies

Bunifu Technologies

Bunifu Technologies is an Information Security and Custom Software Development Company.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.