Outdated Strategies In Maritime Cyber Security

The process of digital transformation has impacted all sectors of society, including the maritime shipping and port sector. Many port operators have increasingly tried to integrated cyber technology into port activities to increase their competitiveness. Unfortunately, digitalisation has become the major vulnerability for the emerging cyber threat.

The International Association of Ports and Harbors’ (IAPH) cyber security guidelines are intended to help senior executive decision makers make an objective assessment on the readiness of ports and port facilities to prevent, stop and recover from a cyber attack.

Patrick Verhoeven, IAPH managing director, commented: “We have produced this set of port and port facilities cybersecurity guidelines targeting the strategic rather than technical level. They are designed to create awareness among the C-level management of port authorities.” 

In June 2017 the Maersk shipping company was hit by a cyber attack from the purely destructive NotPetya virus. The virus entered Maersk’s systems through a widely used piece of tax accounting software in Ukraine. Maersk was not the intended target for the attack, but the consequences for the company were very real. The virus spread through the company globally and made all their applications and data unavailable for several days. Real world operations, including its Rotterdam terminal, were seriously affected, with losses in the region of $200-300million. 

What Are The Resources Needed?

The new guidelines address the question of what port organisations need in terms of resources to effectively manage cyber security risks. These guidelines have been produced from the work of 22 experts from IAPH member ports from around the world as well as Associate Member cyber security specialists and contributors from the World Bank.

The guidelines have been submitted to both the IMO Facilitation and Maritime Safety Committees for consideration. They form part of the joint industry call Accelerating Digitalisation of Maritime Trade and Logistics: A Call to Action led by IAPH in June last year, which includes reviewing existing IMO guidance on Maritime Cyber Risk Management on its ability to address cyber risks in ports, developing additional guidance where needed.

Gov.UK:        Kaspersky:         Thetius:        Port Strategy:        Science Direct:     Springer

You Might Also Read:

Maritime Cyber Security Has Missing Parts:

 

« Police Get New Tools To Process Digital Evidence
Ransomware: One Percent Makes A Big Impact »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.