The Maritime Industry's Slow Boat To Cybersecurity

Despite the critical role the maritime transportation system plays in the economic health of the United States, and despite its fairly recent embrace of all things automated, cranes, vehicles, surveillance and even vessels, the sector has been slow to warm to the need to protect its digital systems and assets.

Post 9/11, security concerns about the nation’s borders, air space and infrastructure, including ports, moved front and center for a brief moment before other concerns, like the search for victims and perpetrators, the cleanup of the site and city, and legislative debate over homeland security needs versus long-held citizen rights, pushed infrastructure to a back burner. Critics kept up a steady drumbeat of worry over the safety of the nation’s ports. In the ensuing years, as port automation grew, physical security was upgraded and nailed down, helped in part by the government’s Port Security Grant program.

Talk about cyber security plodded along under the radar until the publication of two damning reports that took the nation’s ports, the US Coast Guard and Homeland Security Department to task for not aggressively or adequately addressing port cyber vulnerabilities.

Published in 2013, the Brookings Institution’s “The Critical Infrastructure Gap: US Port Facilities and Cyber Vulnerabilities,” is still considered valid today.  Published in 2014 by US General Accounting Office, “Maritime Critical Infrastructure Protection” directed its critique primarily at the US Coast Guard, which it said had failed to conduct a risk assessment that “fully addressed cyber threats, vulnerabilities and consequences.” 

The General Accounting Office also complained that both maritime security plans required by law, and regulation generally, also did not identify or address those same issues.  

“...Two if by Sea”
Perhaps spurred by those two reports, concern about lax port cyber security exploded in 2015, as the alarm was sounded loudly one after another, by a raft of industry organisations, government agencies here and abroad, academia, insurance companies, standards groups, think tanks and researchers. 

Almost simultaneous, together they released a wave of reports, seminars, white papers, primers, strategic plans, directives, resolutions, and even some legislative calls for assessment and information sharing - all addressing what they saw as a deeply worrisome lack of awareness, concern and action addressing the cyber security vulnerabilities of the nation’s ports.
Particularly alarmed were participants in a Maritime Cyber Security Symposium hosted in 2015 by the Command, Control and Interoperability Center for Advanced Data Analysis (CCICADA), where speakers warned that “Maritime Cyber Attacks Occur in a World of the ‘Quick and the Dead,’ and that “Cyber Attacks on Ports and Ships Could be Catastrophic.”

Maritime executives too came in for their share of criticism for failing to take the lead in making cyber security a priority, while the sloppy cyber hygiene of employees on the front line got them labeled as the weakest link.

Wherever you looked, regardless of source, the message was loud and clear, do something about cyber security or face serious business consequences, even regulation. By 2016, the focus was squarely on education, especially crew, and raising awareness that cyber security was a real and pressing danger and that a cultural shift needed to take place, placing cyber security on the same plane as safety management.

Now two-thirds of the way through 2018, much of the preceding 2.5 years also has been spent publishing cyber security guides and checklists, strengthening regulatory directives, completing five-year facility security plans, conducting cyber risk assessments, deploying mitigation efforts, and building relationships in the far-flung, highly complex and competitive port community through participation, in part, in the USCG’s Area Maritime Security Committees (AMSC), and their cyber subcommittees, which can be found in most key port areas.  

ASMCs are comprised of representatives from the USCG, government agencies, law enforcement, shippers, port authorities, terminal operators, harbor vessels, even some clients, all working to identify and address security issues, as well as share information and create best practices, in their areas of operation.

Some of the changes we’ll see this year into next is a much greater emphasis on cyber risk management, resiliency and collaboration, as the cyber security community tries to defend against complacency (even the best security efforts will take a hit at some point) by getting maritime companies and ports to create contingency plans to enable them to recover as painlessly as possible from a successful attack, and to encourage them to work collaboratively on building best practices and sharing information about attempted and successful cyber-attacks.

MarineLink

You Might Also Read: 

COSCO Cyber Attack And The Importance Of Maritime Cybersecurity:

Cybersecurity At Sea:
 

« White House To Step Up Cyber Counter-Offensive
Insurance Experts Expect Higher Cyber Losses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.