Maritime Cyber Security Has Missing Parts

Cyberspace and the maritime environment are integrated and, therefore, share vulnerabilities and as the cyber attack, hacking and threat landscape continues to change fast, global maritime cyber security needs far more international collaboration.  

Ships are increasingly using systems that rely on digitisation, digitalisation, integration, and automation, which call for cyber risk management on board. As technology continues to develop, information technology (IT) and operational technology (OT) onboard ships are being networked together, and more frequently connected to the Internet.

The US National Maritime Cyber Security Plan has the same limits as any broad strategic vision. The document focuses on three areas of needed actions:

  • Assessing risks and developing standards of protection.
  • Ensuring information and intelligence sharing between the public and private sectors.
  • Creating a maritime cyber security workforce.

Now, Cyware a Virtual Cyber Fusion Platform provider, has partnered with the US Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to engage with the maritime community’s ability to collect and share threat intelligence in real time. Cyware's purpose aim is to ensure MTS-ISAC’s runs a more efficient end-to-end security automation, cyber security operations with threat hunting and incident response programs. 

The MTS-ISAC aims to improve cyber risk management across the MTS community through collaboration around intelligence, identification, information protection, detection, response and recovery. 

MTS-ISAC has emerged as a trusted point of coordination for some of the most influential private and public sector stakeholders in the global maritime community, representing ports, terminal operators, vessel operators, cruise, classification societies, energy and government industry stakeholders.

Cyware’s Virtual Cyber Fusion Platform delivers next-generation security orchestration, automation and response (SOAR) in tandem with automated threat intelligence, allowing organisations to more easily share threat data and collaborate on threat response. This unique combination results in greater visibility into an organisation’s security operations and allows for secure information sharing between partners. 

Whether the target is ships, humans, or logistics chains, the maritime environment continues to be vastly underappreciated for its cybersecurity risks and, ultimately, represents a major and underserved economic vulnerability.

Cyware allows MTS-ISAC to collect and share security alerts on the changing threat landscape and intelligence around specific attacks in the maritime transportation industry. Cyware’s Situation Awareness Platform and Threat Intelligence Exchange, MTS-ISAC members can also automatically share threat intelligence with each other and this includes indicators of compromise, malware alerts, vulnerability advisories, security incidents, and phishing attacks among its global maritime community, according to the company’s announcement.

 War On The Rocks:         ICS Shipping:        I-HLS:

You Might Also Read: 

Maritime Shipping Is A Prime Target In 2021:

 

 

 

« Results: NATO’s 2021 Cyber War Game
Significant Growth In State-Sponsored Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.