Maritime Cyber Security Has Missing Parts

Cyberspace and the maritime environment are integrated and, therefore, share vulnerabilities and as the cyber attack, hacking and threat landscape continues to change fast, global maritime cyber security needs far more international collaboration.  

Ships are increasingly using systems that rely on digitisation, digitalisation, integration, and automation, which call for cyber risk management on board. As technology continues to develop, information technology (IT) and operational technology (OT) onboard ships are being networked together, and more frequently connected to the Internet.

The US National Maritime Cyber Security Plan has the same limits as any broad strategic vision. The document focuses on three areas of needed actions:

  • Assessing risks and developing standards of protection.
  • Ensuring information and intelligence sharing between the public and private sectors.
  • Creating a maritime cyber security workforce.

Now, Cyware a Virtual Cyber Fusion Platform provider, has partnered with the US Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to engage with the maritime community’s ability to collect and share threat intelligence in real time. Cyware's purpose aim is to ensure MTS-ISAC’s runs a more efficient end-to-end security automation, cyber security operations with threat hunting and incident response programs. 

The MTS-ISAC aims to improve cyber risk management across the MTS community through collaboration around intelligence, identification, information protection, detection, response and recovery. 

MTS-ISAC has emerged as a trusted point of coordination for some of the most influential private and public sector stakeholders in the global maritime community, representing ports, terminal operators, vessel operators, cruise, classification societies, energy and government industry stakeholders.

Cyware’s Virtual Cyber Fusion Platform delivers next-generation security orchestration, automation and response (SOAR) in tandem with automated threat intelligence, allowing organisations to more easily share threat data and collaborate on threat response. This unique combination results in greater visibility into an organisation’s security operations and allows for secure information sharing between partners. 

Whether the target is ships, humans, or logistics chains, the maritime environment continues to be vastly underappreciated for its cybersecurity risks and, ultimately, represents a major and underserved economic vulnerability.

Cyware allows MTS-ISAC to collect and share security alerts on the changing threat landscape and intelligence around specific attacks in the maritime transportation industry. Cyware’s Situation Awareness Platform and Threat Intelligence Exchange, MTS-ISAC members can also automatically share threat intelligence with each other and this includes indicators of compromise, malware alerts, vulnerability advisories, security incidents, and phishing attacks among its global maritime community, according to the company’s announcement.

 War On The Rocks:         ICS Shipping:        I-HLS:

You Might Also Read: 

Maritime Shipping Is A Prime Target In 2021:

 

 

 

« Results: NATO’s 2021 Cyber War Game
Significant Growth In State-Sponsored Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Kinetik Solutions

Kinetik Solutions

We specialise in backup and disaster recovery solutions to protect your business.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Sanderson

Sanderson

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.