Maritime Cyber Security Has Missing Parts

Cyberspace and the maritime environment are integrated and, therefore, share vulnerabilities and as the cyber attack, hacking and threat landscape continues to change fast, global maritime cyber security needs far more international collaboration.  

Ships are increasingly using systems that rely on digitisation, digitalisation, integration, and automation, which call for cyber risk management on board. As technology continues to develop, information technology (IT) and operational technology (OT) onboard ships are being networked together, and more frequently connected to the Internet.

The US National Maritime Cyber Security Plan has the same limits as any broad strategic vision. The document focuses on three areas of needed actions:

  • Assessing risks and developing standards of protection.
  • Ensuring information and intelligence sharing between the public and private sectors.
  • Creating a maritime cyber security workforce.

Now, Cyware a Virtual Cyber Fusion Platform provider, has partnered with the US Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to engage with the maritime community’s ability to collect and share threat intelligence in real time. Cyware's purpose aim is to ensure MTS-ISAC’s runs a more efficient end-to-end security automation, cyber security operations with threat hunting and incident response programs. 

The MTS-ISAC aims to improve cyber risk management across the MTS community through collaboration around intelligence, identification, information protection, detection, response and recovery. 

MTS-ISAC has emerged as a trusted point of coordination for some of the most influential private and public sector stakeholders in the global maritime community, representing ports, terminal operators, vessel operators, cruise, classification societies, energy and government industry stakeholders.

Cyware’s Virtual Cyber Fusion Platform delivers next-generation security orchestration, automation and response (SOAR) in tandem with automated threat intelligence, allowing organisations to more easily share threat data and collaborate on threat response. This unique combination results in greater visibility into an organisation’s security operations and allows for secure information sharing between partners. 

Whether the target is ships, humans, or logistics chains, the maritime environment continues to be vastly underappreciated for its cybersecurity risks and, ultimately, represents a major and underserved economic vulnerability.

Cyware allows MTS-ISAC to collect and share security alerts on the changing threat landscape and intelligence around specific attacks in the maritime transportation industry. Cyware’s Situation Awareness Platform and Threat Intelligence Exchange, MTS-ISAC members can also automatically share threat intelligence with each other and this includes indicators of compromise, malware alerts, vulnerability advisories, security incidents, and phishing attacks among its global maritime community, according to the company’s announcement.

 War On The Rocks:         ICS Shipping:        I-HLS:

You Might Also Read: 

Maritime Shipping Is A Prime Target In 2021:

 

 

 

« Results: NATO’s 2021 Cyber War Game
Significant Growth In State-Sponsored Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.