SlideShare a Scribd company logo
1 of 3
Download to read offline
©Copyright Regency IT Consulting
Maritime Security:
IMO Secretary
General and the
MSC Prioritise
Cyber Security
At the MSC's 95th meeting in
early June 2015, IMO Secretary
General Koji Sekimizu opened
with an address that elevated
cyber ahead of all the other
security risks facing the
industry1
. When you consider
that the headline grabbing
issues of migration, ecology,
safety and piracy have been
seemingly ever-present in the
national media throughout
recent years, it is interesting
and encouraging to the security
professional to note that the
MSC placed cyber 4th on the
meeting's agenda and made a
distinct statement by having a
separate discussion on piracy2
.
Historical Underexposure
Piracy has long been in the
limelight because of the scale,
the violence involved, its links
to international terrorism and
its accessibility to mass media.
Then there's the matter of the
multi-state-sponsored physical
response to piracy in the form
of the naval task forces with
embedded journalists. By
1
IMO (2015). Address of the
Secretary-General at the Opening of
the 95th Session of the MSC.
2
IMO (2014). Provisional Agenda for
the 95th Session of the MSC.
3
Lancaster University (2014). The
Future of Maritime Cyber Security.
comparison, cybercrime has no
public face, operates under a
cloak of mystery and attacks do
not result in images of
casualties being broadcast on
24-hour news.
It's not just media
underexposure that has kept
maritime cyber security in the
shadows - actual events are
very hard to come by. Taking
capability and intent into
consideration, why would a
pirate resort to technical
methods of attack when only a
few colleagues, a small vessel
and some firearms are required
for a small operation?
Why Now?
A small but growing body of
academics34
and professional
commentators567
are at pains to
4
Security Association for the Maritime
Industry (2014). Seaworthiness &
Cyber Security: The Hidden Threat to
Shipping.
5
Gooding, N (2015). Maritime Cyber
Attack: A Clear and Present Danger.
point out that maritime cyber
security is an underdeveloped
area that, if not coherently
addressed, will likely result in a
significant failure of critical
infrastructure or loss of life in
the near future as over 50% of
European goods are
transported by maritime
carriers8
. The exact figure was
up 4% from the previous
decade and is projected to
grow. The operation of digital
navigation systems and other
radio communication
equipment at sea and in port
are vulnerable.
Evidenced Weaknesses
Demonstrations by interested
security parties have been
successful in evidencing that a
ship can be remotely operated
by injecting radio signals into a
GPS antenna, spoofing an
Automatic Identification System
to mimic the movements of
other vessels in the area or
forecast weather conditions
that would likely make a ship
change its course, penetrating
74% of the largest container
carrying company websites to
highlight security flaws and
penetrating maritime satellite
communications using Inmarsat
and Iridium SATCOM terminals
to expose critical security
issues.
6
IBM (2014). Implications and Threats
of Cyber Security for Ports.
7
Marsh & McLennan Companies (2014).
The Risk of Cyber-Attack to the
Maritime Sector.
8
ENISA (2011). Analysis of Cyber
Security in the Maritime Sector.
In 2014, NCC Group published
its findings on the
vulnerabilities of a commercially
available ECDIS used by ships
to navigate in place of hard
copy charts9
.
NCC Group noted that it is
common for ECDIS to be
connected to a ship’s internal
network as well as the Internet,
thus providing a greater attack
surface. The paper pointed out
that some manufacturers of
ECDIS devices advise operators
to maintain an Internet link so
that the latest charts and data
can be immediately available.
Also in 2014, Cyberkeel and
ClearSky compiled a paper
detailing their evaluation of the
risks to maritime cyber,
identifying 3 reasons why cyber
security is not as advanced in
the maritime industry as it is in
other sectors: it is viewed as a
technical matter customarily
delegated to the IT Manager or
the CIO, a lack of awareness of
actual occurrences exists and
there is a wide-held belief that
the threat is theoretical (there
are insufficient suitably
equipped and motivated threat
sources) 10
.
Current Methods of Actual
Attack
The Cyberkeel and ClearSky
paper detailed some of the
attacks to date such as barcode
scanners being used as hacking
devices, deleting carrier
location information, gaining
9
NCC Group (2014). Preparing for
Cyber Battleships: Electronic Chart
Display and Information System
Security.
10
Cyberkeel (2014). Maritime Cyber-
Risks.
11
Panda Security (2015). Operation Oil
Tanker: The Phantom Menace.
12
Baltic and International Maritime
Council (BIMCO) - an independent
international shipping association;
backdoor access to steal
information, the amendment of
cargo details with the aim of
transporting illicit goods
undetected and GPS jamming.
The Regulatory Situation
There are no maritime cyber
regulations or industry-
sponsored best practices in
circulation, resulting in a culture
of companies failing to report
incidents for fear of reputational
damage11
. A best practice is
being developed by a body of
companies12
but this measure
was only just announced on 15
April 201513
.
There is presently no IEC
standard for the safe
implementation of digital
navigation systems or radio
communications systems,
although IEC TC80 is in
development and due to be
published in early 2016.
International Chamber of Shipping
(ICS) - the principal international trade
association for merchant ship owners
and operator; INTERTANKO - an
independent body that provides
leadership to the tanker industry;
INTERCARGO - a global cargo
transporter; Cruise Lines International
Association (CLIA) - North America's
largest global cruise industry
organisation; Comité International
MSC 95 Outcomes
The MSC urged member states
and international organizations
to collaborate on proposals for
guidance on maritime cyber
security and submit them to the
next session in 201614
, as its
own Round Table Working
Group continues to make
progress on regulatory and best
practice proposals on: cyber
awareness and education,
developing a risk-based
framework, protecting business
critical assets, establishing
information system policies,
integrating holistic security and
business continuity, identifying
third-party relationships that
could compromise cyber
security, monitoring systems
and network management,
developing contingency plans
and continuous review and
assessment of cyber systems
for robustness15
.
Filling the Gap in Security
Although it could be up to
another year before the MSC
and IEC announce their
respective security solutions,
companies can take action now.
Regency IT Consulting offers
strategy, design, delivery,
assurance and audit of the
technical, procedural and
physical aspects of security.
The Managed Services include a
Secure Data Centre, Managed
Encryption, SCADA security and
Credential Management as a
Service.
Radio-Maritime (CIRM) - the principal
international association for marine
electronics companies.
13
BIMCO (2015). Round Table Press
Release.
14
Maritime Safety Committee (2015).
95th Session, 3-12 June 2015.
15
IMO (2015). Measures to Enhance
Maritime Security.
Our security consultants are all
senior people with long track
records of delivering security
services within the public and
private sectors. All have gained
their experience either within
Central Government where they
held roles either within CESG
(the UK National Technical
Authority for Information
Assurance), the military, as IT
Security Officers for
Government Departments or
with blue chip suppliers
providing secure IT systems to
Central Government and the
MoD. All are security cleared to
the highest UK Government
levels and where necessary are
members of the CESG Listed
Advisor Scheme (CLAS). The
majority of our security
consultants are ISO/IEC
27001:2013 Lead Auditors.
In August 2010, Regency IT
Consulting was acquired by
Airbus Defence & Space to
further strengthen their
presence in the UK Information
Assurance and Cyber Security
market. Airbus Defence &
Space is a world-leader in global
security solutions and systems,
providing lead system
integration and value-added
products and services to civil
and military customers around
the globe including naval, land
and joint systems, cyber
security, secure
communications, test systems,
services, support solutions and
intelligence and surveillance.
What Next?
Visit www.regencyitc.co.uk to
see what we have already done
for others and can offer you, or
call 01242 225699 to speak to a
member of the team.

More Related Content

What's hot

Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project ProposalChris Young
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?zapp0
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 

What's hot (17)

Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Pt08 19 final1
Pt08 19 final1Pt08 19 final1
Pt08 19 final1
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 

Similar to Global Maritime Cyber Strategy

20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptxpeterdsouza28
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Cyber piracy threat analysis
Cyber piracy threat analysisCyber piracy threat analysis
Cyber piracy threat analysisYongHyun Jo
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comMaritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comNihal Peter Moraes
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA AdamAdler10
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxMARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxalfredacavx97
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...IJNSA Journal
 
Mr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwaitMr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwaitpromediakw
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityEES Africa (Pty) Ltd
 

Similar to Global Maritime Cyber Strategy (20)

20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Cyber piracy threat analysis
Cyber piracy threat analysisCyber piracy threat analysis
Cyber piracy threat analysis
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comMaritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
 
Cyber-Attack.pptx
Cyber-Attack.pptxCyber-Attack.pptx
Cyber-Attack.pptx
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxMARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
 
Mr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwaitMr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwait
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port Security
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Global Maritime Cyber Strategy

  • 1. ©Copyright Regency IT Consulting Maritime Security: IMO Secretary General and the MSC Prioritise Cyber Security At the MSC's 95th meeting in early June 2015, IMO Secretary General Koji Sekimizu opened with an address that elevated cyber ahead of all the other security risks facing the industry1 . When you consider that the headline grabbing issues of migration, ecology, safety and piracy have been seemingly ever-present in the national media throughout recent years, it is interesting and encouraging to the security professional to note that the MSC placed cyber 4th on the meeting's agenda and made a distinct statement by having a separate discussion on piracy2 . Historical Underexposure Piracy has long been in the limelight because of the scale, the violence involved, its links to international terrorism and its accessibility to mass media. Then there's the matter of the multi-state-sponsored physical response to piracy in the form of the naval task forces with embedded journalists. By 1 IMO (2015). Address of the Secretary-General at the Opening of the 95th Session of the MSC. 2 IMO (2014). Provisional Agenda for the 95th Session of the MSC. 3 Lancaster University (2014). The Future of Maritime Cyber Security. comparison, cybercrime has no public face, operates under a cloak of mystery and attacks do not result in images of casualties being broadcast on 24-hour news. It's not just media underexposure that has kept maritime cyber security in the shadows - actual events are very hard to come by. Taking capability and intent into consideration, why would a pirate resort to technical methods of attack when only a few colleagues, a small vessel and some firearms are required for a small operation? Why Now? A small but growing body of academics34 and professional commentators567 are at pains to 4 Security Association for the Maritime Industry (2014). Seaworthiness & Cyber Security: The Hidden Threat to Shipping. 5 Gooding, N (2015). Maritime Cyber Attack: A Clear and Present Danger. point out that maritime cyber security is an underdeveloped area that, if not coherently addressed, will likely result in a significant failure of critical infrastructure or loss of life in the near future as over 50% of European goods are transported by maritime carriers8 . The exact figure was up 4% from the previous decade and is projected to grow. The operation of digital navigation systems and other radio communication equipment at sea and in port are vulnerable. Evidenced Weaknesses Demonstrations by interested security parties have been successful in evidencing that a ship can be remotely operated by injecting radio signals into a GPS antenna, spoofing an Automatic Identification System to mimic the movements of other vessels in the area or forecast weather conditions that would likely make a ship change its course, penetrating 74% of the largest container carrying company websites to highlight security flaws and penetrating maritime satellite communications using Inmarsat and Iridium SATCOM terminals to expose critical security issues. 6 IBM (2014). Implications and Threats of Cyber Security for Ports. 7 Marsh & McLennan Companies (2014). The Risk of Cyber-Attack to the Maritime Sector. 8 ENISA (2011). Analysis of Cyber Security in the Maritime Sector.
  • 2. In 2014, NCC Group published its findings on the vulnerabilities of a commercially available ECDIS used by ships to navigate in place of hard copy charts9 . NCC Group noted that it is common for ECDIS to be connected to a ship’s internal network as well as the Internet, thus providing a greater attack surface. The paper pointed out that some manufacturers of ECDIS devices advise operators to maintain an Internet link so that the latest charts and data can be immediately available. Also in 2014, Cyberkeel and ClearSky compiled a paper detailing their evaluation of the risks to maritime cyber, identifying 3 reasons why cyber security is not as advanced in the maritime industry as it is in other sectors: it is viewed as a technical matter customarily delegated to the IT Manager or the CIO, a lack of awareness of actual occurrences exists and there is a wide-held belief that the threat is theoretical (there are insufficient suitably equipped and motivated threat sources) 10 . Current Methods of Actual Attack The Cyberkeel and ClearSky paper detailed some of the attacks to date such as barcode scanners being used as hacking devices, deleting carrier location information, gaining 9 NCC Group (2014). Preparing for Cyber Battleships: Electronic Chart Display and Information System Security. 10 Cyberkeel (2014). Maritime Cyber- Risks. 11 Panda Security (2015). Operation Oil Tanker: The Phantom Menace. 12 Baltic and International Maritime Council (BIMCO) - an independent international shipping association; backdoor access to steal information, the amendment of cargo details with the aim of transporting illicit goods undetected and GPS jamming. The Regulatory Situation There are no maritime cyber regulations or industry- sponsored best practices in circulation, resulting in a culture of companies failing to report incidents for fear of reputational damage11 . A best practice is being developed by a body of companies12 but this measure was only just announced on 15 April 201513 . There is presently no IEC standard for the safe implementation of digital navigation systems or radio communications systems, although IEC TC80 is in development and due to be published in early 2016. International Chamber of Shipping (ICS) - the principal international trade association for merchant ship owners and operator; INTERTANKO - an independent body that provides leadership to the tanker industry; INTERCARGO - a global cargo transporter; Cruise Lines International Association (CLIA) - North America's largest global cruise industry organisation; Comité International MSC 95 Outcomes The MSC urged member states and international organizations to collaborate on proposals for guidance on maritime cyber security and submit them to the next session in 201614 , as its own Round Table Working Group continues to make progress on regulatory and best practice proposals on: cyber awareness and education, developing a risk-based framework, protecting business critical assets, establishing information system policies, integrating holistic security and business continuity, identifying third-party relationships that could compromise cyber security, monitoring systems and network management, developing contingency plans and continuous review and assessment of cyber systems for robustness15 . Filling the Gap in Security Although it could be up to another year before the MSC and IEC announce their respective security solutions, companies can take action now. Regency IT Consulting offers strategy, design, delivery, assurance and audit of the technical, procedural and physical aspects of security. The Managed Services include a Secure Data Centre, Managed Encryption, SCADA security and Credential Management as a Service. Radio-Maritime (CIRM) - the principal international association for marine electronics companies. 13 BIMCO (2015). Round Table Press Release. 14 Maritime Safety Committee (2015). 95th Session, 3-12 June 2015. 15 IMO (2015). Measures to Enhance Maritime Security.
  • 3. Our security consultants are all senior people with long track records of delivering security services within the public and private sectors. All have gained their experience either within Central Government where they held roles either within CESG (the UK National Technical Authority for Information Assurance), the military, as IT Security Officers for Government Departments or with blue chip suppliers providing secure IT systems to Central Government and the MoD. All are security cleared to the highest UK Government levels and where necessary are members of the CESG Listed Advisor Scheme (CLAS). The majority of our security consultants are ISO/IEC 27001:2013 Lead Auditors. In August 2010, Regency IT Consulting was acquired by Airbus Defence & Space to further strengthen their presence in the UK Information Assurance and Cyber Security market. Airbus Defence & Space is a world-leader in global security solutions and systems, providing lead system integration and value-added products and services to civil and military customers around the globe including naval, land and joint systems, cyber security, secure communications, test systems, services, support solutions and intelligence and surveillance. What Next? Visit www.regencyitc.co.uk to see what we have already done for others and can offer you, or call 01242 225699 to speak to a member of the team.