SlideShare a Scribd company logo
Senza il preventivo consenso di SI-IES s.r.l. non deve essere
resa nota a terze parti ne riprodotta, sotto qualsiasi formato,
l’informazione contenuta in questa proposta
Critical Infrastructure and Cyber security
Transportation Sector
UNECE
Working Party on Transport Trends and Econoimcs
Diary
Trasportation Sector Analysis
Critical Infrastructures LEGAL FRAMEWORK
Interdependencies
Sustainable Strategic Path
Focus on Maritime CI
Proposed approach identified by Dual Cipp
Scenarios proposed in DUAL Cipp
Conclusion
Contact Us
-1-
Trasportation Sector Analysis
-2-
In our mobile society transport is a key sector of the economy and sustains over 11 million jobs in EU.
• efficiency
• safety and security
• sustainability (green transport technologies)
• Sustainable mobility
• Passenger safety and security
• Data protection and privacy
• ID management and access control
• Traffic and vehicle management
• Overload, congestion, delays
• Energy and environmental issues
• Sales, fees and charges
• Resilience management structure
CRITICALFUNCTIONS
Transportation has played a key role in the development of our society.
Several changes are affecting this sector.
The question is: are we ready for this or not?
The arrival of new technologies and services that help cities and vehicles can
reach a global value up to 2.5 Trillion per year in 2025.
The information everywhere World has opened up new opportunities to make the
existing transportation network far more efficient and user friendly.
Trasportation Sector Analysis
-3-
Trasportation Attacks in a Digital Age:
• Increasing dependence on technology and web-based communication has amplified cyber threaths.
• It is fundamental to protect transport infrastructures because of the rising number and increasing
complexity of cyber attacks.
• It is essential to provide reliable and safe transport infrastructure solutions and to guarantee that
transportation remains open, operating and safe for people depending on it
• Crimeware
• Cyber business/industrial
Espionage
• Insider Misuse
• Web App Attacks
• Network-damaging attempts
• Manipulation of access control
and monitoring systems
• Point-of-Sale Intrusions
• Software Errors
• Data Theft/Loss
• Payment Card Skimmers
• Denial of Service
• Natural hazards and
impairments
• Terrorism
Frequency
SECURITY THREATS
3° Target
Trasportation Sector Analysis
-6-
In the 2014 Cybe sec entered the top 10 gloabl risk on the Allianz risk
barometer.
More then 50% of Cyber Attacks are conducted on Country Critical
Infrastructure like electricity, water and oil and gas. 75% of the target are
industrial companies.
Most of those infrastructures were designed for resilience but never
designed with cber sec in mind.
-5-
Critical Infrastructure – LEGAL FRAMEWORK
Enisa Report on Cyber Sec challenges
in the Maritime Sector seems evident
that cyber threats are a growing
menace, spreading to all industry
sector that are relying on ICT systems.
Recent deliberate distruptions of
critical automatetion systems such as
stuxnet, prove that cyber attackes
have a significant impact on CI.
EU Critical Infrastructure
includes the the ocean and short
shipping ports as indicated in
the Directive 114/2008, and
concurrently critical part of the
supply chains and trasport
routes, transferring goods and
passengers.
EU PORTS:
- serve around 3,733 mln of
tons of freight flows
- 397 mln of passensger per
year
- 74% of goods entering or
leaving the EU by SEA
- 1.5 mln workers
Security and Emergency Management
-6-
Governance Cyber Protection Physical Protection
Security Model
Physical Protection
Identify vulnerabilities and gaps, prioritize and implement protection programs
Securing transport infrastructure in a structured consistent way.
Governance
 Definition of a Security and Emergency Control Room:
Structured and consistent continuous monitoring of security events detected by a centralized
control platform for efficient monitoring and prompt decision-making process
 Design of the platform according to a risk-based criteria. Identification of Relevant indicators
and sources of attack during critical cyber and physical events (e.g. potential attacks on ICS,
SCADA, navigation systems, physical access, energy systems maintenance and
management)
 Advanced Analytics and Big data analysis techniques for security, that guarantee new
levels of protection and control via data sources analysis
Core- implementation
Cyber Protection
Security and Emergency Management
-6-
Security and Emergency
Management
Control
Governance and Management
Security Service
Infrastructure
Network
Peripherals
Analysis and
process
Control Room
a) Analysis
b) Decision making
PORT HYBRID SECURITY SYSTEMS – REAL TIME ALERT
Security and Emergency Management
-6-
Cybersecurity
Strategy
Cybersecurity
Assessment
Cybersecurity
Operations
Infrastructure
and business
Resilience
Networks
Assessement
Testing
Hacking
Emerging
Tech
Assessment
Security
Compliance
with API
Telco
Network
Security
Hackers recently shut down a floating oil
rig by tilting it, while another rig was so
riddled with computer malware that it
took 19 days to make it seaworthy again;
Somali pirates help choose their targets
by viewing navigational data online,
prompting ships to either turn off their
navigational devices, or fake the data so
it looks like they’re somewhere else; and
hackers infiltrated computers connected
to the Belgian port of Antwerp, located
specific containers, made off with their
smuggled drugs and deleted the records.
Interdependencies
-8-
The state and operation of each infrastructure is correlated to the state of other infrastructures.
Dependency of one transport system on physical material output, transmission of information, local environmental effects,
operations of other transport systems of infrastructures.
[Physical, cyber, geographical, functional dependencis]
Risk assessment methodologies must take into account cross-sectoral dependencies and events that could affect simultaneously
several infrastructures.
Cascading effects
Cyberattacks could damage
port operations for weeks
or months, thereby
dramatically affecting trade
and commerce,
Sustainable Strategic Path
-10-
SECURITY PROFESSIONAL
SERVICES
SUSTAINABLE STRATEGIC PATH
CYBER INTELLIGENCE
PRODUCTS
Multi-expertise and knowledge
towards sophisticated analytic
tools
and enhanced protection
functionalities
Design of advanced security
systems – Intelligent Security
Platform
Updating, tailored and
coordinated solutions
CULTURE, ROLES, DUTIES
AND RESPONSIBILITIES
Distribution of responsabilities,
Interaction among relevant
bodies on national and
European scale,
Information sharing
GOVERNANCE AND
POLICY ROADMAP
Short, medium and long time
planning
-People
-Process
-Technology
Focus on Maritime CI
-10-
Ports
Physical
Cyber
Terminal
Operating
Systems
Industrial Control
Systems
Business
Operation
Systems
Access control
and monitoring
systemsPromotion of an innovative physical/cyber
intelligence solution will allow different
stakeholders active in port operations to
cooperate in managing the physicial and
cyber sec threats
The relevant legislation on port sec
is the ISPS Code (EU/725/2004 and
EU/65/2010) – Port Sec Plan
managed by Port Sec Officer – Port
Facility Sec Officer
Survey Piloting Standard
Incident
Response
Focus on Maritime CI
-10-
PORTS
Ports and Hinterland
SHIPS
PROPOSED APPROACH – IDENTIFIED BY DUAL CIPP
-10-
Maritime Security Plans do not fully
address cyber sec related threats,
vulnerability and other
considertions and the ports that
carried out a cyber security and
vulnerability assessment are
EXTREMELY LIMITED
Definition of competencees: The
coast guard officials are in charge
for the management of the VTS and
not for the cyebr threats
Physical intervention /
improvements: Need to provide
physical interventions like Fiber
optic cable installation
Organizzation: Institution of a Port
Coordination Center, Security
mainteinance programme,
Process:
Cyber Incident response plan
Human Capital:
Cyber sec training
Institution / Stakeholders:
Lack of Cyber sec awarness and
culture
Public Private Partnership
HYBRID PORT
DUAL CIPP PROJECT – SUBMITTED BY AN INTERNATIONAL CONSORTOIUM
COMPOSED BY 7 MS in the framework of H2020 CIP Call
SCENARIOS PROPOSED IN DUAL CIPP
-10-
Scenarios Events
Cyber attacks on logistic
transportation
Event 1: sending a PDF document to a key user that from a user’s perspective contains some
interesting data. However, opening this PDF triggers the execution of an attached exploit (for
a publicly known vulnerability in Adobe Reader) that silently installs a remote access service
on the computer .
Event 2: the hackers handle to get access to more sophisticated attack tools capable of
identifying and exploiting vulnerabilities that pertain to the in-vehicle communication
interfaces, e.g., mobile communications, near field communications, wireless sensor
networks, etc.
Event 3: engage into malicious activities spanning from simple phishing attacks (targeting
port authorities and key employees)
Event 4: the hackers exploit vulnerabilities in the surveillance system of the port that controls
the CCTV video cameras in order to gain access and delete video streams that show their
malicious activities.
CONCLUSIONS
-10-
NEED TO ADDRESS cyber vulnerabilities in the framework of the Maritime. These
potential vulnerabilities include limited cybersecurity training and preparedness
(human capital), errors in software (BUG), protection of commercial technologies,
network connectivity and interdependencies, foreign dependencies, global positioning
system jamming-spoofing.
A cyber attack on networks at a port or aboard a ship could generate
Lost cargo, port disruptions, Physical and environmental damage.
Several mitigation measures can increase the security and resiliency of ports: setting up
maritime cybersecurity standards, sharing information across the sector, conducting
routine vulnerability assessments, using best practices, mitigating insider threats, and
developing contingency plans for cyber attacks.
Knowledge is power - Francis Bacon
Contact Us
-12-
Director
European Services Institute
SI-IES s.r.l.
Sito web: www.si-ies.it
Andrea Chiappetta
e-mail a.chiappetta@si-ies.it
SI-Istituto Europeo Servizi S.r.l. European Services Institute – Sede Legale:Via Elio Lampridio Cerva 87/A 00143 Roma
THANK YOU
for your attention

More Related Content

What's hot

Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Steph Cliche
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
LeKhanhAnh
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
Dale Butler
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Marco Lisi
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
José Reynaldo Formigoni Filho, MSc
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information Security
Roberto Reale
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
GoogleNewsSubmit
 
The need for security
The need for securityThe need for security
The need for security
Dhani Ahmad
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
 

What's hot (11)

Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information Security
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
The need for security
The need for securityThe need for security
The need for security
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 

Viewers also liked

Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
Jack Whitsitt
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015tmuehleisen
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
Priyanka Aash
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
Carlos Moreno
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetJuniper Networks
 
Presentation
Presentation Presentation
Presentation
smarcos2119
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
Logitek Solutions
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
Symantec
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
AVEVA
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
Gwanhoo Lee
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Government Technology and Services Coalition
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
Kristian Alisasis Pura
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Eran Goldstein
 

Viewers also liked (20)

Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
Presentation
Presentation Presentation
Presentation
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Critical infrastructure
Critical infrastructureCritical infrastructure
Critical infrastructure
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 

Similar to Critical Infrastructure and Cybersecurity Transportation Sector

Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
European Services Institute
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
SITA
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
Antoine Vigneron
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
Ian Kelly
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev
Mona Al-achkar
 
The impact of technology on logistics
The impact of technology on logisticsThe impact of technology on logistics
The impact of technology on logistics
Natalie Jones
 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax Cybersec
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
Aparajita Banerjee
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
BigData_Europe
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
journalBEEI
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
Asset & Risk Management for Critical Infrastructures
Asset & Risk Management for Critical InfrastructuresAsset & Risk Management for Critical Infrastructures
Asset & Risk Management for Critical Infrastructures
Sim-CI
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
ambitlick
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
 

Similar to Critical Infrastructure and Cybersecurity Transportation Sector (20)

Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev0503 al achkar-jabbour_lebanese_univ_rev
0503 al achkar-jabbour_lebanese_univ_rev
 
The impact of technology on logistics
The impact of technology on logisticsThe impact of technology on logistics
The impact of technology on logistics
 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Asset & Risk Management for Critical Infrastructures
Asset & Risk Management for Critical InfrastructuresAsset & Risk Management for Critical Infrastructures
Asset & Risk Management for Critical Infrastructures
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
WIRELESS TRAFFIC SERVICE PLATFORM FOR COMBINED VEHICLE-TO-VEHICLE AND VEHICLE...
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 

More from European Services Institute

Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
 
La digitalizzazione della PA
La digitalizzazione della PALa digitalizzazione della PA
La digitalizzazione della PA
European Services Institute
 
Introduzione fonti rinnovabili
Introduzione fonti rinnovabiliIntroduzione fonti rinnovabili
Introduzione fonti rinnovabili
European Services Institute
 
Elementi di business plan
Elementi di business planElementi di business plan
Elementi di business plan
European Services Institute
 
Sanità in rete
Sanità in reteSanità in rete
Horizon 2020
Horizon 2020Horizon 2020
Condivisione di nuove reti in strutture esistenti condivisione cavodotti
Condivisione di nuove reti in strutture esistenti condivisione cavodottiCondivisione di nuove reti in strutture esistenti condivisione cavodotti
Condivisione di nuove reti in strutture esistenti condivisione cavodotti
European Services Institute
 
Perchè il cambiamento è un'opportunità
Perchè il cambiamento è un'opportunitàPerchè il cambiamento è un'opportunità
Perchè il cambiamento è un'opportunità
European Services Institute
 
FATTURA ELETTRONICA PA
FATTURA ELETTRONICA PAFATTURA ELETTRONICA PA
FATTURA ELETTRONICA PA
European Services Institute
 
Certificazione energetica
Certificazione energeticaCertificazione energetica
Certificazione energetica
European Services Institute
 
Sicurezza e qualità per il trasporto pubblico
Sicurezza e qualità per il trasporto pubblicoSicurezza e qualità per il trasporto pubblico
Sicurezza e qualità per il trasporto pubblico
European Services Institute
 
Videosorveglianza
VideosorveglianzaVideosorveglianza
Videosorveglianza
European Services Institute
 
Sicurezza nelle reti Wireless LAN
Sicurezza nelle reti Wireless LANSicurezza nelle reti Wireless LAN
Sicurezza nelle reti Wireless LAN
European Services Institute
 
Cloud e sanità
Cloud e sanitàCloud e sanità
Proposta SMART CITIES 4 ROME
Proposta SMART CITIES 4 ROMEProposta SMART CITIES 4 ROME
Proposta SMART CITIES 4 ROME
European Services Institute
 
Ipotesi impianti fotovoltaici
Ipotesi impianti fotovoltaiciIpotesi impianti fotovoltaici
Ipotesi impianti fotovoltaici
European Services Institute
 
Valorizzazione del territorio: il caso della Tuscia
Valorizzazione del territorio: il caso della TusciaValorizzazione del territorio: il caso della Tuscia
Valorizzazione del territorio: il caso della Tuscia
European Services Institute
 
the role of Big data and IoT in urban Transport
the role of Big data and IoT in urban Transportthe role of Big data and IoT in urban Transport
the role of Big data and IoT in urban Transport
European Services Institute
 
The Role of Big Data and IoT in Urban Transport
The Role of Big Data and IoT in Urban TransportThe Role of Big Data and IoT in Urban Transport
The Role of Big Data and IoT in Urban Transport
European Services Institute
 

More from European Services Institute (19)

Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
La digitalizzazione della PA
La digitalizzazione della PALa digitalizzazione della PA
La digitalizzazione della PA
 
Introduzione fonti rinnovabili
Introduzione fonti rinnovabiliIntroduzione fonti rinnovabili
Introduzione fonti rinnovabili
 
Elementi di business plan
Elementi di business planElementi di business plan
Elementi di business plan
 
Sanità in rete
Sanità in reteSanità in rete
Sanità in rete
 
Horizon 2020
Horizon 2020Horizon 2020
Horizon 2020
 
Condivisione di nuove reti in strutture esistenti condivisione cavodotti
Condivisione di nuove reti in strutture esistenti condivisione cavodottiCondivisione di nuove reti in strutture esistenti condivisione cavodotti
Condivisione di nuove reti in strutture esistenti condivisione cavodotti
 
Perchè il cambiamento è un'opportunità
Perchè il cambiamento è un'opportunitàPerchè il cambiamento è un'opportunità
Perchè il cambiamento è un'opportunità
 
FATTURA ELETTRONICA PA
FATTURA ELETTRONICA PAFATTURA ELETTRONICA PA
FATTURA ELETTRONICA PA
 
Certificazione energetica
Certificazione energeticaCertificazione energetica
Certificazione energetica
 
Sicurezza e qualità per il trasporto pubblico
Sicurezza e qualità per il trasporto pubblicoSicurezza e qualità per il trasporto pubblico
Sicurezza e qualità per il trasporto pubblico
 
Videosorveglianza
VideosorveglianzaVideosorveglianza
Videosorveglianza
 
Sicurezza nelle reti Wireless LAN
Sicurezza nelle reti Wireless LANSicurezza nelle reti Wireless LAN
Sicurezza nelle reti Wireless LAN
 
Cloud e sanità
Cloud e sanitàCloud e sanità
Cloud e sanità
 
Proposta SMART CITIES 4 ROME
Proposta SMART CITIES 4 ROMEProposta SMART CITIES 4 ROME
Proposta SMART CITIES 4 ROME
 
Ipotesi impianti fotovoltaici
Ipotesi impianti fotovoltaiciIpotesi impianti fotovoltaici
Ipotesi impianti fotovoltaici
 
Valorizzazione del territorio: il caso della Tuscia
Valorizzazione del territorio: il caso della TusciaValorizzazione del territorio: il caso della Tuscia
Valorizzazione del territorio: il caso della Tuscia
 
the role of Big data and IoT in urban Transport
the role of Big data and IoT in urban Transportthe role of Big data and IoT in urban Transport
the role of Big data and IoT in urban Transport
 
The Role of Big Data and IoT in Urban Transport
The Role of Big Data and IoT in Urban TransportThe Role of Big Data and IoT in Urban Transport
The Role of Big Data and IoT in Urban Transport
 

Recently uploaded

FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
jamalseoexpert1978
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Adam Smith
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 

Recently uploaded (20)

FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 

Critical Infrastructure and Cybersecurity Transportation Sector

  • 1. Senza il preventivo consenso di SI-IES s.r.l. non deve essere resa nota a terze parti ne riprodotta, sotto qualsiasi formato, l’informazione contenuta in questa proposta Critical Infrastructure and Cyber security Transportation Sector UNECE Working Party on Transport Trends and Econoimcs
  • 2. Diary Trasportation Sector Analysis Critical Infrastructures LEGAL FRAMEWORK Interdependencies Sustainable Strategic Path Focus on Maritime CI Proposed approach identified by Dual Cipp Scenarios proposed in DUAL Cipp Conclusion Contact Us -1-
  • 3. Trasportation Sector Analysis -2- In our mobile society transport is a key sector of the economy and sustains over 11 million jobs in EU. • efficiency • safety and security • sustainability (green transport technologies) • Sustainable mobility • Passenger safety and security • Data protection and privacy • ID management and access control • Traffic and vehicle management • Overload, congestion, delays • Energy and environmental issues • Sales, fees and charges • Resilience management structure CRITICALFUNCTIONS Transportation has played a key role in the development of our society. Several changes are affecting this sector. The question is: are we ready for this or not? The arrival of new technologies and services that help cities and vehicles can reach a global value up to 2.5 Trillion per year in 2025. The information everywhere World has opened up new opportunities to make the existing transportation network far more efficient and user friendly.
  • 4. Trasportation Sector Analysis -3- Trasportation Attacks in a Digital Age: • Increasing dependence on technology and web-based communication has amplified cyber threaths. • It is fundamental to protect transport infrastructures because of the rising number and increasing complexity of cyber attacks. • It is essential to provide reliable and safe transport infrastructure solutions and to guarantee that transportation remains open, operating and safe for people depending on it • Crimeware • Cyber business/industrial Espionage • Insider Misuse • Web App Attacks • Network-damaging attempts • Manipulation of access control and monitoring systems • Point-of-Sale Intrusions • Software Errors • Data Theft/Loss • Payment Card Skimmers • Denial of Service • Natural hazards and impairments • Terrorism Frequency SECURITY THREATS 3° Target
  • 5. Trasportation Sector Analysis -6- In the 2014 Cybe sec entered the top 10 gloabl risk on the Allianz risk barometer. More then 50% of Cyber Attacks are conducted on Country Critical Infrastructure like electricity, water and oil and gas. 75% of the target are industrial companies. Most of those infrastructures were designed for resilience but never designed with cber sec in mind.
  • 6. -5- Critical Infrastructure – LEGAL FRAMEWORK Enisa Report on Cyber Sec challenges in the Maritime Sector seems evident that cyber threats are a growing menace, spreading to all industry sector that are relying on ICT systems. Recent deliberate distruptions of critical automatetion systems such as stuxnet, prove that cyber attackes have a significant impact on CI. EU Critical Infrastructure includes the the ocean and short shipping ports as indicated in the Directive 114/2008, and concurrently critical part of the supply chains and trasport routes, transferring goods and passengers. EU PORTS: - serve around 3,733 mln of tons of freight flows - 397 mln of passensger per year - 74% of goods entering or leaving the EU by SEA - 1.5 mln workers
  • 7. Security and Emergency Management -6- Governance Cyber Protection Physical Protection Security Model Physical Protection Identify vulnerabilities and gaps, prioritize and implement protection programs Securing transport infrastructure in a structured consistent way. Governance  Definition of a Security and Emergency Control Room: Structured and consistent continuous monitoring of security events detected by a centralized control platform for efficient monitoring and prompt decision-making process  Design of the platform according to a risk-based criteria. Identification of Relevant indicators and sources of attack during critical cyber and physical events (e.g. potential attacks on ICS, SCADA, navigation systems, physical access, energy systems maintenance and management)  Advanced Analytics and Big data analysis techniques for security, that guarantee new levels of protection and control via data sources analysis Core- implementation Cyber Protection
  • 8. Security and Emergency Management -6- Security and Emergency Management Control Governance and Management Security Service Infrastructure Network Peripherals Analysis and process Control Room a) Analysis b) Decision making PORT HYBRID SECURITY SYSTEMS – REAL TIME ALERT
  • 9. Security and Emergency Management -6- Cybersecurity Strategy Cybersecurity Assessment Cybersecurity Operations Infrastructure and business Resilience Networks Assessement Testing Hacking Emerging Tech Assessment Security Compliance with API Telco Network Security Hackers recently shut down a floating oil rig by tilting it, while another rig was so riddled with computer malware that it took 19 days to make it seaworthy again; Somali pirates help choose their targets by viewing navigational data online, prompting ships to either turn off their navigational devices, or fake the data so it looks like they’re somewhere else; and hackers infiltrated computers connected to the Belgian port of Antwerp, located specific containers, made off with their smuggled drugs and deleted the records.
  • 10. Interdependencies -8- The state and operation of each infrastructure is correlated to the state of other infrastructures. Dependency of one transport system on physical material output, transmission of information, local environmental effects, operations of other transport systems of infrastructures. [Physical, cyber, geographical, functional dependencis] Risk assessment methodologies must take into account cross-sectoral dependencies and events that could affect simultaneously several infrastructures. Cascading effects Cyberattacks could damage port operations for weeks or months, thereby dramatically affecting trade and commerce,
  • 11. Sustainable Strategic Path -10- SECURITY PROFESSIONAL SERVICES SUSTAINABLE STRATEGIC PATH CYBER INTELLIGENCE PRODUCTS Multi-expertise and knowledge towards sophisticated analytic tools and enhanced protection functionalities Design of advanced security systems – Intelligent Security Platform Updating, tailored and coordinated solutions CULTURE, ROLES, DUTIES AND RESPONSIBILITIES Distribution of responsabilities, Interaction among relevant bodies on national and European scale, Information sharing GOVERNANCE AND POLICY ROADMAP Short, medium and long time planning -People -Process -Technology
  • 12. Focus on Maritime CI -10- Ports Physical Cyber Terminal Operating Systems Industrial Control Systems Business Operation Systems Access control and monitoring systemsPromotion of an innovative physical/cyber intelligence solution will allow different stakeholders active in port operations to cooperate in managing the physicial and cyber sec threats The relevant legislation on port sec is the ISPS Code (EU/725/2004 and EU/65/2010) – Port Sec Plan managed by Port Sec Officer – Port Facility Sec Officer
  • 13. Survey Piloting Standard Incident Response Focus on Maritime CI -10- PORTS Ports and Hinterland SHIPS
  • 14. PROPOSED APPROACH – IDENTIFIED BY DUAL CIPP -10- Maritime Security Plans do not fully address cyber sec related threats, vulnerability and other considertions and the ports that carried out a cyber security and vulnerability assessment are EXTREMELY LIMITED Definition of competencees: The coast guard officials are in charge for the management of the VTS and not for the cyebr threats Physical intervention / improvements: Need to provide physical interventions like Fiber optic cable installation Organizzation: Institution of a Port Coordination Center, Security mainteinance programme, Process: Cyber Incident response plan Human Capital: Cyber sec training Institution / Stakeholders: Lack of Cyber sec awarness and culture Public Private Partnership HYBRID PORT DUAL CIPP PROJECT – SUBMITTED BY AN INTERNATIONAL CONSORTOIUM COMPOSED BY 7 MS in the framework of H2020 CIP Call
  • 15. SCENARIOS PROPOSED IN DUAL CIPP -10- Scenarios Events Cyber attacks on logistic transportation Event 1: sending a PDF document to a key user that from a user’s perspective contains some interesting data. However, opening this PDF triggers the execution of an attached exploit (for a publicly known vulnerability in Adobe Reader) that silently installs a remote access service on the computer . Event 2: the hackers handle to get access to more sophisticated attack tools capable of identifying and exploiting vulnerabilities that pertain to the in-vehicle communication interfaces, e.g., mobile communications, near field communications, wireless sensor networks, etc. Event 3: engage into malicious activities spanning from simple phishing attacks (targeting port authorities and key employees) Event 4: the hackers exploit vulnerabilities in the surveillance system of the port that controls the CCTV video cameras in order to gain access and delete video streams that show their malicious activities.
  • 16. CONCLUSIONS -10- NEED TO ADDRESS cyber vulnerabilities in the framework of the Maritime. These potential vulnerabilities include limited cybersecurity training and preparedness (human capital), errors in software (BUG), protection of commercial technologies, network connectivity and interdependencies, foreign dependencies, global positioning system jamming-spoofing. A cyber attack on networks at a port or aboard a ship could generate Lost cargo, port disruptions, Physical and environmental damage. Several mitigation measures can increase the security and resiliency of ports: setting up maritime cybersecurity standards, sharing information across the sector, conducting routine vulnerability assessments, using best practices, mitigating insider threats, and developing contingency plans for cyber attacks. Knowledge is power - Francis Bacon
  • 17. Contact Us -12- Director European Services Institute SI-IES s.r.l. Sito web: www.si-ies.it Andrea Chiappetta e-mail a.chiappetta@si-ies.it SI-Istituto Europeo Servizi S.r.l. European Services Institute – Sede Legale:Via Elio Lampridio Cerva 87/A 00143 Roma THANK YOU for your attention