SlideShare a Scribd company logo
1 of 11
C YBER SEC U R IT
Y AN D TH E
SH IPPIN G
IN D U STRY
SHIPPING
IN 2021
It’s 2021 and technology is necessary to run any
and every business. It’s incredible to think about
the wide array of industries there are and the
different technology required to operate each of
them. Regardless of industry, the need for
cybersecurity is a constant.
The shipping industry is one that relies heavily
on technology. There are so many different
moving parts within this industry that must be
accounted for. Not only do the vessels used to
move materials need to function, but the tools
used by the shippers need to function.
Shipping is also a relatively heavily
regulated industry that has
requirements related to cybersecurity.
On-top of that, COVID has shifted
things into a more remote state so
that’s changed some of the
security and technology standards for
this industry as well. At the end of the
day, with the amount of materials and
personal information involved within
shipping, the right managed security
solutions are absolutely necessary.
MARITIME CYBER RISK
MANAGEMENT
No matter the industry, when
running a business, it’s important to
consider the potential impact of a
cyberattack. Shipping is a vast
industry. Clients and employees
alike come in all different shapes
and sizes but most people in their
lifetime can say they’ve shipped
something. Additionally, not only
does sensitive information of the
client need to be taken into account,
but your own needs to be as well.
MARITIME CYBER RISK MANAGEMENT
This is why the International Maritime Organization has guidelines
set up solely for cybersecurity. The guidelines provide
recommendations on maritime cyber risk management to safeguard
shipping from “current and emerging cyber threats and vulnerabilities
and include functional elements that support effective cyber risk
management.” The guidelines can be implemented into existing risk
management processes and go hand-in-hand with security
management practices already established by the organization.
MARITIME CYBER RISK
MANAGEMENT
Along with those guidelines, in 2017 the
Maritime Safety Committee (MSC) adopted
a resolution that encouraged
administrations to ensure that cyber risks
are appropriately addressed in existing
safety management systems (as defined in
the ISM Code) no later than the first annual
verification of the company’s Document of
Compliance after January 1, 2021.
Most shipping organizations were getting all
of their ducks in a row in 2020 to ensure
they would comply with IMO regulations.
Then COVID hit.
COVID AND
SHIPPING
Although cybersecurity was still a
priority once COVID hit, business had
to shift. Practices that were once
frequent and daily became outlawed
due to health regulations. Typically,
remote tools and software were really
only used for IT professionals within
the shipping industry. Once COVID
came, fewer people on-site meant
more people remote.
COVID AND
SHIPPING
It’s a beautiful thing that the world we live in
has the technology to shift industries as huge
as shipping into a remote space but it also
leads to more security vulnerabilities. For
example, The Danish pump maker DESMI
being hit by ransomware with the
organization deciding against paying any
ransom to make the compromised data
available again. To respond to the attack, the
organization shut down some of their
systems including email, affecting their
operations for a number of days.
This was just one of a number of
cyberattacks that hit the shipping industry
during COVID. Threats like these and
regulations from IMO, show the importance
of an investment in managed security.
MANAGED
SECURITY
The right managed security plan will protect
your business and clients from on-going
security threats. During the pandemic there
was an on-going cyberthreat involving
shipping vessels specifically. These attacks
were phishing links designed to compromise
vessels and shipping companies.
Security awareness solutions are a great way
to protect from this specific kind of attack that
targets human nature in particular. These
solutions train your team to avoid malicious
links by sending fake versions of the same
thing. That way your company can spot an
attack from a mile away.
MANAGED
SECURITY
You can also centralize your
security management through
continuous vulnerability
management. The right provider
will be monitoring your network at
all times to stop attacks before
they can happen.
With the on-going issue of threat
actors, identity should be one of
the first things you want to protect.
Whether it’s the identity of your
team members or your clientele,
identity and access management
solutions add an extra layer of
security to your network.
When it comes to cybersecurity having
multiple layers is important. If you’d
like more information on what
managed security solutions could help
protect your business, contact The
TNS Group today.

More Related Content

What's hot

Web App Sec Tisc
Web App Sec TiscWeb App Sec Tisc
Web App Sec TiscAung Khant
 
Security in The Chemical Industry
Security in The Chemical IndustrySecurity in The Chemical Industry
Security in The Chemical Industryjournal ijrtem
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicNetmagic Solutions Pvt. Ltd.
 
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...SITA
 
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay Dereli
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformationSebastien JARDIN
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)Luca_Moroni
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityEES Africa (Pty) Ltd
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...Redazione InnovaPuglia
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 

What's hot (17)

Web App Sec Tisc
Web App Sec TiscWeb App Sec Tisc
Web App Sec Tisc
 
Security in The Chemical Industry
Security in The Chemical IndustrySecurity in The Chemical Industry
Security in The Chemical Industry
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
 
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
 
T&M Cyber
T&M CyberT&M Cyber
T&M Cyber
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port Security
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 

Similar to Cybersecurity and the Shipping Industry

Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Best Cyber Security Services in Dubai.pptx
Best Cyber Security Services in Dubai.pptxBest Cyber Security Services in Dubai.pptx
Best Cyber Security Services in Dubai.pptxscsseoin
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfSolviosTechnology
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Approaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain AssuranceApproaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain AssuranceLeonardo
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...Enterprise Insider
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfChinatu Uzuegbu
 

Similar to Cybersecurity and the Shipping Industry (20)

Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Best Cyber Security Services in Dubai.pptx
Best Cyber Security Services in Dubai.pptxBest Cyber Security Services in Dubai.pptx
Best Cyber Security Services in Dubai.pptx
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Approaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain AssuranceApproaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain Assurance
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 

More from The TNS Group

Your Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfYour Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfThe TNS Group
 
How to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfHow to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfThe TNS Group
 
6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an OverhaulThe TNS Group
 
Holiday Cybersecurity Tips
Holiday Cybersecurity TipsHoliday Cybersecurity Tips
Holiday Cybersecurity TipsThe TNS Group
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022The TNS Group
 
Benefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityBenefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityThe TNS Group
 
Top Tech Trends of 2020
Top Tech Trends of 2020Top Tech Trends of 2020
Top Tech Trends of 2020The TNS Group
 
How Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingHow Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingThe TNS Group
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsThe TNS Group
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?The TNS Group
 
Distribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesDistribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesThe TNS Group
 
Healthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesHealthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesThe TNS Group
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?The TNS Group
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningThe TNS Group
 
Infrastructure and Desktop Support
Infrastructure and Desktop SupportInfrastructure and Desktop Support
Infrastructure and Desktop SupportThe TNS Group
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureThe TNS Group
 
Maritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeMaritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeThe TNS Group
 
Professional Services: Industries we Serve
Professional Services: Industries we ServeProfessional Services: Industries we Serve
Professional Services: Industries we ServeThe TNS Group
 

More from The TNS Group (20)

Your Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdfYour Phone System Remains Important for Business—Here’s Why.pdf
Your Phone System Remains Important for Business—Here’s Why.pdf
 
How to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdfHow to Interview Your Prospective IT Provider.pdf
How to Interview Your Prospective IT Provider.pdf
 
6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul6 Indicators That Your Current IT Solution Needs an Overhaul
6 Indicators That Your Current IT Solution Needs an Overhaul
 
Holiday Cybersecurity Tips
Holiday Cybersecurity TipsHoliday Cybersecurity Tips
Holiday Cybersecurity Tips
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022
 
Benefits of an MSP: Increased Profitability
Benefits of an MSP: Increased ProfitabilityBenefits of an MSP: Increased Profitability
Benefits of an MSP: Increased Profitability
 
Top Tech Trends of 2020
Top Tech Trends of 2020Top Tech Trends of 2020
Top Tech Trends of 2020
 
How Office 365 can Save Thanksgiving
How Office 365 can Save ThanksgivingHow Office 365 can Save Thanksgiving
How Office 365 can Save Thanksgiving
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking Threats
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
Distribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure UpgradesDistribution Industry: Hardware Infrastructure Upgrades
Distribution Industry: Hardware Infrastructure Upgrades
 
Healthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and UpgradesHealthcare Industry: Updates and Upgrades
Healthcare Industry: Updates and Upgrades
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
IT Consultng
IT ConsultngIT Consultng
IT Consultng
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Infrastructure and Desktop Support
Infrastructure and Desktop SupportInfrastructure and Desktop Support
Infrastructure and Desktop Support
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
 
Maritime Shipping: Industries we Serve
Maritime Shipping: Industries we ServeMaritime Shipping: Industries we Serve
Maritime Shipping: Industries we Serve
 
Professional Services: Industries we Serve
Professional Services: Industries we ServeProfessional Services: Industries we Serve
Professional Services: Industries we Serve
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Cybersecurity and the Shipping Industry

  • 1. C YBER SEC U R IT Y AN D TH E SH IPPIN G IN D U STRY
  • 2. SHIPPING IN 2021 It’s 2021 and technology is necessary to run any and every business. It’s incredible to think about the wide array of industries there are and the different technology required to operate each of them. Regardless of industry, the need for cybersecurity is a constant. The shipping industry is one that relies heavily on technology. There are so many different moving parts within this industry that must be accounted for. Not only do the vessels used to move materials need to function, but the tools used by the shippers need to function.
  • 3. Shipping is also a relatively heavily regulated industry that has requirements related to cybersecurity. On-top of that, COVID has shifted things into a more remote state so that’s changed some of the security and technology standards for this industry as well. At the end of the day, with the amount of materials and personal information involved within shipping, the right managed security solutions are absolutely necessary.
  • 4. MARITIME CYBER RISK MANAGEMENT No matter the industry, when running a business, it’s important to consider the potential impact of a cyberattack. Shipping is a vast industry. Clients and employees alike come in all different shapes and sizes but most people in their lifetime can say they’ve shipped something. Additionally, not only does sensitive information of the client need to be taken into account, but your own needs to be as well.
  • 5. MARITIME CYBER RISK MANAGEMENT This is why the International Maritime Organization has guidelines set up solely for cybersecurity. The guidelines provide recommendations on maritime cyber risk management to safeguard shipping from “current and emerging cyber threats and vulnerabilities and include functional elements that support effective cyber risk management.” The guidelines can be implemented into existing risk management processes and go hand-in-hand with security management practices already established by the organization.
  • 6. MARITIME CYBER RISK MANAGEMENT Along with those guidelines, in 2017 the Maritime Safety Committee (MSC) adopted a resolution that encouraged administrations to ensure that cyber risks are appropriately addressed in existing safety management systems (as defined in the ISM Code) no later than the first annual verification of the company’s Document of Compliance after January 1, 2021. Most shipping organizations were getting all of their ducks in a row in 2020 to ensure they would comply with IMO regulations. Then COVID hit.
  • 7. COVID AND SHIPPING Although cybersecurity was still a priority once COVID hit, business had to shift. Practices that were once frequent and daily became outlawed due to health regulations. Typically, remote tools and software were really only used for IT professionals within the shipping industry. Once COVID came, fewer people on-site meant more people remote.
  • 8. COVID AND SHIPPING It’s a beautiful thing that the world we live in has the technology to shift industries as huge as shipping into a remote space but it also leads to more security vulnerabilities. For example, The Danish pump maker DESMI being hit by ransomware with the organization deciding against paying any ransom to make the compromised data available again. To respond to the attack, the organization shut down some of their systems including email, affecting their operations for a number of days. This was just one of a number of cyberattacks that hit the shipping industry during COVID. Threats like these and regulations from IMO, show the importance of an investment in managed security.
  • 9. MANAGED SECURITY The right managed security plan will protect your business and clients from on-going security threats. During the pandemic there was an on-going cyberthreat involving shipping vessels specifically. These attacks were phishing links designed to compromise vessels and shipping companies. Security awareness solutions are a great way to protect from this specific kind of attack that targets human nature in particular. These solutions train your team to avoid malicious links by sending fake versions of the same thing. That way your company can spot an attack from a mile away.
  • 10. MANAGED SECURITY You can also centralize your security management through continuous vulnerability management. The right provider will be monitoring your network at all times to stop attacks before they can happen. With the on-going issue of threat actors, identity should be one of the first things you want to protect. Whether it’s the identity of your team members or your clientele, identity and access management solutions add an extra layer of security to your network.
  • 11. When it comes to cybersecurity having multiple layers is important. If you’d like more information on what managed security solutions could help protect your business, contact The TNS Group today.