CYBER SECURITY Industry guidelines for use on- board ships Mr Angus Frew, Secretary General.

Slides:



Advertisements
Similar presentations
The Seafarers Bill of Rights – a Union View Mark Dickinson General Secretary ILO Maritime Labour Convention 2006.
Advertisements

Roy Paul Programme Manager. UN Secretary General Mr Ban Ki Moon “…let us never forget the detrimental impact of piracy on the innocent.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
David A. Brown Chief Information Security Officer State of Ohio
Project Cyber Security Order 706 January 10, 2012 Most of the material presented has been compiled from NERC webinars and drafting team meetings.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
Model guidance for storage and transport of time and temperature-sensitive pharmaceutical products (WHO Technical Report Series, no.961, 2011, Annex 9)
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Introduction to MLC 2006 ILO Maritime Labour Convention 2006
Latin American Panel October 2009 Vina Del Mar, Chile Peter M. Swift.
International Coordinating Council of Aerospace Industries Associations International Coordinating Council of Aerospace Industries Associations (ICCAIA)
Leading the way; making a difference Latin American Panel October 31, 2012 UPDATE ON PIRACY Joseph Angelo Deputy Managing Director.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Leading the way; making a difference Latin American Panel November 6, 2013 BALLAST WATER MANAGEMENT JOSEPH ANGELO DEPUTY MANAGING DIRECTOR.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Online Learning 1 Marine Facility Personnel with Security Responsibilities Canaport LNG
Maritime Cyber Risks – What is real, what is fiction?
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Elizabeth Wilmoth Period 2.  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
MIMIC WP 3 Identification and assessment of security-related risks Project meeting , Helsinki Anne Fransas Project Manager, Technology and Transport.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
Lesson 4 By: Matthew Cheser. Objectives Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
Assessing the Security Framework of the Serval Project “Serval Mesh Software”. Student : Mr. Saaed Ali Wantiti. Supervisor: Ms. Romana Challans.
ENV-NCP-TOGETHER PARTNER MEETING WORK PACKAGE 3 02/03/2010 c Beta Technology.
Interoperability Rudy van Beurden GTE ExCom member GTE+ Workshop on GTE+ Work Programme 24 June 2008.
By Dinesh Bajracharya Nepal Components of Information system.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
 You will need to be able to Discuss the use of networks both in the workplace and at home.  Because of this, you will need to: › identify different.
SAMI & IMCA MARITIME CYBER SECURITY WORKSHOP
Standardization, Software, Integrated Navigation & Integrated Radio Communication Systems - developments on the bridge Frances Baskerville Secretary-General,
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Chapter 8 Auditing in an E-commerce Environment
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
The VVSG Version 1.1 Overview Matthew Masterson Election Assistance Commission
Presentation by Gunnar A. Knudsen Manager, Ports and Terminals Section INTERTANKO for The Intermodal Petroleum Transportation Security Conference London,
GSC9_011 Bill McCrum Executive Secretary TSACC Since GSC 8.
SOLAS Chapter XI-2 and the ISPS Code: The Human Element Frank Wall and Associates ISPS: The Human Element Frank Wall.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
Tanker industry from the shipowners and safety perspective
Status report on the activities of TF-CS/OTA
Follow-up issues from the presentation on Anti-virus / Security software TD & SD have encountered problems with AVG, which also is not rated highly in.
Cybersecurity - What’s Next? June 2017
Ship Construction File CESA Seoul, September 2009
Medical Device Cybersecurity Legislative Activities - Overview
ICT meeting Business needs
Outcome TFCS-07 // August NH Den Haag, NL
Hydrographic Services and Standards Committee
I have many checklists: how do I get started with cyber security?
Cyber-security and IEC International Standards
Standards” and by the Council key Priorities
Activities affecting HSSC
Maritime Business Solutions
Progress Report on proposed GUID on Information System Security Audit
Status report on the activities of TF-CS/OTA
Cyber Security - tackling the risks involved
Group Meeting Ming Hong Tsai Date :
Progress Report on proposed GUID on Information TECHNOLOGY Audit
Hydrographic Services and Standards Committee
LO1 - Know about aspects of cyber security
Progress Report GUID on Information System Security Audit
CIRM Presentation Raytheon Anschütz Distributor Meeting 2016
Presentation transcript:

CYBER SECURITY Industry guidelines for use on- board ships Mr Angus Frew, Secretary General

Risks on board Insiders introducing malware by storage devices etc. Outdated (Microsoft) software Remote attacks by criminals Lack of software and system monitoring Lack of access-control for computers and networks Unprotected hardware

Background At MSC 94 USA and Canada recommended development of voluntary guidelines for ports, ships, and other parts of maritime transportation system BIMCO already working on guidance for shipowners and crew on operational aspects of cyber security on-board ships since CMA Update supported by RT submitted to MSC 95 Intention to present finalized guidelines to MSC 96

Cyber Security On-Board Ships Industry guidelines will cover: Building awareness and educating owners and seafarers on necessity for cyber security Risk management based approach Guidelines on the safekeeping and transmitting of key information Development of contingency plans Continued review - new threats emerging all the time

Related work Maintenance and update of programmable electronic systems: Working with CIRM since 2013 on a draft industry standard Draft text to be sent to RT members for comment shortly Version 1.0 to be completed by August 2015 Aligned with IACS work on updating E 22 on Programmable Electronic Systems

Thank you