Superyacht Cybersecurity: A Whole of Industry Approach – SuperyachtNews

Superyacht Cybersecurity: A Whole of Industry Approach – SuperyachtNews

On day three of The Superyacht Forum 2019, the Atlas Cybersecurity team will join a number of esteemed panelists to explore current and future threats posed to superyachts and their UBOs. Herein, guest authors Eric Stride, Barry Dynkin and Benjamin Dynkin of Atlas Cybersecurity consider the cyber threat.

The superyacht industry stands at a pivotal crossroads. As cyber criminals increase their sophistication and move away from hardened targets like financial services firms, niche and high-profile industries like the superyacht industry are becoming increasingly targeted. This means that the industry, across the board, must engage in cyber risk management to ensure not only their protection, but that they can serve their function in the supply chain. In this article we hope to breakdown the threat landscape to superyachts, the industry, and offer guidance on how companies can become cybersecurity assets rather than liabilities.

I.               The Superyacht Industry

First and foremost, it is necessary to understand the threat profile of the industry and how hackers can (and do) target it. At its core, the industry exists to serve the owners, ensuring their maximum enjoyment and minimizing any concerns, risks, or troubles they may face. We have ventured to create a breakdown of the industry and its scope:

From this graphic we can see that Owners, their financial interests, privacy, and ultimately their enjoyment are the pinnacle of the industry, but in order to achieve that outcome countless other companies, individuals, processes, and systems need to work in concert. Likewise, when it comes to cyber risk management, each category is a risk that must be managed. For example, a management company may be responsible for purchasing fuel for the vessel. As such, a cybercriminal looking to steal money from an owner, may target a management company to spoof or otherwise intercept a payment for fuel. Alternatively, if a cybercriminal’s goal was real world damage to an owner, they may identify and target a security vulnerability in a navigation system or an ECIDS system and exploit that product and attack the owner through that system (i.e. spoofing a yacht’s location and causing a crash).

II.               Defending Against the Threat and Driving Compliance

Understanding the landscape is an important first step because it allows for the identification of threats beyond traditional attacks. Cybercriminals are increasingly leveraging psychology, an understanding of business process, and vulnerabilities together to create sophisticated attack campaigns that are well funded, well researched, and have a remarkable success rate. In the cybersecurity industry we refer to these threats as Advanced Persistent Threats. Their campaigns can go on for months, if not years, and finding, stopping, and removing them requires the careful tuning of a robust defense strategy.  The first step in any cyber defense strategy is gaining visibility and understanding the environment that needs to be defended and the threats posed by that environment. As superyachts continue to evolve in cybersecurity, it is becoming increasingly apparent that a boat cannot simply defend itself.

These principles are not simply an ad hoc recitation of best practices, but are also explicitly called out in the IMO’s cybersecurity guidance:

“Effective cyber risk management should also consider safety and security impacts resulting from the exposure or exploitation of vulnerabilities in information technology systems. This could result from inappropriate connection to operational technology systems or from procedural lapses by operational personnel or third parties” (emphasis added)

BIMCO’s guidelines are even more explicit:

“Companies should evaluate and include the physical security and cyber risk management processes of service providers in supplier agreements and contracts. Processes evaluated during supplier vetting and included in contract requirements may include:

–        security management including management of sub-suppliers

–        manufacturing/operational security

–        software engineering and architecture

–        asset and cyber incident management

–        personnel security

–        data and information protection.”

All this is not to say that superyachts must immediately implement enterprise-grade vendor cyber risk management, providing 100-page questionnaires, but rather superyachts, particularly in the months leading up to the January 1, 2021 deadline for implementing the IMO’s cybersecurity standard, should start understanding their supply chain, the risks that their vendors pose, and how those risks can be mitigated, both on the vessel and in their contractual relationships. In the latter, identifying, detecting, and remediating those threats requires advanced analytic capabilities; functions that require more than a ubiquitously used…

Read the Original Article Here

Amazon Luxury Jewelry Shop

Close Menu