Maritime Cyber Security

Economic, technological, and global changes have increased the importance of ports and vessels to world economies; the multiplicity of systems in the sea ports and vessels, and the interconnections between them, expose sea ports, shipping companies, and their vessels to many cyber threats.

Cyber-attacks take advantage of embedded technology to damage the seaports, the shipping companies, and even the vessels themselves, in order to obtain financial, reputation or security gains.

Maritime Cyber Defense is designed to provide solutions and assistance for a variety of cyber threats and information security problems that may harm maritime organizations, including:

  • Partial or total shut-down of ports and shipping companies.  -
  • Economic damage caused by disruption of the information systems and changes in the identity, location, and purpose of the containers.
  • Massive attacks from igniting hazardous materials, which are found in large quantities at the port and on loading / unloading vessels.
  • The capsizing of a ship in the port, which creates a partial or complete shut-down of the port.
  • Damage to the ability to build a marine image (near the port), in order to control entrance to the port, to prevent the entry or exit of ships from the port.- Physical infiltration of terrorist elements or crime to the port.
  • Image damage or damage to your reputation.
  • Gathering state intelligence, and more.
  • The BDO Cyber ​​Defense Center is accompanied by a team of marine cyber experts who have developed an innovative and effective service to protect against cyber threats in the maritime arena.
  • The service includes:
  • Writing a strategy to protect the organization from cyber-attacks. The strategy is based on organizational mapping, missions, value and tasks, and organizational processes.
  • The Cyber-Readiness survey is an exam that aims to get your organization ready in the case of cyber-attacks on a port or vessel. The exam focuses on four different dimensions:
    1. The technological dimension (network topology, defense infrastructures and systems, testing of existing defenses, identification management, access rights, etc.)
    2. The organizational dimension (analysis of sensitive technological and business processes, suppliers and supply chain, procedures, etc.)
    3. The physical dimension (physical security systems and access prevention)
    4. The behavioral dimension (employee awareness, readiness, etc.)
  • Cyber-Simulation Attacks include penetration tests to detect loopholes in physical and cyber security and help protect the organization's systems by simulating how an attacker would perform the attack.

Internal Threat Simulation: Simulation of an internal threat factor (such as an employee) by technological capability to attack targets in the internal network, to examine the sensitivity of the network to the internal threat and to raise awareness.

Writing information security and cyber procedures, including physical security procedures.

Set up and operate a control and monitoring room, SOC, which operates 24/7, 365 days a year, including ongoing intelligence focused on threats

Ongoing Consulting to mitigate security gaps and strengthen organizational protection.

Training and certification for employees, and more.