TRUSTED BY

As an integral part of a nation’s critical infrastructure, the services provided by shipping, freight, transport and logistics companies are vital to keeping economies moving, communities serviced and regions connected. This essential part of the supply chain is therefore a target for cyber-attack, and should be guarded with robust cyber security solutions. 

The risks that stem from cyber issues in these sectors also have widespread fall-out to other sectors within an economy. 

When services and supply chains are stalled or when time-critical deadlines are interrupted, they have the potential to impact individual wellbeing as well as hitting the broader economy. 

Many governments are already moving to tighten up cyber security requirements for these critical infrastructure providers, particularly those that are key to the normal functioning of society.

In the US, this has been accelerated by recent events, as well as in Europe where the NIS2 Directive has come into force, and in the UK where updates to its NIS regulations are in development. 

In Australia, there are also changes happening in relation to categorisation of these industries. Cyber security is coming under greater focus from regulators, with the emergence of the concept of “positive security obligations”. 

Strong cyber security in Shipping, Freight, Transport and Logistics incorporates:

  • Prevention: From the initial infection, with monitoring and cyber risk control systems
  • Containment: Should prevention fail, you need systems to stop the spread of an infection across systems
  • Recovery: Restoration of data and systems, and a system to initiate a well-rehearsed incident management playbook

Prevention is obviously vital, but containment is especially critical for cyber security risk management, where the knock-on effects, regulatory pressures, and affected parties can quickly become overwhelming.

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.