Maritime Cyber Security
Securing Maritime & Offshore industries
Cywake interconnects the maritime, digital and risk management cultures.
We are seafarers, computer engineers and experts on Maritime & Offshore industry.
We combine marine operations, marine engineering and information systems backgrounds.
Cyber risk management
A global approach is the key to success.
It shall encompass:
- The human factor
- The organisational set-up
- The IT/OT shipboard systems
Cyber risk management is a continuous improvement process of audits, architectrure mapping, incidents recording, technology watch, regulatory watch, threat assessment, risk evaluation, mitigation measures and trainings with the challenge to always keep operational flexibility.
While the cyber security is perceived as a technology matter, it is massively relying on human behaviour. Not less than 80% of cyber attacks comes from employee’s mistakes.
An effective cyber security system involve the company organisation and must be integrated in the existing safety/security management systems.
Cyber security is of course also a matter of advance technology, physical and logical barriers, which need innovation to stay up to date with threats.
Finally, regarding the multiple regulations we currently start to see in the industry, it also can be seen as a lever for business differentiation.
Audit & Risk Assessment
- IT/OT inventory and mapping of critical shipboard systems
- Assessment of vulnerabilities and threats
- Dynamic evaluation of the risk
- Mitigation plan
- Compliance gap analysis
Testing & Solutions
- Pentesting focused on vessels
- Design, writing and implementation of policies, process & guides
- Ensuring ISM compliance
- Recommendations of software and hardware
- Project management
Cybersecurity by Design
- Design of vessel IT infrastructure
- Review of vessel IT/OT plans
- Implementation onsite
Training & Induction
- Cyber risk awareness induction
- Cyber risk protection and management training
- IT/OT shipboard systems vulnerabilities and potential consequences of cyber attacks