Presentation on theme: "Cyber and Maritime Infrastructure"— Presentation transcript:
1Cyber and Maritime Infrastructure Threat, Risk and ResponseCAPT Fred Turner, USN
2The ProcessAcknowledge a “cyber” threat to maritime infrastructure existsAssess the “cyber” risk to maritime infrastructureAddress the “cyber” issue to secure our maritime infrastructure…but it must be a “team sport”Industry – industry partnershipsIndustry – law enforcement – military - governmentInternational – regional – national partnershipsWe are hereCyber is not really a “threat,” “risk” or the “issue”…it is the medium/domain/terrain that interconnects with the maritime domain…and is the means by which an actor may threaten maritime infrastructure
3Threat & Vulnerability Emerging cyber threat vs. critical infrastructureTargets…face similar delivery methods & payloadsGovernment organizations (civilian & military)Defense industriesEnergy sectorCommunications sectorFinancial sectorMaritime sector next?Evolving threat…web site defacement, DDoS, data destruction, ICS/SCADA/HM&E manipulationMotives…state & non-state…exploitation, theft, attackNetwork/communications infrastructure vulnerabilitiesNetwork vulnerabilities; information assurance, removable media, wireless accessThe users; insider threat and negligent usersSupply chainfinancial sector, energy sector also tied into system of systemsNetwork infrastructure is directly tied into the maritime infrastructure… a system of systems which can effect port operations, ships at sea, etc.
4Assessing the Risk Cyber Risk to Maritime Infrastructure = Challenges Threat =Capability +Intent ->Vulnerability ->ConsequencesChallengesLack of common, understandable terminologyLack of understanding of our networks and how they connect to maritime infrastructure; need “maps”Deficiency in including cyber in maritime infrastructure risk assessments…must integrate into current processesHow do we calculate real vs theoretical risk? Potential impact on maritime operations and cost?Lack of understanding of “red lines;” ours and “theirs”Compromised networkTerminal operating systemCompromised networkAdversaryBusiness networkCompromised networkM/V Line operations & maintenance networkCost in time and money; how much does it cost to buy down the risk to “acceptable?”Ability to carry out operations at the time and place neededChallenges in calculating; how much risk is acceptable?We are all connected and are thus only as strong as our weakest link…so to a large degree, we share each other’s risk
5Securing Maritime Infrastructure Utilizing cyber risk assessment to enhance maritime securityGuidance; strategies, policies & plansTraining; for users but also to develop cyber expertiseResource allocation; fix priority vulnerabilities in existing architectures and networks…and build security into new onesCyber security cooperation & collaborationInformation sharing (e.g., threat, vulnerabilities, incidents & response, lessons, best practices, training)Training; collaboration in curricula & sharing expertsAgreements; informal/voluntary OK but formal betterOrganization; virtual group or regional cyber threat centerAd HocIndividual organization actionsRoutine collaboration and cooperationFormal mechanismsInformal mechanismsCivil sector & government partnershipCivil sectorGovernment, security services, militaryRegional cyber centerInternational effortsAll stakeholders must participate…industry, law enforcement, military, government departments/ministries…at all levels…national, regional & international