maritime cyber security it s definitely a vuca environment
play

Maritime Cyber Security Its definitely a VUCA* environment * Army - PowerPoint PPT Presentation

Maritime Cyber Security Its definitely a VUCA* environment * Army War College 1990s Maritime Cyber Security Its definitely a VUCA environment Volatile Maritime Cyber Security Its definitely a VUCA environment


  1. Maritime Cyber Security “It’s definitely a VUCA* environment” * ‐ Army War College 1990’s

  2. Maritime Cyber Security “It’s definitely a VUCA environment” Volatile

  3. Maritime Cyber Security “It’s definitely a VUCA environment” Volatile Uncertain

  4. Maritime Cyber Security “It’s definitely a VUCA environment” Volatile Uncertain Complex

  5. Maritime Cyber Security “It’s definitely a VUCA environment” Volatile Uncertain Complex Ambiguous

  6. Consequences Threats Shipboard Systems Timing Vulnerabilities Resilience Port Education Ops GPS Human Factors SCADA Cargo Risk Mitigation Frameworks

  7. Consequences Threats Shipboard Systems Timing Vulnerabilities Resilience Port Education Ops GPS Human Factors SCADA Cargo Risk Mitigation Frameworks

  8. To function in a VUCA environment organizations must: • Anticipate the Issues that Shape Conditions. • Understand the Consequences of the Issues and Actions. • Appreciate the Interdependence of Variables. • Prepare for Alternative Realities and Challenges. • Interpret and Address Relevant Opportunities.

  9. Based on the presentations and discussions during this event: • We are just beginning to understand the broad array of issues that impact this domain. • We do not fully understand the potential consequences of the issues and actions that we might undertake. • We do not fully understand the interdependence of the variables especially the impacts in other domains. • We are far from developing strategies to operate in alternative/degraded environments. • We, as a maritime community, need to interpret all of the above and develop comprehensive strategies to develop mitigations and improve resilience.

  10. Laying down a new track line! • Continued research and collaborative approaches to identify the core issues and ability to mitigate their impact. • Leverage Risk Management Frameworks to begin to understand the consequences and prioritize the actions we undertake. • Conduct broad reaching exercises to test our plans and fully understand the impacts in other domains and the supply chain. • Leverage the above to enhance overall resilience of the MTS.

  11. Key way points! • Build the community and be inclusive. Fed, State, Public, Private, Industry, Supply Chain, and Academia. Look at what the financial community has done. • Unfettered exchange of threat, impact, and mitigation information. Leverage existing architectures and evolving information exchange policies to overcome liability concerns. • Develop and codify voluntary standards and best practices for all cyber aspects of the MTS. Certify third party entities to conduct assessments and certifications. • Create and share best of class training/outreach programs.

  12. We are underway but need to turn a few more knots! • Leverage the information and contacts obtained from this event. Share broadly and engage others. • Watch for, read, and share the forthcoming CG Cyber Strategy. • Engage in local Area Maritime Security Councils, FBI InfraGard, and Maritime ISAC.

  13. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend