MARITIME CYBER SECURITY Archives - SHIP IP LTD

 

Dublin, Dec. 31, 2024 (GLOBE NEWSWIRE) — The “Europe Maritime Cybersecurity Market: Focus on End User, Solution, Service, Threat Type, and Country-Wise Analysis – Analysis and Forecast, 2023-2033” report has been added to ResearchAndMarkets.com’s offering.

The Europe maritime cybersecurity market is projected to reach $3.49 billion by 2033 from $972.3 million in 2023, growing at a CAGR of 13.64% during the forecast period 2023-2033

Protecting digital assets and networks in the maritime industry from online threats is the main goal of maritime cybersecurity in Europe. As maritime operations depend more and more on digital technologies, cybersecurity has become crucial to ensuring efficiency, safety, and risk mitigation. These dangers range from widespread cyberattacks like viruses and scams to more complex attacks that target shore-based infrastructure and vessel systems. Serious repercussions, including interruptions in business operations, monetary losses, harm to the environment, and even death, can result from cybersecurity breaches. Shipping firms, port authorities, regulatory agencies, and trade associations are important participants in the European maritime cybersecurity market.

Techniques like risk assessment, access control, incident response planning, and continuous employee training are necessary for effective cybersecurity management. Global rules, like those established by the International Maritime Organization (IMO) and the International Ship and Port Facility Security (ISPS) Code, provide frameworks for improving cybersecurity within the maritime sector. Collaboration between public and private sectors, along with technological innovation and information sharing, is crucial to address cyber threats effectively. As the maritime industry continues its digital transformation, robust cybersecurity measures will be vital for ensuring resilience and sustainability across European maritime operations.

Market Introduction

The maritime sector’s growing dependence on digital technologies for communication, navigation, and operations is driving a notable expansion in the European maritime cybersecurity market. Strong cybersecurity is crucial to protecting ships, ports, and associated infrastructure because of the increased susceptibility to cyberattacks that comes with this increased digitization. These dangers can cause operational disruptions, monetary losses, environmental harm, and threats to human safety. They range from viruses and phishing scams to more sophisticated attacks that target vital systems.

The increasing use of cloud computing, automation, and Internet of Things (IoT) devices in the maritime industry is propelling the market. In order to adhere to international standards like the ISPS Code and the regulations of the International Maritime Organization (IMO), major industry participants, including shipping companies, port authorities, and regulatory bodies, are concentrating on fortifying their cybersecurity frameworks. Furthermore, tackling changing cybersecurity challenges requires cooperation between the public and private sectors, improvements in threat detection, and continual staff training. The need for efficient cybersecurity solutions is anticipated to increase as Europe continues to embrace digital transformation in the maritime industry, guaranteeing safer and more robust operations.

How can this report add value to an organization?

Product/Innovation Strategy: The product segment helps the reader understand the different types of services available for deployment and their potential in Europe region. Moreover, the study provides the reader with a detailed understanding of the Europe maritime cybersecurity market by products based on solution, service, and threat type.

Growth/Marketing Strategy: The Europe maritime cybersecurity market has seen major development by key players operating in the market, such as business expansion, partnership, collaboration, and joint venture. The favored strategy for the companies has been partnerships to strengthen their position in the Europe maritime cybersecurity market

Competitive Strategy: Key players in the Europe maritime cybersecurity market analyzed and profiled in the study involve maritime cybersecurity products and service offering companies. Moreover, a detailed competitive benchmarking of the players operating in the Europe maritime cybersecurity market has been done to help the reader understand how players stack against each other, presenting a clear market landscape. Additionally, comprehensive competitive strategies such as partnerships, agreements, and collaborations will aid the reader in understanding the untapped revenue pockets in the market.

Companies Featured

  • SAAB AB
  • Thales
  • Leonardo S.p.A.
  • Airbus SE
  • BAE Systems
  • Terma
  • Westminster Group Plc
  • Kongsberg Digital
  • Smiths Group plc
  • Nettitude Ltd.
  • HGH

Key Attributes:

Report Attribute Details
No. of Pages 73
Forecast Period 2023 – 2033
Estimated Market Value (USD) in 2023 $972.3 Million
Forecasted Market Value (USD) by 2033 $3490 Million
Compound Annual Growth Rate 13.6%
Regions Covered Europe

Key Topics Covered:

1 Markets
1.1 Trends: Current and Future Impact Assessment
1.1.1 Artificial Intelligence and Machine Learning in Cybersecurity
1.1.2 Increased Connectivity
1.1.3 Zero Trust Architecture (ZTA)
1.2 Supply Chain Overview
1.3 Regulatory and Environmental Considerations
1.3.1 Regulatory Implications
1.4 Ecosystem/Ongoing Programs
1.4.1 Series of Assessments, including Threat Modeling and Open-Source Intelligence, Performed by NCC Group
1.5 Startup Funding Summary
1.6 Market Dynamics Overview
1.6.1 Business Drivers
1.6.1.1 Increasing Cyber Threats and Attacks
1.6.1.2 Digitalization of Maritime Operations
1.6.1.3 Global Supply Chain Reliance on Maritime Transport
1.6.2 Business Challenges
1.6.2.1 Lack of Trained Personnel
1.6.2.2 Complex Regulatory Environment
1.6.3 Business Opportunities
1.6.3.1 Cybersecurity for Autonomous Vessels
1.6.3.2 Integration of Internet of Things (IoT) and Operational Technology (OT) Security

2 Regions
2.1 Regional Summary
2.2 Drivers and Restraints
2.3 Europe
2.3.1 Regional Overview
2.3.2 Driving Factors for Market Growth
2.3.3 Factors Challenging the Market
2.3.4 Application
2.3.5 Product
2.3.6 U.K.
2.3.7 Application
2.3.8 Product
2.3.9 Germany
2.3.10 Application
2.3.11 Product
2.3.12 France
2.3.13 Application
2.3.14 Product
2.3.15 Rest-of-Europe
2.3.16 Application
2.3.17 Product

3 Markets – Competitive Benchmarking & Company Profiles
3.1 Next Frontiers
3.2 Geographic Assessment
3.2.1 Overview
3.2.2 Top Products/Product Portfolio
3.2.3 Top Competitors
3.2.4 Target Customers
3.2.5 Key Personnel
3.2.6 Analyst View
3.2.7 Market Share, 2022

4 Research Methodology

For more information about this report visit https://www.researchandmarkets.com/r/h66vja

About ResearchAndMarkets.com
ResearchAndMarkets.com is the world’s leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

 

 

Source: Research and Markets


Vallianz Hit by Cyberattack: Quick Actions Taken to Mitigate Impact

Vallianz, a Singapore-listed OSV owner and operator, recently suffered a cyberattack that granted unauthorized access to its servers. The incident, identified as a ransomware attack, prompted Vallianz to act swiftly to assess, contain, and resolve the situation.

The company enlisted the help of external cybersecurity experts and immediately activated its business continuity plan to minimize disruptions. Relevant authorities were promptly notified of the breach.

In its initial assessment, Vallianz stated that the incident has caused “no significant impact” on its business operations.

This marks the second cyberattack reported by a Singapore-listed company within a week, raising concerns about the growing frequency of such incidents in the region.

Stay tuned for further updates on this developing story.


The U.S. Coast Guard proposes to update its maritime security regulations by adding regulations specifically focused on establishing minimum cybersecurity requirements for U.S.-flagged vessels, Outer Continental Shelf facilities, and U.S. facilities subject to the Maritime Transportation Security Act of 2002 regulations. This proposed rule would help to address current and emerging cybersecurity threats in the marine transportation system. In this Maritime Matters: The Marinelink Podcast, we host a live panel discussion with five experts from the Coast Guard, classification, vessel owners and connectivity leaders to discuss what the rules may look like, as well as what work boat owners should do now to protect themselves, and the consequences not preparing.

Source : https://www.marinelink.com/news/cyber-security-maritime-sector-need-know-520822

Cyber Security Manual


BIMCO Compliant: What Does It Mean?
The Baltic and International Maritime Council (BIMCO) has developed guidelines to help ship owners protect their vessels and IT systems from cyber threats and digital attacks. BIMCO is a global trade organization representing shipping companies and ship owners. Countries like the UK, Greece, Singapore, the Netherlands, Germany, the US, Japan, China, and South Korea collaborate with BIMCO to ensure compliance with international maritime rules.

What Are BIMCO’s Cybersecurity Guidelines for Ships?

  1. Cybersecurity Policy
    BIMCO recommends that ship owners and operators establish a cybersecurity policy. This policy should outline how the ship’s IT systems will be protected from cyber threats and how to handle any incidents that may arise.
  2. Risk Assessment
    BIMCO emphasizes the importance of regular cybersecurity risk assessments. These assessments help identify and address potential risks and vulnerabilities in systems such as communication, navigation, electronic cargo documents, and payment transactions.
  3. Preventive Measures
    To protect their systems, BIMCO advises ship owners to install firewalls, encrypt data, use strong authentication methods, and keep security updates up to date.
  4. Training and Awareness
    Educating staff and crew on cybersecurity is crucial. Ship owners should ensure that their employees can recognize potential threats, such as phishing attacks, and know how to respond to various cybersecurity incidents.
  5. Incident Management
    BIMCO recommends preparing a comprehensive plan for handling cyberattacks. This includes reporting incidents to the appropriate authorities, isolating affected systems, and restoring operations as quickly as possible.
  6. Security for Suppliers
    Since ships often rely on third-party suppliers for IT services and equipment, BIMCO advises ensuring that these suppliers also meet cybersecurity requirements and implement adequate security measures.
  7. Certification and Compliance
    BIMCO encourages shipping companies and ship owners to comply with international cybersecurity standards, such as the IMO Cybersecurity Code, and other relevant maritime regulations.

Why Is This Important?

BIMCO’s cybersecurity guidelines provide ship owners and operators with a robust framework for managing cyber risks. By following these guidelines, ships can reduce their vulnerability to cyberattacks and maintain safe and efficient operations.

For ship owners, using a BIMCO-certified IT platform ensures that your IT infrastructure meets the latest security standards and international cybersecurity regulations. This minimizes the risk of cyberattacks, operational downtime, and legal issues while strengthening trust with business partners and authorities. Additionally, it simplifies incident management and ensures compliance with maritime regulations.

 

Cyber Security Manual


The Nigerian Navy has commenced the training of its personnel on cyber-security to face contemporary and emerging security threats in the maritime environment.
The Commandant of the Nigerian Navy Provost and Regulating School, Commodore Chindo Yahaya made this known weekend during the combined graduation ceremony of the Naval Provost Officers’ Basic Course 11/22 and Able Regulators’ Qualifying Course 13/22 held at the School’s temporary location in Makurdi.
He explained that other new study areas introduced in the 16 weeks training of the 44 graduands made up of eight Officers and 36 Ratings, included Health, Safety and Environment as well as Maritime Domain Awareness.
Commodore Yahaya who pointed out the importance of the School in administering criminal justice, discipline and law enforcement in the Nigerian Navy said “this is why every effort is being made to continuously improve and expand the scope of the course contents in line with Mission and Vision of the Chief of the Naval Staff.
“Plans are ongoing also, for the School to commence Young Officers’ Advocacy Course and Police Administration and Security Management Course as captured in the Chief of the Naval Staff Strategic Directives 5 of 2021. The commencement of these courses will improve the outcomes of the School.”
While stressing the urgent need to move the school to a more befitting site for reason of space and conducive environment, the Commandant disclosed that since its relocation from Lagos in 2010, “the school has been operating from this temporary site. The space has become too small and inadequate. However, I am delighted to say that concrete efforts are ongoing to resolve this issue by planned allocation of a land to the School in no distant future.”
The Special Guest and Commandant of the Air Force War College, Air Vice Marshall Sayo Olatunde charged the graduands to always exhibit courage, discipline and the professionalism in the discharge of their duties.
According to him, “this is also a period of transformation and for you; it cannot be business as usual. The Nigerian Navy looks up to you to apply what you have learnt to improve your performance at your respective duty posts in the Service.
The highpoint of the event which was witnessed by representatives of sister military and paramilitary organizations as well as friends and families of the graduands was the presentation of awards to deserving graduating officers and ratings.
Source: https://www.prime9ja.com.ng/2022/09/nigerian-navy-trains-personnel-on-cyber.html

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022


One of the key components of global trade is also one of the most vulnerable to cybersecurity threats – and if such an attack was successful, it would cause huge disruption with knock-on effects for people around the world.

According to the United Nations Conference on Trade and Development (UNCTAD), over 80% of the volume of international trade in goods is carried by sea and that percentage is even higher for developing countries.

The whole industry is reliant on a series of complex, ‘just in time’ supply chains. if just one element is disrupted, it can have massive repercussions.

One example: the disruption to supply chains around the globe in 2021 when Ever Given, one of the largest container ships in existence, was grounded in the Suez Canal, blocking one of the world’s busiest shipping channels and forcing many other ships to take much longer journeys around the Cape of Good Hope, severely delaying shipments of electronics, machinery, furniture, household goods, and more.

Ports and shipping are becoming increasingly connected to the internet and that’s making them a tempting target for hackers, especially when much of the sector is simultaneously reliant on legacy technology that can be decades old.

And the prospect of disruptive cyberattacks against shipping and ports isn’t just theoretical – they’re already happening.

In 2017, shipping giant Maersk had to deal with a backlog at ports when it was hit as part of the global NotPetya cyberattack. The company had to reinstall thousands of servers and tens of thousands of PCs to get back up and running again.

In 2021, a major cyberattack disrupted container operations at the South African port of Cape Town, restricting the movement of cargo until systems were restored. Both incidents, alongside the grounding of the Ever Given, demonstrate how disruption to shipping can have big consequences for the global supply chain, businesses and individuals.

Despite this, the maritime industry remains underprepared for cyberattacks.

“It’s a really big area measured in the trillions of dollars – but it’s also a bit sort of old guard in the sense of nothing happens, nothing changes very quickly,” says Kevin Jones, professor of computer science at the University of Plymouth and lead on the institution’s Maritime Cyber Threats Research Group.

“And there’s a mindset in the sector of ‘Once I leave port…nobody can touch me, I don’t need to worry about anything until I come back’. Those things were sort of true 30 or 40 years ago but they’re not true anymore.”

That sort of approach means that the industry has struggled to keep pace with cybersecurity threats, with legacy IT systems and a lack of visibility into networks making it a prime target for hackers – and that could have far-reaching consequences.

In a project alongside the Bank of England designed to test how insurance companies would react to such an incident, Plymouth’s Maritime Cyber Threats Research Group developed a scenario where attackers secretly gain control of ship controls and use this to crash them into ports and cranes, damaging ships and infrastructure, and losing cargo.

In this fictional scenario, the attackers also threaten to cause further accidents, unless the five biggest shipping companies pay a ransom of $50 million each. In order to prevent further attacks, much of the world’s shipping stops for days, crippling the global supply chain.

It’s an imagined event, but one based on worst-case scenarios of what attackers could achieve by targeting an industry that is struggling to keep up with cybersecurity – at a time when US Coast Guard Cyber Command has warned of a 68% rise of reported cyber incidents against the sector during the last year alone.

Part of the problem is the unusual nature of the operating environment: managing the technology on a vast container ship is a very different situation to sorting out the PCs in an office. When a vessel can be on the oceans for weeks or months at a time, it’s not as if a full IT refresh can be made at short notice – and a lack of connectivity can make it difficult to download security patches and software updates, even critical ones.

“The current state of the maritime industry from a cybersecurity point of view is pretty poor and that’s not solely down to owners and operators in the industry, it’s because of the complexity,” says Tom Scriven, principal consultant at cybersecurity company Mandiant, who previously spent eight years in the navy.

There are the issues of legacy systems, he notes, but also of new ships coming online that have increased connectivity that brings new problems, such as a lack of segmentation across internal networks, an increased threat surface from third parties and suppliers, and customers connecting in and out, he says.

All of these factors help to make maritime a prime target for hackers, with many different motives ranging from cyber espionage to general profiteering from cyber crime.

Scriven points to a hacking group Mandiant tracks as APT40, which is a cyber espionage operation linked to the Chinese state that targets the engineering, transportation, and defence industries, especially where the sectors overlap with maritime technologies. The group has conducted operations since at least 2013 in what researchers say are a means of supporting China’s efforts to modernise its navy by examining systems and stealing sensitive blueprints.

Mandiant has also detailed attacks against the Israeli shipping sector by cyber attackers. They are suspected to be the work of hackers operating out of Iran with the intention of conducting espionage and collecting intelligence in support of Iranian interests. The attacks include masquerading as legitimate cloud services to steal usernames and passwords, alongside attempts to trick victims into downloading malware.

Then there’s cyber criminals who are out for financial gain. These hackers want to make as much money as they can with as little effort as possible – and targeting the maritime industry could provide them with a big payday due to the combination of old, insecure networks and the fact that port infrastructure is vital to so many industries.

“If you were to find an operator or supplier similar in size in the European ecosystem – perhaps operated in Rotterdam, Antwerp or Felixstowe, and then you had the same success as an attacker – the ramifications of eight days of serious degraded container movement, the impact on an already stressed supply chain, would be horrific,” says Scriven.

But it’s not just ports that could be disrupted by cyberattacks against the maritime industry. There’s also the possibility that by targeting the right systems, cyber criminals could provide ships out in the open seas with bad information, tamper with their GPS tracking or provide false warnings that could move ships off course – either to cause disruption, or to direct them towards trouble, or even pirates who want to divert targets away from shipping lanes into less well-protected areas.

It might sound far-fetched, but this sort of disruption represents a very real threat, particularly in times of conflict.

“This has to be taken very, very seriously, because the implications of a major incident can be huge, especially in times of conflict,” says Captain Rahul Khanna, global head of marine consulting at Allianz and a veteran of 14 years at sea. “We’ve already seen that GPS spoofing has been done, it’s happening and we just hope there isn’t collateral damage in a conflict between countries. The industry overall needs to realise we need to learn from this.”

There are initiatives underway to help to improve cybersecurity across the sailing and shipping sectors, such as the International Maritime Organization’s maritime cyber-risk security program. It aims to provide guidelines that allow ship manufacturers, shipping companies and ports to identify, analyse and assess cyber risks and mitigate them to an acceptable level to support safe and secure shipping.

But for the most part, these are guidelines – and with ships, the systems that power them and even Internet of Things-connected devices inside modern vessels all being produced in different countries with differing levels of regulation, it isn’t anywhere near being joined up. That situation needs to change before things can improve.

“The industry overall needs to realize we must learn from this and it’s only a matter of time before somebody does come under attack, so what needs to be done is ensure the regulation requirements are implemented, especially in the critical parts of the industry that can have a lot more impact,” says Khanna.

Like any other industry, the basics can go a long way to helping improve security, such as applying security patches, using strong passwords and rolling out multi-factor authentication. The nature of shipping means it’s more challenging to find the time to provide this support around information security when rushing cargo around the globe, but taking care of security is more beneficial in the long run than leaving it aside.

It’s this sort of thing which the University of Plymouth’s Maritime Cyber Threats Research Group is discussing with vessel manufacturers as well as captains of ships as, ultimately, they’re the people responsible for the security of the infrastructure once they’re out on the high seas.

“Basic cyber awareness done in a context-specific way makes a huge difference, along with establishing proper protocols,” says Jones. “Some of it is knowing when to do things like patching and when to replace a lot of it is knowing what your risk exposure is.”

“Should you patch when en route? The answer is probably ‘yes’, if it’s a critical patch, if you know what you’re doing. But, should you patch when you’re sort of 20 minutes from New York? Probably not actually because, at that point, the risk sort of outweighs the reward,” he explains.

Jones and others hope that attempts to direct attention to cybersecurity issues in the maritime sector encourage action, improving the resilience of an industry that’s of great importance, particularly for global supply chains – and it’s better for everyone if attacks can be prevented before they happen rather than needing to be dealt with after they’ve occurred.

“Ultimately, if we don’t get this right, we all suffer,” says Jones.

Source: https://www.zdnet.com/article/this-overlooked-cybersecurity-risk-could-create-an-ocean-of-trouble-for-us-all/

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022

 


Cydome, the award-winning provider of ship-wide cybersecurity, is announcing that it has been certified by the IACS Classification Society, RINA (Royal Institution of Naval Architects), for its advanced cybersecurity suite covering IT, OT, communication cybersecurity and networks onboard ships as well as its compliance management tool.

The evaluation conducted by RINA has assured that Cydome’s suite of tools, which offer cybersecurity for systems and networks onboard ships, complies with the marine regulatory framework of the Class Society and is suitable to be used in the marine environment.

Cydome’s solution offers advanced cybersecurity capabilities designed to fend off maritime cybercrime through the monitoring, detecting, and rectifying of cyber threats. To achieve this compliance certificate, the system was tasked with demonstrating its real-time capabilities by performing network security coverage, vulnerability assessment, compliance assessment, and assets management while also proving conformance with current IMO guidelines, Industry Standards, and RINA Rules of Marine security.

The solution also carries a number of other certifications, including ISO certifications for Cybersecurity (27001) and Cloud Security (27017), Certified Inmarsat Application, and QG+ quality management certification, as well as others. Cydome is also a Certification Body for the “Maritime Cyber Baseline,” a scheme supported by the Royal Institute of Naval Architects to enable a path to compliance with IMO Maritime Cyber Risk Management guidelines.

Nir Ayalon, Cydome’s CEO mentioned: “This certification is further validation of Cydome’s effort to continually offer the highest safety standards possible in order to protect ships and assist ship owners and operators in creating a safe operational environment for shipping.”
Source: Cydome

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022

 


Singapore shipbuilder Sembcorp Marine has suffered a cyberattack that left information on employees and operations compromised, the firm announced Thursday.

The company said that it recently discovered a cybersecurity incident in which an unauthorized party accessed part of its IT network via third-party software products, gaining access to some information about personnel as well as non-critical information relating to its operations.

Sembcorp said it treated the incident seriously and took immediate actions, with cybersecurity experts appointed to seal up breaches, assist with an impact assessment, and strengthen IT security measures.

Based on the investigation and impact assessment, Sembmarine believes that the risks have been effectively addressed, with the company’s business operations remaining unaffected. The company has contacted affected personnel to help them manage any possible risks.

Sembmarine also notified the authorities and is working closely with them on the breach.

“The company is mindful of the concerns of all affected parties and would like to assure all our stakeholders that information security and the privacy of all stakeholders are our top priorities,” said the statement.

The breach is not expected to have any material impact on earnings for the fiscal year.

The cyberattack comes just days after Sembcorp revealed new optimism about its orderbook. The company posted a net loss of $104.4 million for the first half of 2022, improving from a $463 million net loss for the six months ended 30 June 2021. Revenues were up 30 percent year-on-year.

Source: https://www.maritime-executive.com/article/sembmarine-reports-cyber-breach-affecting-information-on-personnel

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022


The Department of Defense has opened up millions of dollars in grant funding to a research consortium in Rhode Island that will fund cybersecurity and supply chain research for the maritime industry.

Earlier this month, the department designated six new Defense Manufacturing Communities across the country. The program, authorized through the 2019 National Defense Authorization Act, is designed to fund long-term investments in local businesses that work on national security technologies or innovation.

The money is awarded to joint ventures made up of academic institutions, defense contractors or associations, non-profits or state and local governments. One of the consortiums selected this year is led by the University of Rhode Island Research Foundation, which is proposing to use up to $5 million in federal grant funding “to address weaknesses in the maritime defense industrial base through strengthening workforce training or retraining or recruitment and retention, and expanding small business assistance to support automation and robotics and cyber resiliency.”

“The project will provide a minimum of 50 small business assistance grants, educate and train 675 students and workers using Manufacturing Innovation Institute enhanced offerings, and launch an innovative Education to Assessment model to enhance assessment capability and supplier matching for DoD supply chain companies,” reads a project description on DoD’s website.

In a phone call, a representative from the University of Rhode Island identified Erik Brine, director for defense research and development initiatives and operations at the university, as the lead for the project. Brine did not immediately return an emailed request for comment and further details on the project.

According to DoD, the department has doled out $50 million in funding for the program over the last two years to 11 defense manufacturing communities, 1,350 businesses and 29,000 workers. The funding has gone to develop 11 new defense technologies, make improvements for 23 more and provide cybersecurity assistance to nearly 400 companies.

In addition to the URI Research Foundation, the consortium partners include academic and research institutions like Polaris MEP, 401 Tech Bridge, Brown University and the Rhode Island Department of Education, defense contractors General Dynamics Electric Boat, Raytheon, and military institutions like the U.S. Naval Warfare College and the Naval Undersea Warfare Center, among others.

In a statement, Rep. Jim Langevin, D-R.I., co-founder of the congressional cybersecurity caucus, said the grants would benefit both national security and his home state economy.

“The University of Rhode Island Research Foundation’s designation as a Defense Manufacturing Community will attract millions of dollars in federal investments to advance our national security, develop our workforce, and drive Rhode Island’s economy forward,” said Langevin. “I can’t wait to see how this grant funding will help our defense manufacturing sector to expand its cutting-edge work on issues of robotics, cybersecurity and other emerging technologies.”

Source: https://www.scmagazine.com/analysis/threat-intelligence/dod-grants-fund-cybersecurity-research-for-maritime-industry

 

CREWEXPRESS STCW REST HOURS SOFTWARE - Paris and Tokyo MoU have announced that they will jointly launch a new Concentrated Inspection Campaign (CIC) on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) from 1st September 2022 to 30th November 2022


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED