Languages
Currency

Cyber Security Workbook for On Board Ship Use

SKU
SEA6015
£295.00
Available
  • FREE Delivery to UK - Spend over £75
  • FREE Delivery to Europe - Spend over £150
  • Worldwide Delivery Available
Overview
SPECIAL ORDER ITEM - 1 WEEK DELAY

This practical and easy to understand workbook supports the owner, Master and the ship's crew with cyber security risk management.

It contains comprehensive checklists to support the day-to-day management of onboard cyber security and facilitates collaboration between ships, onshore IT departments and equipment manufacturers.

View full description


Product Details

Part Number: SEA6015

Edition: 2025

Printed and corrected to: No

ISBN: 9781917308083

Publisher: Witherbys

Language: English

Author(s): BIMCO, International Chamber of Shipping (ICS), Witherbys

Author: No

Format: Hardback

MPN: BP108136

Cyber risk management should be an inherent part of safety and security and should be considered at all levels of the company, including senior management ashore and onboard personnel.

This Workbook has been designed as a practical, straightforward guide to support the Master and officers on board ship (Part I - Onboard Practical Considerations). It is designed to facilitate understanding and good collaboration between individual ships, onshore IT departments and equipment manufacturers (Part II - Shore Management Considerations). The Workbook may also be useful to the wider maritime industry.

The sixth edition has been produced by Witherbys, BIMCO and the International Chamber of Shipping (ICS).

The Workbook has been fully revised and updated and contains new guidance on:

  • Industry guidelines and regulatory requirements, including IACS UR E26 and E27
  • cyber security in port
  • ship inspections and port state control
  • malware detection and prevention
  • phishing risks.

Detailed case studies and diagrams have been added to help illustrate cyber risks. The Workbook contains 14 checklists and 6 annexes, including Cyber Security Risk Assessment and Creating a Cyber Security Plan.