<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[CISO LLC - News]]></title><link><![CDATA[https://www.cisollc.us/news]]></link><description><![CDATA[News]]></description><pubDate>Tue, 16 Sep 2025 05:12:35 -0500</pubDate><generator>Weebly</generator><item><title><![CDATA[Harmonizing Maritime Cybersecurity Regulations, Standards, and Guidelines]]></title><link><![CDATA[https://www.cisollc.us/news/harmonizing-maritime-cybersecurity-regulations-standards-and-guidelines]]></link><comments><![CDATA[https://www.cisollc.us/news/harmonizing-maritime-cybersecurity-regulations-standards-and-guidelines#comments]]></comments><pubDate>Sun, 01 Jun 2025 21:32:18 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.cisollc.us/news/harmonizing-maritime-cybersecurity-regulations-standards-and-guidelines</guid><description><![CDATA[ By Scott Dickerson, CISO LLC Founder &amp; PrincipalA Growing PredicamentA specific, discreet cybersecurity challenge that is manifesting for practitioners across critical infrastructure sectors relates to the proliferation of non-harmonized cybersecurity regulations, standards, and guidelines. Each regulation, standard, or guideline, while on the surface appearing very similar in nature and perhaps even repetitive, has different focal points and levels of granularity. While this is happening a [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:564px'></span><span style='display: table;width:auto;position:relative;float:left;max-width:100%;;clear:left;margin-top:20px;*margin-top:40px'><a><img src="https://www.cisollc.us/uploads/1/1/5/6/115681211/published/existing-regs.png?1748814242" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px; max-width:100%" alt="Picture" class="galleryImageBorder wsite-image" /></a><span style="display: table-caption; caption-side: bottom; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;" class="wsite-caption"></span></span> <div class="paragraph" style="display:block;"><br />By Scott Dickerson, CISO LLC Founder &amp; Principal<br /><br /><strong><font color="#056ce4">A Growing Predicament</font></strong><br /><br />A specific, discreet cybersecurity challenge that is manifesting for practitioners across critical infrastructure sectors relates to the proliferation of non-harmonized cybersecurity regulations, standards, and guidelines. Each regulation, standard, or guideline, while on the surface appearing very similar in nature and perhaps even repetitive, has different focal points and levels of granularity. While this is happening across critical infrastructure sectors, the devil&rsquo;s in the details. Here we will focus and look at one specific sector &ndash; maritime.<br /><br />An example of this can be given relating to &ldquo;assets&rdquo;, whereby one requirement may be maintaining an inventory of critical IT and OT assets, another is a complete asset inventory, a different one requires firmware details, some want a software bill of materials (SBOM), and others get into variations of asset management, which clearly goes far beyond mere inventories. Meeting each of these requirements and providing the evidence desired from an inspector or auditor for a specific framework, requires effort from numerous personnel. This creates confusion as to what &ldquo;right&rdquo; looks like for the organization, increasing frustration from front line workers all the way through executive teams. Below is a list of the standards, regulations, and guidelines that an organization may be required to meet, which can be a frustrating and complex challenge.<br /><br /><br /><br />&#8203;<br /><br />&#8203;<br />The exact pain points vary across stakeholders and their exact operating locations. The pain points are often less severe for port authorities who may have a limited set of regulations to adhere to in some countries. However, those in the U.S. may be facing more challenges than in other countries because of the extent to which multiple Federal agencies are requiring cybersecurity efforts which are not harmonized. Depending on the location and number of onshore or offshore facilities and/or ships operating in different jurisdictions, owners and operators are the ones most impacted by non-harmonized regulations. Unfortunately, their voices are all too often ignored by the &ldquo;decision makers&rdquo;.<br /><br /><strong><font color="#0569e4">Hazards Ahead</font></strong><br /><br />To date, each regulatory, standard, or guideline effort has occurred within the vacuums of individual organizations and remains unaligned, or non-harmonized, <strong>based on their own vested interests</strong>. And from a faraway perch, this non-harmonization may seem like an afterthought or trivial type of problem. However, upon closer inspection, it becomes abundantly clear to the organizations and their third parties that the complexities and challenges are very real with stunning results. An organization&rsquo;s already limited resources trying to fight off nation state attacks (a separate concern in and of itself) become drawn away from managing risks to meet compliance by completing non-value added, repetitive but distinct efforts. The end result is decreased resiliency for individual organizations, which becomes multiplied across the sector, and the increased likelihood of systemic impacts.<br /><br />Additionally multiple countries have recently enacted new cybersecurity regulations or are working towards finalizing regulations. Each separate cybersecurity regulation or standard that becomes enacted creates an inertia as they become entrenched in how things are done, whether in a geographic area or particular industry. They create their own vested interests, often resulting in self-licking ice cream cones. This makes it more difficult for harmonization efforts to gain traction. This begs the question, &ldquo;is it already too late to create harmonized outcomes?&rdquo;.<br /><br />As the idea of harmonization is in its infancy, how we go down the path could itself be problematic. Who will be at the table, decide upon and create the outcomes? Will there be people with an adequate level of knowledge and understanding at the table as regulations, standards, and guidelines are created? Will the industry personnel who ultimately work to implement these requirements be asked for feedback and would it actually be factored in? While international agreement is notoriously difficult to achieve and is often accompanied by much longer timelines for completion, there should still likely be dozens of parties at the table representing thousands of stakeholders. <strong>To be impactful and helpful, there needs to be a concerted effort to avoid including some of the current regulations that may sound good in writing but either: a) cannot be met in practice, b) cannot be realistically enforced, or c) do not fundamentally lead to improved cyber resiliency.</strong><br /><br /><strong><font color="#0573e4">Proposed Harmonization Efforts</font></strong><br /><br />Following MSC 109, one attempt to bring industry associations together to work on harmonization efforts occurred in late 2024. A letter was sent to BIMCO, CLIA, DCSA, IACS, INTERCARGO, INTERTANKO, IAPH, ICS, IUMI, OCIMF, Sybass, and the World Shipping Council, with IMO being copied for awareness. The proposal was to look at common regulations, standards, and guidelines and create a harmonized set of specific cybersecurity controls that these industry organizations would commit to using. Unfortunately, this attempt was unsuccessful, and only representatives from CLIA and IACS responded with commitments to support the effort.<br /><br />In April 2025, Canada, Indonesia, Republic of Korea, United Arab Emirates, United Kingdom, IACS, and IAPH sent a proposal to IMO (MSC 110/7) to develop a goal-based approach for maritime digital-ecosystem cybersecurity standards (MDECSS) that consists of four guiding objectives and subsequent principles. It is unclear if the intent is to stop at goal-based objectives and principles or go further. Stopping at broad principles would mean this approach fundamentally will not alter the current challenges for industry stakeholders as it will simply create yet another framework. It may be possible that this effort will gain some traction at MSC 110 and will trigger an outcome with detailed regulatory recommendations.<br /><br />Also in April 2025, the United States sent a proposal to IMO (MSC 110/7/2) for the development of cybersecurity standards for ships and port facilities in an effort to harmonize regulations internationally. The proposal focuses on two main parts: determining a standardized approach for the further development of cybersecurity requirements (i.e. risk-based/goal-based/prescriptive) and determining if cybersecurity requirements should be made mandatory or voluntary. This proposal was unilaterally submitted by the U.S., which indicates that it was created in a vacuum without international collaboration. A source very familiar with IMO processes and interested in international harmonization efforts expressed their concerns to the author stating, &ldquo;Once this kind of mindset becomes the baseline at MSC, even if IMO sets goal-based, high-level requirements, they won't have practical meaning without a clear and coordinated implementation pathway, and it will leave those working in the field struggling to comply with countless fragmented low-level requirements derived from different approaches around the world.&rdquo; This sentiment is appreciated and aligns with the need for detailed, collaborative outcomes for the maritime community as a whole.<br /><br /><strong><font color="#0569e3">Moving Forward</font></strong><br /><br />Considering the challenge that maritime stakeholders are facing, the following could be logical next steps:<ol><li>IMO should officially call for an industry-led harmonization effort to create agreed-upon and <strong>detailed</strong> cybersecurity controls. The IMO should support industry&rsquo;s efforts as needed and requested.</li><li>Industry associations should seize the leadership opportunity this challenge represents to align their guidelines and influence regulations. While this would be challenging, it will pay immense dividends for their stakeholders over the long term.</li><li>Governments should support industry efforts to create detailed, harmonized standards and agree to adopt them. Industry associations often have much better visibility into the challenges through their stakeholders, whereas government bodies often do not have a full understanding or appreciation of the implications of the new regulations.</li><li>Public and private sector stakeholders should engage in reciprocity agreements to accept audits, assessments, etc. that are completed based on harmonized cybersecurity regulations and standards. In each country, government agencies should then map the internationally harmonized requirements within their own borders.</li></ol> Without a doubt more steps will be needed, but these could be foundational elements to build internationally harmonized regulations, standards, and guidelines.</div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>]]></content:encoded></item><item><title><![CDATA[How to Leverage Cyber Threat Use Cases to Counter an Attack]]></title><link><![CDATA[https://www.cisollc.us/news/how-to-leverage-cyber-threat-use-cases-to-counter-an-attack]]></link><comments><![CDATA[https://www.cisollc.us/news/how-to-leverage-cyber-threat-use-cases-to-counter-an-attack#comments]]></comments><pubDate>Mon, 11 Dec 2017 22:16:41 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.cisollc.us/news/how-to-leverage-cyber-threat-use-cases-to-counter-an-attack</guid><description><![CDATA[Organizations and their third parties face a significant challenge when it comes to understanding the increasing number of cyber risks posed to their ecosystems. But a great way to overcome this challenge is to measure your security, as well as the security of your third parties, against cyber threat uses cases.      By analyzing real-world events and known community concerns against your and your third party&rsquo;s controls, you can better understand the potential impacts of various security i [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><font color="#2a2a2a" size="5">Organizations and their third parties face a significant challenge when it comes to understanding the increasing number of cyber risks posed to their ecosystems. But a great way to overcome this challenge is to measure your security, as well as the security of your third parties, against cyber threat uses cases.</font></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><font size="5" color="#2a2a2a"><font style="">By analyzing real-world events and known community concerns against your and your third party&rsquo;s controls, you can better understand the potential impacts of various security incidents, and identify and prioritize risk. Further, comparing threat use cases against existing cyber security controls will enable your organization to have informed conversations about gaps in controls that could lead to security incidents.</font><br /><br /><font style="">Here are three use cases that can be used to identify opportunities to proactively improve your risk posture.</font></font><ul style=""><li><font size="5" color="#2a2a2a">Point-of-Sale (POS) Breach: A third party vendor is phished months before the attack on the victim. The phishing campaign allowed the attacker to gain the vendor&rsquo;s credentials, which were then used to access the victim network. The attacker then installed POS malware to steal payment card information on millions of customers.</font></li></ul><ul style=""><li><font size="5" color="#2a2a2a">Stolen Intellectual Property: An insider uses authorized access to gather proprietary data. The insider then leaves the organization and takes this information and uses it at a new position for a competitor, thereby decreasing the competitive advantage of the former employer.</font></li></ul><ul style=""><li><font size="5" color="#2a2a2a">Distributed Denial of Service (DDoS) Attack: An attacker executes DDoS attacks against multiple financial institutions, thereby disrupting their ability to conduct business and preventing legitimate customers from accessing banking sites.</font></li></ul><font color="#2a2a2a"><br /><font size="5"><font style="">By improving or implementing security controls around these use cases, you can effectively prevent or counter an attacker&rsquo;s moves. For example, if we look closer at the DDoS use case example, we can identify insights on how to counter the steps a DDoS attacker may take:</font><br /><br /><strong><font>An attacker states their intent on the dark web to execute a DDoS attack against specific banks.</font></strong><br /><font style=""><em><strong>Countermeasure:</strong></em>&nbsp;The bank leverages threat intelligence to monitor for threats that may impact their business.</font><br /><br /><font style=""><strong style="">The attacker creates a plan and method for the DDoS attack.</strong></font><br /><font style=""><em><strong>Countermeasure:</strong>&nbsp;</em>The bank shares threat intel through its information sharing program with its third parties.</font><br /><br /><font style=""><strong style="">The attacker initiates the DDoS attack against the bank.</strong></font><br /><font style=""><em><strong>Countermeasure:</strong></em>&nbsp;The bank and its partners have implemented technical DDoS mitigation controls to limit the impact of the attack.</font><br /><br /><font style="">Your organization's understanding can be improved by applying multiple threat analytical models to map threat actor techniques and identify security controls that can be effective in preventing, detecting, and correcting security incidents. By understanding threat actor motivations and techniques, we can help prioritize limited resources towards protecting against the greatest risks you are facing.</font></font></font></div>]]></content:encoded></item><item><title><![CDATA[Increasing the Value of Your Company with a Risk-based Approach]]></title><link><![CDATA[https://www.cisollc.us/news/increasing-the-value-of-your-company-with-a-risk-based-approach]]></link><comments><![CDATA[https://www.cisollc.us/news/increasing-the-value-of-your-company-with-a-risk-based-approach#comments]]></comments><pubDate>Sun, 10 Dec 2017 16:10:40 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.cisollc.us/news/increasing-the-value-of-your-company-with-a-risk-based-approach</guid><description><![CDATA[&#8203;As many information security professionals have understood for years, compliance is important, but&nbsp;it does not mean the organization is secure. Further, security professionals often find&nbsp;&#8203;&#8203;themselves feeling like they have to fight for their budgets.&#8203;A cycle can develop whereby the CIO and CFO want to understand and support only those resources that are needed to meet mandated cyber security compliance requirements. Once these resource requirements are known, t [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">&#8203;As many information security professionals have understood for years, compliance is important, but&nbsp;it does not mean the organization is secure. Further, security professionals often find&nbsp;&#8203;<span style="color:rgb(14, 67, 97)">&#8203;themselves feeling like they have to fight for their budgets.<br />&#8203;A cycle can develop whereby the CIO and CFO want to understand and support only those resources that are needed to meet mandated cyber security compliance requirements. Once these resource requirements are known, that might be the level of funding that is provided. This can leave the organization exposed to a broader range of risks that fall outside the scope of compliance.</span><br /><span style="color:rgb(14, 67, 97)">&#8203;</span><br /><strong style="color:rgb(14, 67, 97)">When a Compliance-driven Approach is Used&nbsp;</strong><br /><br /><span style="color:rgb(14, 67, 97)">Running a risk management program focused solely on compliance not only leaves the organization exposed to unaddressed risks, but it also does not create competitive value. A critical business gap that results from a compliance-driven mindset is linked to the issue that cyber security compliance activities do not support innovation and growth.</span><br /><br /><span style="color:rgb(14, 67, 97)">First, there is no such thing as being &ldquo;the most compliant.&rdquo; Being compliant won&rsquo;t make you stand out if your competitors are also compliant, but showing you have a proactive risk based approach to third party risk management could.</span><br /><br /><span style="color:rgb(14, 67, 97)">Further, compliance activities drain resources while protecting someone else&rsquo;s interests. For example, payment card industry data security standard (PCI DSS) compliance shifts liability away from the organization and processors and back to the credit card companies. While compliance is certainly beneficial to the organization and its partners from a risk reduction perspective, it is of greater benefit to the credit card companies. Hence why the credit card companies created PCI DSS.</span><br /><br /><span style="color:rgb(14, 67, 97)">Also, it is critical to understand that compliance activities were not created for the benefit of your organization&rsquo;s innovation and growth. While you have invested critical and scarce resources to innovatively fill a gap in the market, compliance regimes have not been structured to help protect your unique intellectual property and keep it from being lost, stolen, or compromised. Yet it is critical to protect these resources as your intellectual property is the blood that will sustain and grow your organization. The risk posed by cyber espionage, for example, has cost Fortune 500 companies billions of dollars and is just one of many concerns that fall outside the bounds of compliance regulations.</span><br /><br /><strong style="color:rgb(14, 67, 97)">Benefits of a Risk-based Approach</strong><br /><br /><span style="color:rgb(14, 67, 97)">1.&nbsp;&nbsp;&nbsp;&nbsp;Creates a competitive advantage over competitors focused solely on compliance. For example, instead of focusing on data at rest encryption to meet SOX, PCI or HIPAA requirements, focus instead on data at rest encryption for your sensitive data, whatever and wherever it is in your digital ecosystem.&nbsp;</span><br /><br /><span style="color:rgb(14, 67, 97)">2.&nbsp;&nbsp;&nbsp;&nbsp;Protects your unique resources that create differentiated products or services. Again, protecting your intellectual property is not a mission of compliance regimes; it is entirely the responsibility of your and your partners&rsquo; organizations. A risk-based approach allows you to better understand and focus resources where they matter most to&nbsp;</span><em style="color:rgb(14, 67, 97)">your</em><span style="color:rgb(14, 67, 97)">&nbsp;organization. Therefore, it is critical to know what your key resources are, where they are, and what can best be done to protect them in the most resource efficient manner.</span><br /><span style="color:rgb(14, 67, 97)">&#8203;</span><br /><span style="color:rgb(14, 67, 97)">3. Increases the strategic value of the organization. Your ecosystem will be more secure, which creates increased strategic value for your organization, your customers, and your third parties. The overall result is that your entire ecosystem becomes more valuable.</span><br /></div>]]></content:encoded></item><item><title><![CDATA[Incorporating Cyber Security Risk Management into Strategic Management]]></title><link><![CDATA[https://www.cisollc.us/news/incorporating-cyber-security-risk-management-into-strategic-management]]></link><comments><![CDATA[https://www.cisollc.us/news/incorporating-cyber-security-risk-management-into-strategic-management#comments]]></comments><pubDate>Sun, 10 Dec 2017 16:05:32 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.cisollc.us/news/incorporating-cyber-security-risk-management-into-strategic-management</guid><description><![CDATA[  &#8203;Companies are in continuous competition with each other. As a result of this competition, 50% of the companies in any given industry are creating earned value while the other 50% are losing it.&nbsp;      &#8203;Companies can create positive earned value through their market power and innovation strategies, while the use of capital resources decreases their earned value. While this concept seems simple in principle, companies often devote considerable resources to understanding their po [...] ]]></description><content:encoded><![CDATA[  <div class="paragraph">&#8203;Companies are in continuous competition with each other. As a result of this competition, 50% of the companies in any given industry are creating earned value while the other 50% are losing it.&nbsp;</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">&#8203;Companies can create positive earned value through their market power and innovation strategies, while the use of capital resources decreases their earned value. While this concept seems simple in principle, companies often devote considerable resources to understanding their position vis-&agrave;-vis competitors and how to improve it.<br /><br />What may be less well understood is the role cyber security and risk management play in supporting, or inhibiting, the earned value creation of the organization. Risk assessments serve the purpose of identifying, and helping to prioritize, risk management activities that provide the greatest value to the organization. Once it understands and prioritizes risks, an organization can differentiate itself from their competition by proactively addressing risks that could impact its performance. If one organization is able to defend its portal from a distributed denial of service (DDoS) attack while a competitor cannot, then a competitive advantage has been created.<br /><br /><strong>Does compliance add strategic value?</strong><br /><br />As many security professionals have understood for years, compliance is very important, but it does not mean you are secure. In earned value management terms, it is important to understand that cyber security compliance activities do not add strategic value. Once compliance is met, one competitor does not stand out from another. There is no such thing as being &ldquo;the most compliant.&nbsp;<br /><br />Further, compliance activities drain resources while protecting someone else&rsquo;s interests. If 80% of your cyber security efforts are geared towards compliance, how many opportunities are lost for the organization? For example, payment card industry data security standard (PCI DSS) compliance shifts liability away from the organization and back to the credit card companies. While compliance is certainly beneficial to the organization from a risk reduction perspective, it is of greater benefit to the credit card companies than to the company now meeting PCI compliance. Hence why they created PCI DSS.<br /><br />Lastly, it is critical to understand that compliance activities were not created for the benefit of your innovation and growth. Your ability to innovate is tied directly to your unique resources and your ability to use those resources to fulfill a gap in the market. The compliance regimes do not factor in whether your unique resources are lost, stolen, or compromised, but intellectual property is the lifeblood that will fuel your organization. With the leftover resources that can be put toward cyber security after compliance requirements are met, do you have a good idea where the weakest points are in your ecosystem? Protecting those resources that create differentiated products or services is entirely the responsibility of your and your partners&rsquo; organizations, but because IP is not supported by compliance efforts, these resources may be less well protected. Your organization must proactively safeguard them to maintain a competitive advantage. Therefore, it is critical to know what your key resources are and what can best be done to protect them in the most resource efficient manner.<br /><br /><strong>Incorporate Strategic Management in Your Cyber Security Prioritization</strong><br /><br />Increased awareness and understanding of the intersection between strategic business management and cyber security risk management is critical and provides multiple advantages, including:<ol><li>Understanding whether the goal of a particular security effort should be mere compliance, or something broader that provides positive earned value to the company. For example, efforts pertaining to data at rest encryption being leveraged to safeguard intellectual property and PCI data, rather than just PCI.&#8203;</li><li>Ability for security professionals to communicate how their activities support business growth and protect innovation, which provide a competitive advantage to the company.</li><li>More informed budget conversations between C-level officers as to how prioritized cyber security investments and risk mitigation efforts should be prioritized to add the most value to the company.</li></ol></div>]]></content:encoded></item></channel></rss>