Posted on April 7, 2025
In today’s increasingly connected world, the shipping industry faces a growing array of cyber security threats that can have significant implications for global trade. Recent disturbances like the 2021 Suez Canal blockage and the rise in ransomware attacks highlight the sector’s vulnerability. The local cyber-attack on the city of Antwerp in 2022 caused damages up to € 100 million. The global cyber-attack NotPetya in 2017 that also hit Maersk, reportedly cost the company € 300 million. Even more threatening, in 2021 Russia spoofed the presence of NATO ships visiting Ukraine in the Black Sea increasing military tensions.
Cyberattacks like ransomware can halt navigation systems or compromise critical onboard controls. Classified as critical infrastructure, shipping has seen a drastic surge in security breaches costing shipowners on average up to € 550 thousand per breach. These developments underscore the urgent need for robust cyber risk management to safeguard the maritime industry’s critical infrastructure and ensure uninterrupted operations.
How do these incidents get so costly? A survey among 489 maritime professionals from 50 countries for their Maritime Cyber Priority report and found that 31% have experienced at least one infiltration by attackers in the last twelve months, with the average incident taking 57 days to resolve. A study found in 2021 that 95% of cyber incidents can be linked to an unintentional insider (i.e. a software misconfiguration), showing the lack of cyber risk management. What is perceived as an ever stronger driver to trigger cyber security investments than a recent cyber incident, is regulation and compliance.
To address these issues, the International Association of Classification Societies (IACS) has introduced two critical unified requirements (URs) to bolster the cyber resilience of ships: IACS E26 and IACS E27. Additionally, the EU has developed the NIS2 Directive to further enhance cyber security across the region. Here’s an overview of these regulations and their impact on shipowners.
IACS E26: Cyber resilience of ships
IACS E26 focuses on the ship as a whole, aiming to ensure the secure integration of both operational and information technology (OT & IT) equipment into the vessel’s network during its design, construction, commissioning, and operational life. It covers five key aspects of cyber security:
IACS E27: Cyber resilience of on-board systems and equipment
IACS E27 targets the system integrity of all individual vessel equipment and its suppliers. It provides requirements for the cyber resilience of onboard systems and equipment, emphasising the interface between users and computer-based systems onboard, as well as product design and development requirements for new devices before their implementation onboard ships.
NIS2 Directive: A high common level of cyber security in the EU and UK
The NIS2 Directive entered into force in the EU on January 16, 2023, with member states required to adopt and enforce the directive by October 2024. It requires member states to strengthen cyber security capabilities and introduces cyber security risk-management measures and reporting in critical sectors, along with rules on cooperation, information sharing, supervision, and enforcement. The directive applies to a wide range of sectors, including maritime transport, and obliges more entities to take measures to increase the level of cyber security in Europe.
Impact on shipowners
For shipowners, these regulations represent a significant step towards ensuring the safety and security of their vessels in the face of evolving cyber threats. The impact of IACS E26, E27, and NIS2 can be summarised as follows:
Consequences of non-compliance
Non-compliance with IACS E26, E27, and NIS2 can have serious repercussions for shipowners:
Damen Triton Cyber security
Damen Triton’s cyber security solution includes: