Posts

>>Featured Posts

[BOOK] Introduction to the Book “ISO 23806 Ship Cyber Safety Certification”

Image
📚 Book Review ISO 23806 IACS UR E26 / E27 Ship Cybersecurity Ship Cybersecurity Practical Guide — ISO 23806 & IACS UR E26/E27 in Practice IT & OT Security in the Maritime and Shipbuilding Manufacturing Industry 🚢 Lew Maritime 4.0 · AI, Data & Cyber Security 📅 February 22, 2026 Book Details Subtitle Practical Guide for IT & OT Security in the Maritime and Shipbuilding Manufacturing Industry Publisher Information Security Books Published October 2023 Authors 19 Subject Matter Experts Pages ~...

[ACS UR E26 Section 4.2.1] Practical Applications of Ship Security Zones: 10 Pitfalls and How to Avoid Them

Image
IACS UR E26 Security Zones Maritime OT Security Practical Guide Security Zones in Practice: 10 Pitfalls and How to Avoid Them A ShipJobs practical guide based on real-world implementation experience ⚓ The ShipJobs Team Maritime Cyber Security · IACS UR E26 / E27 Introduction: The Security Zone Paradox When IACS UR E26 Section 4.2.1 mandates that "all CBSs in the scope of applicability shall be grouped into security zones," it sounds straightforward enough. The requirement seems clear: organize your systems, segment your networks, protect the boundaries. Simple, right? Not quite. After working with shipyards, system suppliers, and shipowners across multiple E26 implementation projects, we've observed a recurring pattern: what appears simple in the standard becomes remarkably complex in practice . The gap betwe...

Redefining System Suppliers’ IACS UR E26/27 Interpretation Trends in Alignment with Cyber Resilience Principles

Image
IACS UR E26 / E27 Cyber Resilience Maritime OT Security Redefining System Suppliers' IACS UR E26/E27 Interpretation Trends in Alignment with Cyber Resilience Principles ⚓ Captain Ethan Maritime 4.0 · AI, Data & Cyber Security 📅 February 10, 2026 Recently, during the application of IACS UR E26 and E27 , ongoing cases are being observed in which certain system suppliers are refusing to submit required information , despite their systems clearly falling under CBS (Computer-Based Systems) and the existence of explicit classification society guidelines. The information in question includes key inputs such as asset inventory , system configuration diagrams , communication interface information , as well as the foundational cybersecurity domains of Identify and Detect . A Transitional Phenom...

The Next Competitive Edge in Shipbuilding Is Cybersecurity, Data, and AI

Image
The Next Competitive Edge in Shipbuilding Is  Cybersecurity, Data, and AI For decades, the shipbuilding industry has grown on the strength of human experience and on-site craftsmanship . Skill, intuition, and field knowledge have always been the core assets of shipyards. However, over the past few years—especially through my hands-on experience with Smart Yard and Smart Ship projects —one realization has become very clear. Reference “Everyone Talks About AI… Korean Shipbuilders Accelerate Organizational Restructuring and Investment” MoneyToday https://www.mt.co.kr/industry/2026/01/25/2026012313464346731 The next competitive edge in shipbuilding will ultimately be operational efficiency, built on data and AI secured by strong cybersecurity. What I Learned from Experiencing a Smart Yard Smart yards are often described in terms of robots and automation equipment. But from an on-site perspective, a smart yard is fundamentally a data-driven system . What stood out to me was not just ...

Cyber Regulatory Landscape and Industry Responses in the Shipbuilding and Maritime Sector – Part 4: Why Shipowners Must Establish an Owner Cybersecurity Policy

Image
Why Shipowners Must Establish an Owner Cybersecurity Policy The Single Standard That Determines the Future of the Entire Fleet 1. The biggest issue in the shipbuilding and maritime industry has been the absence of a unified standard Shipyards work based on their own standards. Suppliers produce documents based on their own interpretations. Classification societies enforce their own requirements. System integrators act according to their own methodologies. And in the middle of this fragmented ecosystem, the party that suffers the most is the shipowner . Because cybersecurity is not a “single-vessel problem.” It is a fleet-wide operational model that affects decades of operation. Despite this reality, many shipowners still rely on: Shipyard-provided documents Supplier-provided documentation Class-driven interpretations without having their own Owner Policy. This approach is no longer sustainable. In the era of UR E26 and UR E27, the shipowner must define the standard. 2...