Cargo ships, trucks, and freight trains are vital for moving goods efficiently. But as they become increasingly digitized and connected, their attack surfaces expand, making these critical systems far more vulnerable to potentially crippling cyberattacks.
New American restrictions will significantly slow China’s chip efforts, but the effect will not be immediate, comprehensive, or ultimately permanent.
Pipeline networks “are vulnerable to cyber-attacks due to legacy (industrial control systems) that lack updated security controls and the dispersed nature of pipeline…networks spanning urban and outlying areas,” according to the U.S. Transportation Security Administration (TSA). As aspects of operational and information technology become further integrated, those industrial control systems (ICSs) become a bigger target for cyber attackers.
▪ Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena
▪ Energy Geopolitics: How the War in Ukraine Hit Pipelines
▪ Infographic: Who Owns Gas Pipeline Development?
▪ Fast Facts: 3 Key Threat Areas for Pipelines
Best of Security Management
Security Technology: Supply Chain Challenges and Opportunities
Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.
How can security teams help support employees’ mental health and resilience following a major incident, such as a bank robbery? Brian Ishikawa, CPP, from the Bank of Hawaii, walks us through how training, documents, and procedures clear the way for recovery. Michael Gips, CPP, joins the SM Highlights podcast to discuss how reputational issues cross over with security issues, including when rumors and conspiracy theories trigger a backlash on social media. Lastly, Miki Shifman discusses the current threats to trains and how technology advancements on the railroad could improve supply chain efficiency and security.
Director of corporate security, Daimler Truck North America
“Good crisis leadership happens when you plan for it. It is imperative to have a team in place that understands their role in crisis could be different than their daily line role.”
President and CEO of The Resiliency Initiative
“Use the crisis as the springboard to establish the process and protocol you want to build and document for future responses.”
Director of guest safety and operations at the Denver Zoo
“I’ve lived in Colorado my whole life. I witnessed Columbine as it happened, and the Aurora movie theater shooting. We’ve had a lot of big shootings. I felt we needed to test our infrastructure and make some of those connections with our first responders.”
Chief information and technology officer, Securitas North America
“As a systematic collaborative approach for transforming a company's services and goals, organizational change management (OCM) tends to emphasize process; however, it is people who most affect change and are affected by that change, meaning any successful effort must center on engagement and authenticity.”
“It comes down to: If we identify an adult who is being exploited, what are we going to do? Who is going to be notified?”
Michael Bailey, Sr., CPP
Security control official, Collins Aerospace
“When it comes to sharing numerical data during an event, leaders should keep in mind that most people involved in a crisis have trouble processing information when it comes to numbers or basic math while the event is ongoing.”
As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.
The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.
Hear what Security Management editors and guest speakers have to say about this month’s magazine.
View all of our past and upcoming educational webinars.
Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes.
Access old issues of Security Management and other content.
ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.
Read the latest articles from our newest publication, Security Technology.