BIG DATA, CYBER & SHIPPING
BIG DATA, CYBER & SHIPPING
Liberty Maritime
Corporation
• Founded in 1988, recognized for its commitment
to quality, innovation and performance
• A vessel operator specializing in Dry Bulk and
PCTC vessel management
o US Flag Focus: Food Aid & the Maritime Security
Program (MSP)
• Commercial Focus: SnP, Freight, Hedging and
Quantitative Trading
o Supramax, Panamax, Kamsarmax Sectors
www.Libertymar.com
Liberty Global Logistics
• A point to point multimodal logistics company
o Point to Point / Door to Door
o Port to Port / Port to Door
• Multi Modal Transportation Solutions
o Ocean – PCTC, MPP, Heavy Lift
o Trucking
o Rail
o Air Freight
• Around the World Ocean Service: USA – Med – Mid East – Far East
• Maritime Security Program & Multi-Modal Contractor
• Contracts with major OEMs & Commercial Shippers World Wide
www.LibertyGL.com
Unpacking Big
Data
Big data is a term that describes the large volume
of data – both structured and unstructured – that
inundates a business on a day-to-day basis. But
it’s not the amount of data that’s important. It’s
what organizations do with the data that matters.
Big data can be analyzed for insights that lead to
better decisions and strategic business moves.
Source: www.sas.com
Find and Utilize
Data
• Every organization has data
• Desire to use Data
• Locate Data
• Organize / Cleanse Data
• Analyze Data
• Utilize Data
• Experience Data Driven Results
Quantitative
Voyage Planning
and Optimization
Informed and timely decisions based on current
operational information and historic trends
• Data Inputs
• Data Analysis
Data Utilization
Identification of capacity or scheduling issues
& solutions
The Challenge: Balancing accretive
decision making with customer needs
and delivery schedules
• Speed Up or Slow Down
• Procure Now or Later
• Ballast vs. Wait
Basis Public Brent Crude Oil
Data
Use of data for decision making cannot account for unforeseen political events,
international commerce events, environmental or natural disasters among other items
Bunker Correlation Modeling
Enterprise
Resource
Planning
System
BOL
Booking
EDI Reporting
Space
Allocation
Customer
Portal
All will be
impacted by
digitalization
Cyber
NIST Cyber
Security
Cybersecurity
Framework
Identify
Protect
DetectRespond
Recover
Three CategoriesOperational Technology & Cyber Risk1
Information Technology & Cyber Risk2
Behavioral & Cyber Risk3
Operational Technology Cyber Risk
Operational Technology
• Satellite / Remote
• Hard Asset / Machinery itself
• Computer or System Input Receptor
• Regulatory Compliance
o Class Society Cyber Requirements
o Flag State / USCG Cyber requirements
o IMO?
Customer Requirements
Informational
Technology Cyber
Risk
Information Technology (IT)
• Malware
• Ransomware
• Keylogging
• Identity Mining
Firewall and DMZ Penetration
Denial of Service (DoS)
Computer Intrusion
Behavioral Cyber
Risk
“The Human Factor”
• Can occur through any Network Access Point
Physical Network Threats
• Employee email phishing
• Web based virus infection
Internet based threats
• Poor password strength rule sets
• Mandatory idle lock-screen enforcement
Internal based threats
Improvements and Protection
• More complex network structure
• Server Patching and Network Monitoring
• 2 Factor Authentication
• Hard Drive Encryption
• Intelligent Virus Technology
• Disaster Recovery & Cyber Intrusion Emergency
Response Plan
• Disabled Human Access Points (USB-drive)
• Random Computer Health Checks by IT Dept.
• Mobile Device Management (MDM)
• Incident Reporting and Post Mortem Follow Up
• User Education