{"id":84084,"date":"2025-10-30T12:57:00","date_gmt":"2025-10-30T12:57:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84084"},"modified":"2026-01-12T11:25:29","modified_gmt":"2026-01-12T11:25:29","slug":"port-infrastructure-cyber-resilience-leadership","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/","title":{"rendered":"Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84084\" class=\"elementor elementor-84084\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f801ea9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f801ea9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bd4ad34\" data-id=\"bd4ad34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a19e25 elementor-widget elementor-widget-video\" data-id=\"6a19e25\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/qMoRlZ2blro?si=pj-iiybNOacubWb0&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da6d9f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da6d9f6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0246aa\" data-id=\"e0246aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f369bb9 elementor-widget elementor-widget-heading\" data-id=\"f369bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8badd33 elementor-widget elementor-widget-post-info\" data-id=\"8badd33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>October 30, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45d48a4 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tThe Cybersecurity Podcast\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d531993 paraSpace elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d531993\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54f539d\" data-id=\"54f539d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b9d621 elementor-widget elementor-widget-text-editor\" data-id=\"8b9d621\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the ever-evolving world of cybersecurity, leaders from diverse backgrounds are uniquely positioned to confront complex threats facing industries and critical infrastructure. These are the individuals shaping the future of the cybersecurity industry.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2efeb5e elementor-widget elementor-widget-text-editor\" data-id=\"2efeb5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this episode of EC-Council\u2019s Cybersecurity Podcast, we speak to Gaurav Sharma, former shipping captain and current CIO of MMC Ports, one of Malaysia\u2019s largest port operating groups.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38ba433 elementor-widget elementor-widget-text-editor\" data-id=\"38ba433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gaurav is candid in his insights on operational resilience, digital transformation, and the cyber threat landscape in port operations. He uncovers the unique cyber risks affecting critical national infrastructure, especially ports, and offers actionable insights to technology leaders, cybersecurity professionals, and business executives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1cd0f6 elementor-widget elementor-widget-heading\" data-id=\"a1cd0f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Similarities in maritime and technology frontlines <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9080641 elementor-widget elementor-widget-text-editor\" data-id=\"9080641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Former shipping captain Gaurav Sharma\u2019s professional journey spans over three decades, from 11 years as captain of a commercial ship to transitioning into the world of technology and operations in the maritime industry. Driven by a desire to bring value beyond the horizon, Gaurav seized an opportunity to move into strategic IT cybersecurity, while remaining closely linked with shipping and maritime operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6468d6a elementor-widget elementor-widget-text-editor\" data-id=\"6468d6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now, after 21 years in technology leadership, he is fully convinced that hands-on experience in both the operational and digital sides is critical to success. This distinctive perspective enables professionals in strategic IT and cybersecurity roles to truly understand the business and technical sides of operations, resulting in effective and holistic cyber strategies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af1326b elementor-widget elementor-widget-text-editor\" data-id=\"af1326b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>His journey from being a captain to CIO of one of the most eminent ports in Malaysia provides him an unusual perspective on operational risk, crisis management, and team leadership.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-880f188 elementor-widget elementor-widget-text-editor\" data-id=\"880f188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Seasoned experience in navigating storms at sea now underpins his calm, decisive leadership in digital crises, more strongly equipping him to lead technology teams under pressure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77b54aa elementor-widget elementor-widget-heading\" data-id=\"77b54aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bridging operational and digital worlds and translating maritime leadership to cyber resilience\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5680d75 elementor-widget elementor-widget-text-editor\" data-id=\"5680d75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Reflecting on his time as a high-seas sailor, Gaurav recounts some of the most alarming moments he faced as a captain navigating global trade routes. During a 20-day voyage across the Atlantic Ocean, he recalls the intense isolation one can feel drifting in the middle of the ocean, where help is nowhere near. In these moments of unpredictability, the crew is entirely self-reliant, trusting in their skills and abilities, their vessel, and at times even a higher power to see them through. Such experiences instilled in him a profound sense of preparedness and trust\u2014qualities that continue to shape his leadership in the digital domain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6b2550 elementor-widget elementor-widget-text-editor\" data-id=\"a6b2550\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gaurav\u2019s experience as a commercial shipping captain has largely influenced his approach as CIO, where he has a similar role of uniting a diverse crew to navigate real-life storms. He must synchronize technology, cybersecurity, infrastructure, and data teams to steer through digital challenges or cyber threats. The leadership, risk management, and team coordination skills honed during his tenure as a shipping captain now translate into decisive, adaptable management in the digital realm. This enables him to shape business-level strategies that drive operational resilience and meaningful transformation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4056c96 elementor-widget elementor-widget-heading\" data-id=\"4056c96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The importance of the Chief Information Security Officer certification <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd901e3 elementor-widget elementor-widget-text-editor\" data-id=\"fd901e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gaurav stands out among the new wave of CIOs and C-suite leaders as one of the few to also serve as a Chief Information Security Officer (CISO). As a C-level executive, he has always sought to go beyond high-level oversight and truly understand the details of his field. Cybersecurity was always a passion, and earning the <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CISO certification<\/a> was a natural next step, offering him a structured, strategic, and a comprehensive approach to managing security at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c097aaf elementor-widget elementor-widget-text-editor\" data-id=\"c097aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As per Gaurav, earning a certificate is not just about passing the examination. It is about being able to make the right decisions for the organization by developing a deep understanding of cybersecurity. Pursuing the CISO challenge fed into his natural curiosity as a lifelong learner and reflected his commitment to his own development as well as the company\u2019s well-being. Such certifications expand a leader\u2019s horizons, helping them keep pace with the rapidly evolving cyber threats and industry best practices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe9928 elementor-widget elementor-widget-text-editor\" data-id=\"7fe9928\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Executive certifications like the CISO are known for their ability to deepen technical knowledge as well as build global credibility. They serve the organization\u2019s needs in a structured way and contribute to its overall <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-posture-management-why-it-matters-and-how-it-works\/\" target=\"_blank\" rel=\"noopener\">security posture<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b6df9e elementor-widget elementor-widget-heading\" data-id=\"4b6df9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Recognizing the importance of cybersecurity in the workplace<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f164278 elementor-widget elementor-widget-text-editor\" data-id=\"f164278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is still often perceived as just another branch of IT. The shift begins only when an organization truly understands why certification matters. Over the past few years, there has been growing understanding that cybersecurity isn\u2019t just the sole responsibility of the IT department. Rather, it requires a proactive, organization-wide approach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4048d9f elementor-widget elementor-widget-text-editor\" data-id=\"4048d9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This awareness is steadily taking root in organizations, and board members are grasping how vital cybersecurity is to the overall health of the organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e1d8f9 elementor-widget elementor-widget-heading\" data-id=\"7e1d8f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Building resilience against ransomware in port infrastructure <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7479dc9 elementor-widget elementor-widget-text-editor\" data-id=\"7479dc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The cyber threat landscape is constantly evolving, and ransomware remains one of the most pressing concerns for organizations today. In the marine industry, the stakes are particularly high. A cyberattack, especially ransomware, on port infrastructure could potentially bring operations to a halt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2618d85 elementor-widget elementor-widget-text-editor\" data-id=\"2618d85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ransomware, phishing, and spear phishing are some of the most common types of cyberattacks. However, it is important to recognize that cyber threats can originate from different sources, each with different motivations. Hackers can be individuals or state and non-state actors. The challenge with ports is not just in protecting IT systems but also securing operational technology (OT) environments. This requires a proactive risk mitigation strategy and a user-centric approach, fostering awareness and resilience throughout the organization. As cybersecurity is continuous it is critical that vigilance is robust and round-the-clock and not just at a single point in time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-401f102 elementor-widget elementor-widget-heading\" data-id=\"401f102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Blurring of lines between IT and OT in cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa08f13 elementor-widget elementor-widget-text-editor\" data-id=\"fa08f13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The line between IT and OT is increasingly blurring, especially in sectors like ports, utilities, and other critical infrastructure. As ports become more digitized, they can easily connect systems that were previously isolated, such as those managing operations for water, electricity, and communications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49d75fe elementor-widget elementor-widget-text-editor\" data-id=\"49d75fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These previously air-gapped OT systems are now more vulnerable to cyberattacks that were traditionally associated with IT. This growing interconnectedness means that threats once confined to IT systems are now penetrating OT environments too. In response to this growing interconnection, organizations must first thoroughly assess their exposure and understand how integrated their OT systems have become, before focusing on deploying new technologies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5272fdc elementor-widget elementor-widget-heading\" data-id=\"5272fdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integration of IoT endpoints into OT systems<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f371e1d elementor-widget elementor-widget-text-editor\" data-id=\"f371e1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The integration of IoT endpoints into OT systems is becoming increasingly prevalent. As part of their digital transformation strategy, organizations are pairing IoT with AI to gain valuable insights and make better predictions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73f09fa elementor-widget elementor-widget-text-editor\" data-id=\"73f09fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In critical national infrastructure environments, this convergence of IT, OT, and IoT is creating a unified and highly interconnected ecosystem. Leaders must now recognize the new vulnerabilities they are introducing into the system. Maintaining a robust cybersecurity posture becomes critical.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7e3fae elementor-widget elementor-widget-heading\" data-id=\"f7e3fae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Port security is national security <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a35503 elementor-widget elementor-widget-text-editor\" data-id=\"9a35503\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Port operations are at the heart of the global supply chain. A brief downtime in port operations can result in massive financial, contractual, and societal disruptions, such as the disruption in shipping lines, freight forwarders, and city infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a06c24 elementor-widget elementor-widget-text-editor\" data-id=\"4a06c24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A secured port infrastructure indicates uninterrupted flow of goods and commodities, prevention from city-wide gridlocks, and upholding service level agreements with shipping lines. A cyberattack at a port not only affects the cargo but also impacts the smooth functioning of cities and economies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-536dd50 elementor-widget elementor-widget-heading\" data-id=\"536dd50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident response: Preparation, playbooks, and practice<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-230aaa7 elementor-widget elementor-widget-text-editor\" data-id=\"230aaa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Preparation is critical. Preparation during peacetime ensures teams can act decisively and effectively when a real cyber hurricane hits. Crisis playbooks, regular drills, well-retained procedures, and clearly defined roles for every member of the organization, including senior leaders, lay the groundwork for effective responses to a cyberattack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2130dea elementor-widget elementor-widget-text-editor\" data-id=\"2130dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Training and readiness built during blue sky periods (before a crisis strikes) are what determine success when the unexpected happens. Reliable, tested backups are also crucial and non-negotiable.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-515136a elementor-widget elementor-widget-heading\" data-id=\"515136a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bridging and managing the budget gap judiciously during a cyber incident <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55ede44 elementor-widget elementor-widget-text-editor\" data-id=\"55ede44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the major challenges that tech leaders face is communicating or explaining the value of cybersecurity investments to non-tech personnel. The issue becomes more evident during discussions on budget management for a cyber incident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fd3f29 elementor-widget elementor-widget-text-editor\" data-id=\"4fd3f29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Leaders should instead try to explain their technical needs in business terms, focusing on risk mitigation, industry trends, and possible outcomes. Effective budget management demands a strategic approach. By illustrating how new technologies can proactively reduce risk and prevent costly incidents, tech leaders can foster a shift in the mindset of the management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3244ba4 elementor-widget elementor-widget-heading\" data-id=\"3244ba4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The role of certification and continuous learning<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e230997 elementor-widget elementor-widget-text-editor\" data-id=\"e230997\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Investing in certification courses, like Certified Ethical Hacker or Certified CISO, helps teams stay current with the latest expertise and trends and fosters a culture of continuous learning and professional development.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5168330 elementor-widget elementor-widget-text-editor\" data-id=\"5168330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organizations should provide learning opportunities to employees. Retaining top talent goes beyond competitive salaries. Organizations must foster an environment that values and encourages continuous learning, provides scope for upskilling, and embeds training into their culture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fff257 elementor-widget elementor-widget-text-editor\" data-id=\"0fff257\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Technical certifications empower IT and cybersecurity specialists, while cyber awareness trainings widen the knowledge base of non-IT employees and reduce human risk across the board.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1077fd elementor-widget elementor-widget-heading\" data-id=\"b1077fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The need for hands-on cybersecurity training<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53b9c7d elementor-widget elementor-widget-text-editor\" data-id=\"53b9c7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hands-on training is critical. In fact, it has become indispensable in cybersecurity education. Cybersecurity programs that blend theory with practice, like cyber drills and competitions, provide professionals with real-world experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d7466f elementor-widget elementor-widget-text-editor\" data-id=\"9d7466f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The inclusion of AI-driven modules and practical exams, as seen in the latest <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker<\/a> certification programs, ensures that learning remains relevant and aligned with industry standards. These hands-on cybersecurity trainings build confidence and agility along with technical proficiency to tackle emerging threats in day-to-day business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8f77e0 elementor-widget elementor-widget-heading\" data-id=\"c8f77e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expert advice from the leader <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51488a0 elementor-widget elementor-widget-text-editor\" data-id=\"51488a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Working hard, staying true to ourselves, and striving to add value to our organization will definitely pay out in the long run. Success comes from continuous learning, genuine effort, and a focus on excellence. There\u2019s no secret sauce!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a31f5a7 elementor-widget elementor-widget-text-editor\" data-id=\"a31f5a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gaurav rightly says that we must stay hungry for knowledge and adopt a learner\u2019s mindset. Visit the podcast <a href=\"https:\/\/www.youtube.com\/watch?v=qMoRlZ2blro&amp;t=84s\" target=\"_blank\" rel=\"noopener\">Cyber Resilience and Leadership: Lessons from the Frontlines<\/a> and hear the captain himself spelling out the need for holistic and adaptive security strategies in a bid to combat the expanding cybersecurity attack surface.<\/p>\n<p>For more insights from industry leaders, stay tuned to the EC-Council Cybersecurity Podcast series.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure In the ever-evolving world of cybersecurity, leaders from diverse backgrounds are uniquely positioned to confront complex threats facing industries and critical infrastructure. These are the individuals shaping the future of the cybersecurity industry. In this episode of EC-Council\u2019s Cybersecurity Podcast, we&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84126,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[13062],"tags":[],"class_list":{"0":"post-84084","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity-podcast"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Resilience &amp; Port Infrastructure: Lessons from a Ship Captain<\/title>\n<meta name=\"description\" content=\"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience &amp; Port Infrastructure: Lessons from a Ship Captain\" \/>\n<meta property=\"og:description\" content=\"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-30T12:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T11:25:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Leadership-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"415\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Resilience &amp; Port Infrastructure: Lessons from a Ship Captain\" \/>\n<meta name=\"twitter:description\" content=\"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Leadership-image.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0\",\"datePublished\":\"2025-10-30T12:57:00+00:00\",\"dateModified\":\"2026-01-12T11:25:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/\"},\"wordCount\":1709,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Ep-3.jpg\",\"articleSection\":[\"Cybersecurity Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/\",\"name\":\"Cyber Resilience & Port Infrastructure: Lessons from a Ship Captain\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Ep-3.jpg\",\"datePublished\":\"2025-10-30T12:57:00+00:00\",\"dateModified\":\"2026-01-12T11:25:29+00:00\",\"description\":\"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Ep-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Ep-3.jpg\",\"width\":1920,\"height\":997,\"caption\":\"Cyber Resilience and Leadership\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/port-infrastructure-cyber-resilience-leadership\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Podcast\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cybersecurity-podcast\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Resilience & Port Infrastructure: Lessons from a Ship Captain","description":"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience & Port Infrastructure: Lessons from a Ship Captain","og_description":"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-10-30T12:57:00+00:00","article_modified_time":"2026-01-12T11:25:29+00:00","og_image":[{"width":800,"height":415,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Leadership-image.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Cyber Resilience & Port Infrastructure: Lessons from a Ship Captain","twitter_description":"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Leadership-image.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0","datePublished":"2025-10-30T12:57:00+00:00","dateModified":"2026-01-12T11:25:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/"},"wordCount":1709,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3.jpg","articleSection":["Cybersecurity Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/","name":"Cyber Resilience & Port Infrastructure: Lessons from a Ship Captain","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3.jpg","datePublished":"2025-10-30T12:57:00+00:00","dateModified":"2026-01-12T11:25:29+00:00","description":"Explore cyber resilience and leadership lessons for port infrastructure from a seasoned shipping captain. Discover how to secure maritime supply chains.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Ep-3.jpg","width":1920,"height":997,"caption":"Cyber Resilience and Leadership"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/port-infrastructure-cyber-resilience-leadership\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Podcast","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cybersecurity-podcast\/"},{"@type":"ListItem","position":4,"name":"Cyber Resilience and Leadership: Lessons from a Shipping Captain on Cybersecurity in Port Infrastructure\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84084"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84084\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84126"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}