
Transport
Failures in traffic control systems, ransomware at a container terminal or sabotage of vehicle telematics could paralyse supply chains across Europe. Losses can cascade across multiple supply chain participants. Transport combines IT, OT and IoT, so a single attack can disrupt many critical areas simultaneously. For example, following the 2017 ransomware attack, Maersk estimated operational disruption costs exceeded USD 300 million.
We've supported the transport sector for years by implementing safeguards, with a strong focus on NIS2 (ultimately amended UoKSC) compliance. Even entities outside the NIS2 "essential/important" lists (e.g. freight forwarding, vehicle servicing) must enhance their security so their NIS2-regulated customers can secure their supply chains.
Use cases
- IT/OT segmentation – firewalls, separation of office and operational networks
- Fleet monitoring – anomaly detection in GPS, tachographs, logistics terminals and automated warehouses
- Incident response – isolation playbooks as part of incident management processes
- Full hub audit – zone classification, gap analysis against NIS2
- Ransomware hardening – offline backups, cold start tests under crisis response
- Training – cyber hygiene for train drivers, pilots, drivers, operators and coordinators

Would you like to reduce the risk of downtime or penalties?
How we help the transport industry
Why is transport targeted?
The reason the transport industry is subject to frequent attacks is that it is critical to supply chain continuity. Disrupting transport operations directly impacts multiple sectors, increasing pressure to pay ransoms or restore services quickly.
Additionally, complex, distributed technology (IT, OT, IoT) means many systems and devices operate in parallel – increasing potential entry points for attackers.
Complex supply chains – hundreds of subcontractors (TLS, handling, servicing) mean more entry points for attackers
Most common threats
- Ransomware / wiper in cargo systems, timetables, ticketing
- GPS spoofing or ADS-B spoofing – false positions for ships, planes, trains
- Supply chain sabotage – malicious firmware updates to onboard devices
- Unauthorised remote access – weak service VPNs at HQ
- Phishing of dispatchers and operators
How we help the transport industry
- We audit IT/OT/IoT networks against NIS2 and other regulations
- We perform penetration tests for transport protocols
- We build Information Security Management Systems (ISMS)
- We support development of security management procedures
- We create documentation to formalise processes that increase security
- We design zero trust architecture
- We support incident management processes including reporting to authorities
- We prepare TLS subcontractors to meet contractual requirements so they maintain continuity and aren't excluded from the supply chain