USCG MTSA Cyber Security Training
Training designed for maritime professionals working with US-flagged vessels and needing to comply with the latest USCG MTSA cyber security regulations 2026
ObjectivesThe objective of this course is to equip maritime professionals with the knowledge and practical skills enabling them to implement or enhance robust cybersecurity measures in line with USCG & IMO regulations and industry best practices. Participants will learn about maritime cyber security threats, how to protect critical IT and OT systems, and how to react when an incident occurs. This training ensures full compliance with the latest USCG MTSA cyber security training requirements applicable from 12 January 2026. |
Entrance requirementsWho should attend: Facility Security Officers (FSO), Vessel Security Officers (VSO), IT and OT technical staff and all shore staff involved in, or with responsibility for, safeguarding vessels from cyber risks. Duration: 8 hours |
Understanding the maritime cyber threat landscape and attacker methodologies is essential for safeguarding vessels and port facilities today. Compliance with regulatory frameworks such as IMO Guidelines, MTSA, and industry standards ensures a strong foundation for security. Integrating cybersecurity measures into Safety Management Systems and Facility Security Plans enhances operational resilience, supported by techniques like network segmentation, continuous monitoring, and robust recovery strategies for both IT and OT environments.
Join DNV's cyber security experts online for two half days and follow this new training from the comfort of your own workspace.
After attending the two sessions, take the final course assessment and collect your Certificate of Successful Completion.
Focus Points:
- Cyber Threat Landscape in Maritime Operations
- Common attack vectors targeting vessels and shore-based systems
- Regulatory Framework and Compliance
- IMO Resolution MSC.428(98) and USCG MTSA Cyber Regulations
- Cybersecurity Implementation for IT and OT Systems with the HOT approach
- Human: levels of responsibility and do’s and don’ts
- Organisation: Cyber Security Management System
- Technology: access control, device hardening, and network segregation, …
- Incident Management and Reporting
- Phases of incident management
- Crew first response
- Detection and continuous monitoring
- Title 33 CFR reporting obligations
- Backup strategies, manual operations, and recovery planning