ICAO update Global Aviation Security Plan (GASeP) for strengthening aviation security

ICAO's newest edition of the Global Aviation Security Plan (GASeP) is designed to enhance the international aviation security environment by providing detailed guidance to governments, industry, and other stakeholders. This new plan focusses on six global aviation security priority areas:
- Risk awareness and response;
- The preservation of a strong and effective security culture;
- Human factors (including human performance and the professionalization of the aviation security workforce);
- Innovation and the allocation of technological resources;
- Oversight and quality assurance; and
- Cooperation and support among stakeholders.
ICAO Secretary General Juan Carlos Salazar addressed the importance of GASeP, “The new ICAO Global Aviation Security Plan is both an acknowledgment of the urgent and evolving aviation security challenges we face and a product of ICAO’s unwavering commitment to confronting them head-on. The Plan is a central element in our support for robust action by governments on aviation security and cybersecurity. It also provides crucial support to our advocacy for heightened resourcing and focus for these priorities.”
This second edition of the GASeP is a response to ICAO Assembly Resolutions A41-18 and A41-19 and is in line with the UN Security Council Resolution 2309 (2016). It aims to help States fulfill their commitments under these instruments and under Annex 17 – Aviation Security of the Convention on International Civil Aviation. States have set themselves an aspirational goal to “achieve and maintain a strong global aviation security system that is underpinned by full and effective implementation of ICAO aviation security Standards in all Member States.”
The GASeP structures States’ progress towards this goal, which will be monitored by ICAO. The results of the UN agency’s Universal Security Audit Programme (USAP), which assesses States’ implementation of ICAO Security Standards, will be used to measure progress towards the aspirational goal and its milestones. Additionally, the voluntary sharing of experience by States and all relevant stakeholders will help measure improvement in the global AVSEC priority areas.
As the global aviation community continues to face evolving security threats, the GASeP serves as a vital tool in ICAO’s ongoing efforts to strengthen aviation security worldwide. ICAO calls upon all States and stakeholders to actively engage with and implement the Plan to ensure a secure and resilient international aviation system.

CISA and Partners join ASD’S ACSC to Release Advisory on PRC State-Sponsored Group, APT 40

CISA has collaborated with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) to release an advisory, People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action outlining a PRC state-sponsored cyber group’s activity. The following organizations also collaborated with ASD's ACSC on the guidance:
- The National Security Agency (NSA);
- The Federal Bureau of Investigation (FBI);
- The United Kingdom’s National Cyber Security Centre (NCSC-UK);
- The Canadian Centre for Cyber Security (CCCS);
- The New Zealand National Cyber Security Centre (NCSC-NZ);
- The German Federal Intelligence Service (BND) and Federal Office for the Protection of the Constitution (BfV);
- The Republic of Korea’s National Intelligence Service (NIS) and NIS’ National Cyber Security Center (NCSC); and
- Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) and National Policy Agency (NPA).
The advisory is based on current ACSC-led incident response investigations and shared understanding of a PRC state-sponsored cyber group, APT40—also known as Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk in industry reporting.
APT 40 has previously targeted organizations in various countries, including Australia and the United States. Notably, APT 40 possesses the ability to quickly transform and adapt vulnerability proofs of concept (POCs) for targeting, reconnaissance, and exploitation operations. APT 40 identifies new exploits within widely used public software such as Log4J, Atlassian Confluence and Microsoft Exchange to target the infrastructure of the associated vulnerability.
CISA urges all organizations and software manufacturers to review the advisory to help identify, prevent, and remediate APT 40 intrusions. Software vendors are also urged to incorporate Secure by Design principles into their practices to limit the impact of threat actor techniques and to strengthen the security posture of their products for their customers.

Hurricane Beryl Causes Havoc for State of Texas, 2.3m without power

Hurricane Beryl made landfall along the Texas coast as a Category 1 storm, unleashing a barrage of severe weather as it moved inland before weakening into a tropical storm, yet still cable of widespread damage.
Beryl had sustained winds of over 80 mph as it made landfall, as it battered communities and infrastructure, with more than 2.3 million people are without power in Texas, according to poweroutage.us.
The storm prompted closures or vessel traffic restrictions at multiple ports in cities from Houston to Corpus Christi. The ports of Corpus Christi, Houston, Galveston, Freeport, and Texas City said they closed after condition "Zulu" was set by U.S. Coast Guard captains.
Disruption was also caused to transport where road closures and high-water locations in Houston and Texas City caused problems.
Acting Governor Dan Patrick urged Texans to make final preparations and announced that 121 counties were added to the state’s Hurricane Beryl Disaster Declaration, as storm forecasts shifted the expected landfall north and east of previous projections.
The Texas Division of Emergency Management (TDEM) increased its readiness level of the State Emergency Operations Center and Texas Emergency Management Council agencies worked 24-hour operations, while continuing to preposition state emergency response resources that were readied for deployment by Governor Greg Abbott.

EPA Outlines Enforcement Measures to Help Prevent Cybersecurity Attacks and Protect the Nation’s Drinking Water

The U.S. Environmental Protection Agency issued an enforcement alert outlining the urgent cybersecurity threats and vulnerabilities to community drinking water systems and the steps these systems need to take to comply with the Safe Drinking Water Act. The alert is part of a government-wide effort – led by the National Security Council and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency – to reduce the nation’s infrastructure and cybersecurity vulnerabilities. EPA is issuing this alert because threats to, and attacks on, the nation’s water system have increased in frequency and severity to a point where additional action is critical.
“Protecting our nation’s drinking water is a cornerstone of EPA’s mission, and we are committed to using every tool, including our enforcement authorities, to ensure that our nation’s drinking water is protected from cyberattacks,” said EPA Deputy Administrator Janet McCabe. “EPA’s new enforcement alert is the latest step that the Biden-Harris Administration is taking to ensure communities understand the urgency and severity of cyberattacks and water systems are ready to address these serious threats to our nation’s public health.”
Recent EPA inspections have revealed that the majority of water systems inspected – over 70 percent – do not fully comply with requirements in the Safe Drinking Water Act and that some of those systems have critical cybersecurity vulnerabilities, such as default passwords that have not been updated and single logins that can easily be compromised. As EPA and its state and federal security and intelligence partners continue to identify vulnerabilities, informed by successful cyberattacks to water systems across the United States, the agency remains committed to working with state and sector organization partners to successfully protect drinking water for communities.
Today's alert emphasizes the importance of EPA’s ongoing inspection and enforcement activities under Safe Drinking Water Act section 1433. The agency will increase the number of planned inspections and, where appropriate, will take civil and criminal enforcement actions, including in response to a situation that may present an imminent and substantial endangerment. Inspections will ensure that water systems are meeting their requirements to regularly assess resilience vulnerabilities, including cybersecurity, and to develop emergency response plans. In addition, EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems:
- Reduce exposure to public-facing internet.
- Conduct regular cybersecurity assessments.
- Change default passwords immediately.
- Conduct an inventory of OT/IT assets.
- Develop and exercise cybersecurity incident response and recovery plans.
- Backup OT/IT systems.
- Reduce exposure to vulnerabilities.
- Conduct cybersecurity awareness training.
EPA Administrator Michael S. Regan and National Security Advisor Jake Sullivan also recently sent a letter to the nation’s governors on the urgency of the threats and the importance of collaboration across federal and state partners to develop comprehensive strategies to close gaps in cyber-resilience. Following the meeting, the National Security Council encouraged each state to prepare an action plan presenting the state’s strategy to mitigate the most significant cybersecurity vulnerabilities in the states’ water and wastewater systems by late June. EPA is also moving forward with the Water Sector Coordinating Council and Water Government Coordinating Council to establish a Task Force to identify additional near-term actions and strategies to reduce the risk of water and wastewater systems nationwide to cyberattacks.

Securing Critical Infrastructure With Validated and Trusted AI

AI is changing cybersecurity – providing new tools for security professionals, but also giving cyber threat actors a better arsenal of weapons for their attacks. Fortress is leveraging the latest in GenAI to better identify and understand the supply chain risks critical infrastructure organizations face.
Fortress's AI Monitoring, tailor made for the unique threats Critical Infrastructure organizations face, enables security pros to get quicker and more accurate data on the most critical risks and vulnerabilities across vendors and products. In short, it's a new evolution in cyber supply chain risk management (C-SCRM) and third-party cybersecurity risk management (TPCRM).
"AI is changing cybersecurity, but it is not the cure-all to national security threats from nation-state adversaries," said Fortress CEO and co-founder Alex Santos. "We were extremely deliberate in how we decided to deploy AI in our solutions. AI-enabled data retrieval without collaborative data sharing and human validation leaves large blind spots and generates false positives that divert resources from fighting the most pressing challenges. However, AI combined with a comprehensive approach to cyber defenses can quickly identify the 'needles in the haystack' that pose the most critical risks."
AI gives Fortress the ability to reduce risk assessment and monitoring costs by up to 90% and discover risks more than 80% faster. Using the latest in GenAI, Fortress automates the retrieval and analysis of vendor and product risk resulting in actionable, prioritized, and conclusive steps to empower security and risk management teams and keep your organization safe.
Besides generating comprehensive insights alerting organizations to emerging risks faster, Fortress integrates with legacy systems that can be omnipresent in critical infrastructure and streamlines government and energy regulatory compliance to simplify complex and time-consuming audits administered by regulatory enforcement.
"Certainly, there is an industry-wide push to get AI integrated into cybersecurity products as fast as possible," said Santos. "Others saw AI as a 'move fast and break things' moment. We knew AI had to be done right and done responsibly. We knew by working hand in hand with our customers that AI had to be done right and responsibly. Our AI Monitoring suite is built for today's rapidly changing and complex cyber supply chain and third-party attack surfaces. We've allowed our clients to stay one step ahead."

20.3 million of EU Funds for major flood protection project in Eisenach

EU funds will be used to build flood protection along the section of the river Hörsel which goes from Langensalzaer to Karolinenstraße. The project in this challenging section addresses existing infrastructure, traffic management, and urban integration. In addition, the region is also planning a new Karolinen Bridge.
Currently, flood protection measures near the "Auf dem Gries" industrial area, including the cycling path connection to Stedtfeld, are nearing completion.
Support of €16 million in previous programming period
Thanks to substantial financial support from the EU, the flood protection efforts in Eisenach have been progressing systematically since 2015. Initial measures began in the district of Stedtfeld, with completion achieved by 2017. Next, the flood dike near the Stedtfeld wastewater treatment plant was replaced.
Construction started in 2020 along the Hörsel river. Additionally, from August 2021 to August 2022, flood protection measures were implemented in the Hörschel district.
In 2023, an EU-funded project completed flood protection measures near the Opel factory in Eisenach.
These ambitious projects show the EU's commitment to boosting the region's flood resilience. They will protect residents and critical infrastructure.

UK-led Joint Expeditionary Force rehearses undersea critical infrastructure protection from the North Atlantic to the Baltic Sea

The Joint Expeditionary Force (JEF) has begun a month-long Response Option  activity Nordic Warden this week for strengthening security of the critical undersea infrastructure in the area from the North Atlantic to the Baltic Sea.

JEF partner nations, including Lithuania, will train at  Nordic Warden exchanging information and provide a synchronized and coordinated response to ensure security of critical undersea infrastructure.

Operation activities will include reconnaissance flights and patrols in cooperation with the JEF air forces and navies. Partner nations will also enhance information exchange and coordination to ensure better situation awareness to ships in the JEF area of responsibility. Operation Nordic Warden is controlled from the JEF headquarters in Northwood, UK.

The Response Option activity Nordic Warden is similar to the first JEF activity conducted in December 2023 in response to the critical infrastructure damage in the Baltic and North Sea regions, namely, the damage to the cable connecting Sweden and Estonia, as well as the pipeline between Finland and Estonia, with real capabilities.

From Lithuania’s perspective, partnership in the JEF is one of the initial means of response to any crisis, including damage to undersea infrastructure. It enables resource sharing, intelligence exchange and joint solutions to mutual regional issues.

The JEF is led by the United Kingdom, its comprises maritime, air and land capabilities contributed by the ten Northern European partners: UK, Denmark, Estonia, Latvia, Lithuania, Netherlands, Norway, Sweden, Finland and Iceland.  Geographical proximity, shared sea borders and economy means cooperation on undersea infrastructure security is not just effective but also vital.

Hybrid threats: Council paves the way for deploying Hybrid Rapid Response Teams

The European Council has approved the guiding framework for the practical establishment of the EU Hybrid Rapid Response Teams. This paves the way for such teams to be deployed upon request, to prepare against and counter hybrid threats and campaigns.
Hybrid Rapid Response Teams are one of the key instruments to support EU member states and partner countries in countering hybrid threats as part of the EU Hybrid Toolbox. As one of the key deliverables of the Strategic Compass, they will provide tailored and targeted short-term assistance to member states, Common Security and Defence Policy missions and operations, and partner countries in countering hybrid threats and campaigns.
In a deteriorating security environment, with increasing disinformation, cyber-attacks, attacks on critical infrastructure, instrumentalised migration, and election interference by malign actors, the Hybrid Rapid Response Teams will be an important new capability of the EU to counter new and emerging threats.

TSA announces appointment of members to Surface Transportation Security Advisory Committee

The Transportation Security Administration (TSA) appointed nine people as voting members of the Surface Transportation Security Advisory Committee (STSAC). With these appointments, two new and seven reappointed, the STSAC now includes 30 voting members.
The STSAC was established by Congress in 2019 to advise the TSA Administrator on surface transportation security matters, including recommendations for the development, refinement and implementation of policies, programs, initiatives, rulemakings, and security directives pertaining to the surface transportation sector.
The new members are:
- Christopher Hand, Director of Research, Brotherhood of Railroad Signalmen
- Kaitlyn Holmecki, Senior Manager, International Trade & Security Policy, American Trucking Association
The reappointed members are:
- Jared Cassity, Chief of Safety and Alternate National Legislative Director, SMART Transportation
- James Cook, Assistant Chief of Police, AMTRAK
- Brian Harrell, Vice President & Chief Security Officer, AVANGRID
- Norma Krayem, Vice President, Chair, Cybersecurity, Privacy & Digital Innovation Practice Group, Van Scoyoc Associates
- Robert Mims, Director, Technology Security, Southern Company Gas
- Christopher Trucillo, Chief of Police, New Jersey Transit Police Department
- Lowell Williams, Chief Executive Officer, Cold Iron Security
The STSAC members represent each mode of surface transportation, such as freight rail, highways, mass transit, over-the-road bus, passenger rail, pipelines, school bus industry and trucking among others. For a complete list, please see the STSAC Charter. The Committee also has 14 non-voting members who serve in an advisory capacity for two-year terms from the Departments of Defense, Energy, Homeland Security, and Transportation, as well as the Federal Bureau of Investigation.

Your latest issue of Critical Infrastructure Protection & Resilience News has arrived

Download your copy now at www.cip-association.org/CIPRNews
Please find here your downloadable copy of the Spring 2024 issue of Critical Infrastructure Protection & Resilience News, the official magazine of the International Association of CIP Professionals (IACIPP), for the latest views, features and news, including a Review of the recent Critical Infrastructure Protection & Resilience North America conference and exhibition in Lake Charles, LA.
Critical Infrastructure Protection & Resilience News in this issue:
- Protecting Life - Securing Agriculture
- Protect our Electric Grid – Before it’s Too Late
- Connecting Unrelated Industries Strengthens All Sectors
- Why Airspace Awareness Matters for Critical Infrastructure Security
- Critical Infrastructure Resilience: Are we addressing the real challenges? In the right way?
- Break down cyber and physical security silos to improve protection and operations
- An Interview with CITGO
- Is Cybersecurity As Enchanted as Sleeping Beauty?
- CIPRE Review
- Agency News
- Industry News
Download your copy at www.cip-association.org/CIPRNews
1 2 3 4 5 6 53