Maritime Cybersecurity Reading List

56 essential books for maritime cybersecurity professionals — from shipboard OT security to satellite threats, carefully curated by industry practitioners.

As an Amazon Associate, I earn from qualifying purchases. Book links on this page are affiliate links — using them supports this resource at no extra cost to you.

Maritime Cybersecurity — Core Titles

13 books

Maritime Cybersecurity: A Guide for Leaders and Managers Gary C. Kessler, Steven D. Shepard

Maritime Cybersecurity: A Guide for Leaders and Managers

Gary C. Kessler, Steven D. Shepard

2022

The definitive guide to maritime cybersecurity. Covers the intersection of the maritime transportation system and information security, including maritime cyber risk management, cyberattacks on shipping lines, port cybersecurity, threats against shipboard networks, GPS/AIS spoofing, threats against industrial control systems and autonomous vessels, and strategies for maritime cyberdefense.

Issues in Maritime Cyber Security Fred S. Roberts, Nicole K. Drumhiller, Joseph DiRenzo III

Issues in Maritime Cyber Security

Fred S. Roberts, Nicole K. Drumhiller, Joseph DiRenzo III

2017

Pioneering academic work from CCICADA (DHS Center of Excellence at Rutgers). Addresses how cyber networks are a major component of the Maritime Transportation System. Beneficial as a textbook for courses on risk analysis, national security, cyber threats, or maritime policy.

Cyber Security Workbook for On Board Ship Use (6th Edition) BIMCO, International Chamber of Shipping, Witherby Publishing

Cyber Security Workbook for On Board Ship Use (6th Edition)

BIMCO, International Chamber of Shipping, Witherby Publishing

2025

The industry-standard practical workbook for Masters and senior officers. Aligned with IMO Resolution MSC.428(98). Contains 14 checklists and 7 annexes including Cyber Security Risk Assessment and Creating a Cyber Security Plan. Updated annually with new threats and case studies. Essential for ISM Code compliance.

Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains Nineta Polemi

Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains

Nineta Polemi

2017

Examines how ports assess cyber risks and vulnerabilities, with focus on Critical Information Infrastructure (CII) ecosystems. Author worked for European Commission and managed security projects for NSA, NATO, Greek Ministry of Defense, and European Commission.

Maritime Security: An Introduction (2nd Edition) Michael McNicholas

Maritime Security: An Introduction (2nd Edition)

Michael McNicholas

2016

Comprehensive introduction to maritime security including cybersecurity. Explains how commercial seaports and vessels function, current threats, and security policies needed. New chapters on transnational crime, migration, and legal/cybersecurity issues.

Understanding Maritime Security Christian Bueger, Timothy Edmunds

Understanding Maritime Security

Christian Bueger, Timothy Edmunds

2024

Latest academic perspective from Oxford University Press. Co-author advised UK Cabinet Office, Ministry of Defence, and Department for Transport on the 2022 UK National Strategy for Maritime Security. Covers evolving maritime security landscape including cyber threats.

Maritime Security: A Practical Guide for Mariners Steven Jones

Maritime Security: A Practical Guide for Mariners

Steven Jones

2023

Written by the Maritime Director of SAMI (Security Association for the Maritime Industry). Covers evolution of maritime security, ISPS Code compliance, and the rapidly developing area of cybersecurity.

2025 Maritime Security: A Comprehensive Guide for Shipowners, Seafarers and Administrations (2nd Edition) International Chamber of Shipping (ICS)

2025 Maritime Security: A Comprehensive Guide for Shipowners, Seafarers and Administrations (2nd Edition)

International Chamber of Shipping (ICS)

2025

Official ICS guidance covering all aspects of maritime security including cyber risk management. Essential reference for shipowners, operators, and maritime administrations implementing security programs.

Guide to Maritime Security & The ISPS Code (2021 Edition) International Maritime Organization (IMO)

Guide to Maritime Security & The ISPS Code (2021 Edition)

International Maritime Organization (IMO)

2021

Official IMO publication incorporating guidance on maritime cyber risk management. Second edition includes updated sources supporting ISPS Code implementation. Essential for understanding the regulatory framework that governs maritime cybersecurity requirements.

Unmanned and Autonomous Ships

Unmanned and Autonomous Ships

R. Glenn Wright

2023

Explores automated shipping including cybersecurity implications. Covers ship design, command and control, navigation, communications, and security for autonomous vessels. Essential reading as MASS (Maritime Autonomous Surface Ships) become reality.

A Practitioner's Guide to Effective Maritime and Port Security Michael Edgerton

A Practitioner's Guide to Effective Maritime and Port Security

Michael Edgerton

2013

International perspective on port operations security covering ISPS Code implementation, facility security plans, port access control, and coordination challenges between vessel operators, port authorities, and national agencies.

BIMCO Guidelines on Cyber Security Onboard Ships (5th Ed.) BIMCO, CLIA, ICS, INTERCARGO, INTERMANAGER, INTERTANKO, IUMI

BIMCO Guidelines on Cyber Security Onboard Ships (5th Ed.)

BIMCO, CLIA, ICS, INTERCARGO, INTERMANAGER, INTERTANKO, IUMI

2023

The authoritative industry guidance document co-authored by all major maritime associations and P&I clubs. Defines the framework for cyber risk assessment, crew training, incident response planning, and recovery procedures onboard. Aligned with IMO MSC-FAL.1/Circ.3 and the ISM Code.

Bridge Team Management (2nd Ed.) A. J. Swift

Bridge Team Management (2nd Ed.)

A. J. Swift

2004

Foundational text on bridge resource management (BRM) — the human factors framework governing how vessel bridge teams communicate, share situational awareness, and make decisions under pressure. Essential for maritime cyber scenarios affecting navigation systems.

Industrial Control Systems & OT Security

9 books

Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems

Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems

Pascal Ackerman

2021

Author has 20+ years of experience in industrial network design, pentesting, and threat hunting, currently Manager at Ernst and Young. Covers ICS technology, architectures, communication media, and protocols. Directly applicable to shipboard OT systems.

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions

Clint Bodungen et al.

2016

From the trusted Hacking Exposed series. Shows how to assess ICS exposure and develop risk management plans, use threat modeling, implement ICS penetration testing, and understand how attackers exploit industrial protocols.

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Eric D. Knapp, Joel Thomas Langill

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Eric D. Knapp, Joel Thomas Langill

2014

Comprehensive guide to securing industrial networks. Covers unique protocols and applications that are foundation of ICS. Applicable to maritime SCADA systems.

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Tyson Macaulay, Bryan L. Singer

2011

Foundational text explaining how to develop and implement cybersecurity programs for ICS. Examines potential threats including malware, botnets, and outlines inherent ICS vulnerabilities. Essential for understanding shipboard control system security.

Cyber-security of SCADA and Other Industrial Control Systems Edward J. M. Colbert, Alexander Kott

Cyber-security of SCADA and Other Industrial Control Systems

Edward J. M. Colbert, Alexander Kott

2016

Part of Springer's Advances in Information Security series. Covers ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing. Tutorial chapters plus advanced topics on ICS governance and responses to attacks.

Handbook of SCADA/Control Systems Security

Handbook of SCADA/Control Systems Security

Robert Radvanovsky, Jacob Brodsky

2013

Fundamental outline of security concepts and methodologies pertaining to SCADA systems in critical utility and industrial systems. Essential reference for securing industrial automation and process control systems.

Cyber Security Operational Technology Best Practice Akingbade Akinfenwa

Cyber Security Operational Technology Best Practice

Akingbade Akinfenwa

2023

Practical guide to OT security in manufacturing, power generation, and transportation sectors. Addresses growing concerns about cyber attacks that can cause physical damage to equipment or disrupt essential services. Directly relevant to maritime OT environments.

Pentesting Industrial Control Systems Paul Smith

Pentesting Industrial Control Systems

Paul Smith

2021

Hands-on guide to analyzing and navigating ICS intricacies. Covers setting up ICS lab, open source intel-gathering, SOPs for ICS penetration testing, and connecting OT to engineering workstations. Essential for maritime security assessors.

Engineering-Grade OT Security: A Manager's Guide Andrew Ginter

Engineering-Grade OT Security: A Manager's Guide

Andrew Ginter

2022

Written for non-technical managers who own OT security decisions. Cuts through compliance checkbox thinking to explain what actually reduces risk in industrial environments — with particular attention to the gap between IT security controls and what works in OT.

Cyber-Physical Security & Critical Infrastructure

5 books

Cyber-Physical Attacks: A Growing Invisible Threat

Cyber-Physical Attacks: A Growing Invisible Threat

George Loukas

2015

How computers can disable systems and affect the physical world. Covers embedded systems, SCADA, and more. Written for non-experts and physical security professionals.

Critical Infrastructure Security: Cybersecurity Lessons Learned from Real-World Breaches Soledad Antelada Toledano

Critical Infrastructure Security: Cybersecurity Lessons Learned from Real-World Breaches

Soledad Antelada Toledano

2024

From introduction to critical infrastructure concepts through the vulnerability lifecycle. Covers real-world breaches and examines threats from DDoS to APTs. Essential for understanding how critical infrastructure attacks apply to maritime sector.

Maritime Critical Infrastructure Protection: DHS Need to Better Address Port Cybersecurity U.S. Government Accountability Office (GAO)

Maritime Critical Infrastructure Protection: DHS Need to Better Address Port Cybersecurity

U.S. Government Accountability Office (GAO)

2015

Official GAO report on port cybersecurity vulnerabilities. Documents how US ports handle $1.3 trillion in cargo annually and how maritime stakeholders rely on ICT to manage cargo movement. Essential policy document for understanding regulatory landscape.

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) Andrew Bochman, Sarah Freeman

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)

Andrew Bochman, Sarah Freeman

2021

Presents Idaho National Laboratory's CCE methodology — a consequence-first approach to critical infrastructure security that starts by identifying worst possible outcomes and works backward to determine what an adversary must compromise.

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats Richard A. Clarke, Robert K. Knake

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

Richard A. Clarke, Robert K. Knake

2019

Former White House cybersecurity coordinator provides a policy-level analysis of the cyber threat landscape, bridging national security policy and corporate cybersecurity with specific attention to critical infrastructure and regulatory frameworks.

Supply Chain Security

2 books

Supply Chain Security: A Comprehensive Approach

Supply Chain Security: A Comprehensive Approach

Arthur G. Arway

2013

Tools for ensuring supply chain security including rapid response protocols. Author has 27+ years of experience in domestic and international logistics, trade, and transportation security.

Cyber Security and Supply Chain Management: Risks, Challenges, and Solutions Steven Carnovale, Sengun Yeniyurt

Cyber Security and Supply Chain Management: Risks, Challenges, and Solutions

Steven Carnovale, Sengun Yeniyurt

2021

How firms can manage cyber risk in procurement, manufacturing, and logistics. Supply chain is often the core area of cyber vulnerability and first line of defense. Essential for understanding third-party risk in maritime operations.

Frameworks & Risk Management

5 books

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

Cynthia Brumfield

2021

Fundamentals of cybersecurity risk planning using NIST Framework. Covers user and network infrastructure planning, plus detection tools and techniques. Perfect for maritime organizations implementing risk-based cybersecurity per IMO guidelines.

ISO 27001 Controls: A Guide to Implementing and Auditing IT Governance Publishing

ISO 27001 Controls: A Guide to Implementing and Auditing

IT Governance Publishing

2022

Implementing and auditing 93 controls to reduce information security risks. ISO 27001 is increasingly referenced in maritime cybersecurity requirements, including IACS E26/E27. Essential for compliance officers.

NIS2 Compliance Made Simple ISBN Services Books

NIS2 Compliance Made Simple

ISBN Services Books

2025

Practical breakdown of the NIS2 Directive for CISOs and compliance officers. Covers scope determination, security measures requirements, incident reporting timelines (24h/72h), and personal liability for management.

Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware Josephine Wolff

Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware

Josephine Wolff

2022

Rigorous analysis of how cyber insurance has evolved — from early policies through NotPetya 'act of war' exclusion controversies to current coverage debates. Indispensable for ransom payment and insurance notification decisions.

How to Measure Anything in Cybersecurity Risk Douglas W. Hubbard, Richard Seiersen

How to Measure Anything in Cybersecurity Risk

Douglas W. Hubbard, Richard Seiersen

2016

Rigorous application of decision analysis to cybersecurity risk quantification. Challenges qualitative risk matrices and replaces them with calibrated probability estimates and Monte Carlo methods.

Satellite & Navigation Security

3 books

Satellite Network Threats: Hacking & Security Analysis Various

Satellite Network Threats: Hacking & Security Analysis

Various

2016

200 references covering satellite communications architecture, operation, vulnerabilities, and attacks. Satellite networks are strategic assets and critical infrastructure. Essential for understanding VSAT security on vessels.

Satellite Hacking: Cybersecurity Threats in Space IoT Systems Zephyrion Stravos

Satellite Hacking: Cybersecurity Threats in Space IoT Systems

Zephyrion Stravos

2025

Covers intercepting satellite signals with SDRs, hijacking ground stations, GNSS spoofing, jamming attacks, and reverse-engineering satellite firmware. Real-world GPS spoofing incidents. Essential for understanding threats to vessel navigation and communication systems.

The Dark Art and Science of GPS Spoofing: Satellite Wars, Hijacked Signals, and The Invisible Threat TBC

The Dark Art and Science of GPS Spoofing: Satellite Wars, Hijacked Signals, and The Invisible Threat

TBC

2025

A dedicated treatment of GPS spoofing covering technical mechanisms, geopolitical motivations behind state-sponsored spoofing campaigns, and documented case studies including the Black Sea incidents.

Incident Response & Threat Hunting

8 books

Digital Forensics and Incident Response (3rd Edition)

Digital Forensics and Incident Response (3rd Edition)

Gerard Johansen

2022

Cutting-edge digital forensic activities and incident response with focus on ransomware attacks. Covers incident response frameworks and how to proactively use forensic skills in threat hunting. Essential for maritime incident responders.

Practical Threat Intelligence and Data-Driven Threat Hunting (2nd Edition) Valentina Costa-Gazcón

Practical Threat Intelligence and Data-Driven Threat Hunting (2nd Edition)

Valentina Costa-Gazcón

2024

Roadmap to becoming a proficient threat hunter using MITRE ATT&CK Framework and open source tools. Learn to set up environment to centralize data, master data collection and analysis. Applicable to maritime SOC operations.

Ransomware and Cyber Extortion: Response and Prevention Sherri Davidoff, Matt Durrin, Karen Sprenger

Ransomware and Cyber Extortion: Response and Prevention

Sherri Davidoff, Matt Durrin, Karen Sprenger

2022

The go-to practitioner reference on ransomware. Covers the full lifecycle: initial access vectors, dwell time, data exfiltration before encryption, ransom negotiation, payment mechanics, recovery, and post-incident hardening. One of the few books to treat negotiation as a technical discipline with its own methodology.

The Ransomware Book: Understand. Prevent. Recover. (2nd Ed.) Allan Liska

The Ransomware Book: Understand. Prevent. Recover. (2nd Ed.)

Allan Liska

2023

Notable for its explicit chapter dedicated to tabletop exercises. Takes a real-world operational approach: ransomware actor economics, affiliate models, negotiation case studies, and recovery playbooks drawn from hundreds of actual incidents.

Ransomware Protection Playbook Roger A. Grimes

Ransomware Protection Playbook

Roger A. Grimes

2021

An actionable blueprint for detection, containment, and recovery. The playbook format makes it directly usable during and after incidents — sections can be printed and distributed as checklists. Useful for organizations building their first ransomware response procedure.

Incident Response Techniques for Ransomware Attacks Oleg Skulkin

Incident Response Techniques for Ransomware Attacks

Oleg Skulkin

2022

A forensics-focused guide that dissects the full kill chain — initial compromise, lateral movement, data staging, deployment — and explains how forensic investigators reconstruct timelines after the fact.

Intelligence-Driven Incident Response: Outwitting the Adversary Scott J. Roberts, Rebekah Brown

Intelligence-Driven Incident Response: Outwitting the Adversary

Scott J. Roberts, Rebekah Brown

2017

A methodological framework for integrating threat intelligence into incident response operations. Draws on the Diamond Model and F3EAD cycle to show how IR teams can pivot from reactive firefighting to adversary-led hunting.

Blue Team Handbook: Incident Response Edition (2nd Ed.) Don Murdoch

Blue Team Handbook: Incident Response Edition (2nd Ed.)

Don Murdoch

2018

A dense, practical quick-reference guide for incident responders — covering triage, evidence collection, network forensics, log analysis, malware identification, and communication protocols. Known as the 'Blue Team Bible'.

Cybersecurity Leadership & Crisis Management

2 books

CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers Todd Fitzgerald

CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

Todd Fitzgerald

2019

Comprehensive leadership reference drawing on insights from 75+ CISO practitioners. Covers building security programs, managing boards, handling incidents, navigating regulatory requirements, and leading during crises.

The CISO Mentor: Pragmatic Advice for Emerging Risk Management Leaders Sonja Hammond, Ian Schneller, Chuck McGann et al.

The CISO Mentor: Pragmatic Advice for Emerging Risk Management Leaders

Sonja Hammond, Ian Schneller, Chuck McGann et al.

2021

Practical, direct advice for security leaders navigating the political and organizational realities of the CISO role. Focused on conversations, decisions, and trade-offs that define security leadership under pressure.

Tabletop Exercises & Wargaming

1 book

Cybersecurity Tabletop Exercises: From Planning to Execution Robert Lelewski, John Hollenberger

Cybersecurity Tabletop Exercises: From Planning to Execution

Robert Lelewski, John Hollenberger

2024

The definitive practitioner guide to running cybersecurity tabletop exercises. Covers objective setting, scenario design, participant selection, facilitation techniques, inject management, and post-exercise reporting. Praised by IBM X-Force, Secureworks, FortiGuard.

Cyber Attack Case Studies

8 books

The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds

The Art of Attack: Attacker Mindset for Security Professionals

Maxie Reynolds

2021

Teaches security professionals to think like attackers — covering social engineering, physical penetration, and the psychology of manipulation. Directly applicable to insider threat scenarios.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Andy Greenberg

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

Andy Greenberg

2019

The essential maritime cybersecurity case study — includes the most detailed published reconstruction of Maersk's catastrophic NotPetya infection: $300M in losses, 45,000 PCs wiped, 4,000 servers destroyed. Winner of the Cornelius Ryan Award.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Kim Zetter

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Kim Zetter

2014

Definitive account of Stuxnet — the first publicly acknowledged state-developed cyberweapon designed to cause physical destruction. The ICS attack methodology directly informs OT threat scenarios.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Nicole Perlroth

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Nicole Perlroth

2021

A New York Times journalist's decade-long investigation into the global zero-day market — governments paying millions for undisclosed vulnerabilities, a shadow economy that has made the world measurably less secure.

Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Andy Greenberg

Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

Andy Greenberg

2022

Focuses on blockchain forensics — how investigators trace cryptocurrency transactions that ransomware gangs assumed were untraceable. Directly relevant to ransom payment decision points.

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime Jon DiMaggio

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime

Jon DiMaggio

2022

Structured analytical methodology for understanding adversary operations. Includes detailed analysis of the Colonial Pipeline attack: how DarkSide operated, detection opportunities missed, and how the response unfolded.

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Renee Dudley, Daniel Golden

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

Renee Dudley, Daniel Golden

2022

Narrative non-fiction following volunteer researchers who reverse-engineer ransomware to create free decryptors. Provides unique insight into how ransomware works at the code level and the ecosystem of victims, responders, and criminals.

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Scott J. Shapiro

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

Scott J. Shapiro

2023

A Yale law professor reconstructs five landmark hacks — from the Morris Worm to Fancy Bear's DNC intrusion — combining legal analysis, technical accuracy, and philosophical depth.

Security Awareness & Culture

1 book

Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change

Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change

Jessica Barker, Adrian Davis, Bruce Hallas, Ciarán Mc Mahon

2021

Guide to creating enhanced security culture through improved understanding and practice at individual level. Key awareness, behaviour and culture concepts from the ground up. Essential for maritime organizations addressing the human factor in cybersecurity.