← All Sectors
Ports
Sovereign incident response for Australian port and terminal operators — terminal-operating systems, cargo, and OT.
The threat picture
A port that stops moving cargo is national news inside hours. Terminal-operating systems, cargo-management platforms, and the OT controlling cranes and field assets are all part of a converged stack that adversaries — ransomware operators in particular — have repeatedly proven willing to target.
The supply-chain reality means port operators also carry a wider blast radius than most operators: downstream logistics, retailers, and manufacturing depend on them.
What xCIRT covers
- Terminal-operating systems — The IT/OT-adjacent platforms scheduling cargo movement.
- Cargo management and customs integration — Connected systems that often span the operator’s perimeter.
- Crane and field-asset OT — PLCs and embedded controllers on quay cranes, RTGs, straddle carriers, and reach stackers.
- Vendor and contractor access — Remote support to OT, frequently the entry path for ransomware.
Where we help
- Port-sector IR playbooks including terminal-operating-system compromise, OT exposure via remote vendor access, and ransomware crossing IT/OT.
- SOCI / CIRMP readiness sized for port operators.
- Vendor-access risk assessment and containment planning.
- 24/7 retainer engagements with sector-aware responders.
The questions we usually start with
- If your terminal-operating system was encrypted tonight, how long until cargo stopped moving — and what’s the manual fallback?
- Who can reach OT on your cranes today — direct, via jump host, or via remote vendor access?
- Is your IR plan written with the supply-chain blast radius in mind?
Need an Australian responder, now?
Retainer engagements, scoped pilots, and SOCI-readiness packages. Talk to us about what your critical-infrastructure estate needs.