Skip to content

Webinar: Defend the Digital Dock
Stop Wireless Threats Before They Sink You

GPS spoofing and RF-based cyberattacks represent some of the most insidious threats to seaport operations today. As wireless devices quietly proliferate across port environments, they’ve become the invisible backdoor into mission-critical systems—undetected by traditional IT security tools. With the U.S. Coast Guard’s 2025 cybersecurity compliance deadline fast approaching, maritime operators must urgently secure their wireless airspace and eliminate blind spots before these unseen vulnerabilities escalate into operational or regulatory crises.
Register now to join LOCH Technologies and industry experts for a tactical discussion on how to expose hidden threats, enforce Zero Trust wireless policies, and defend your maritime operations against the next wave of RF-driven cyber risks.

Bonus: All registrants will receive our exclusive, “Defend the Dock” datasheet—a practical companion to help you assess vulnerabilities and take immediate action.
Left Align - Full Lockup - White on Black-1
innocucous_loge_white_on_black_Screenshot_2025-05-06_115719-removebg-preview

Navigating the USCG's 2025 Cyber Requirements

 

On July 16, 2025, the U.S. Coast Guard's new Final Rule comes into effect, mandating baseline cybersecurity practices for all Marine Transportation System (MTS) operators. Are you prepared to meet these requirements and protect your operations from evolving wireless threats?

Join us for a critical webinar designed to help Marine Transportation System (MTS) operators understand and act on the 2025 requirements. Whether you're overseeing IT, OT, or port operations, this session will equip you with the insights needed to protect your operations and stay compliant.

 

What You'll Learn
Who Should Attend?
  • A breakdown of the USCG’s Final Rule and its implications for MTS operators
  • Why wireless threats—from rogue IoT to GPS spoofing—pose a hidden risk
  • How to assess your readiness across risk, controls, and incident response
  • Actionable steps for compliance by the July 16, 2025 deadline
  • Strategic guidance on integrating AI, 5G, and private LTE without compromising security
  • Port & Terminal Operators
  • Maritime CISOs & IT Leaders
  • Critical Infrastructure Security Teams
  • Compliance & Regulatory Officers
  • Anyone impacted by MTSA and USCG cybersecurity mandates

Screenshot 2025-05-06 at 11.26.16 AM
Get our Exclusive Datasheet with your Webinar Registration

This essential resource dives deeper into the core threats and compliance requirements maritime organizations face, complementing the live discussion with tactical, take-home insights.

What you’ll learn from the datasheet:
  • The hidden risks of wireless blind spots in port cybersecurity

  • A breakdown of the U.S. Coast Guard’s 33 CFR 106 rule and what’s at stake

  • A side-by-side comparison of traditional IT tools vs. LOCH’s RF threat detection

  • How to achieve full-spectrum cyber visibility across maritime infrastructure

  • Practical steps to prepare for 2025 compliance deadlines

Register now to secure your spot for the live webinar and unlock this powerful companion guide.

Meet the Experts Leading the Discussion
garry_drumb

Garry Drummond

CEO of LOCH Technologies

Garry Drummond is a seasoned technology executive and author, known for pioneering digital innovation across multiple industries. With a career spanning over two decades, Garry has led transformative initiatives in maritime logistics, cybersecurity, and AI-driven infrastructure. He brings a strategic vision rooted in operational excellence and a passion for leveraging technology to solve complex global challenges. Garry’s insights continue to shape the future of maritime tech through both executive leadership and thought-provoking publications.

Davin Garcia headshot

Davin Garcia

IT Security, Port of Stockton

Davin Garcia is an IT professional focused on solving complex business challenges through comprehensive technology solutions. With a hands-on, learning-driven approach, Davin continuously evolves his expertise to bridge the gap between business needs and effective technical implementations. His work reflects a deep commitment to improving systems, streamlining processes, and driving impact through thoughtful, scalable innovation.

Benjamin Huey headshot

Benjamin Huey

CTO Innocuous

Benjamin Huey is a seasoned cybersecurity expert with over 30 years of experience in information security and ethical hacking. He has served federal agencies, the U.S. military, the Department of Defense, and numerous Fortune 100 companies. Benjamin brings deep technical expertise across secure infrastructure, cyber warfare simulation, and wireless RF technologies. As a “white hat” hacker, he has led hundreds of offensive security campaigns to help organizations identify vulnerabilities and fortify their defenses against world-class threats.

Reserve Your Spot Now