Reporting Workflow
Step-by-Step Guide
Complete walkthrough of the maritime cybersecurity incident reporting process from detection to compliance documentation
Interactive Reporting Workflow
Click on any step to explore the detailed process, or use the demo controls above
Incident Detection
Maritime operator identifies a cybersecurity incident
Process Details:
- Automated monitoring systems detect anomalies
- Staff identifies suspicious activity
- Security alerts trigger incident response
- Initial assessment of incident scope
Key Stakeholders:
Secure Login
Access Cydome platform with enterprise authentication
Process Details:
- Multi-factor authentication required
- Role-based access control
- Encrypted connection established
- User session logged for audit trail
Key Stakeholders:
Incident Reporting
Complete comprehensive incident report using guided wizard
Process Details:
- 7-step guided reporting wizard
- Automated vessel and location detection
- Real-time compliance validation
- Evidence upload and documentation
Key Stakeholders:
Automated Processing
System processes report and generates compliance documentation
Process Details:
- Incident severity assessment
- Regulatory compliance checking
- Reference number generation
- Automated categorization and tagging
Key Stakeholders:
CISO Review
Chief Information Security Officer reviews and approves report
Process Details:
- Comprehensive incident review
- Severity and impact validation
- Additional comments and recommendations
- Approval or request for modifications
Key Stakeholders:
Authority Notification
Automatic notification to relevant authorities (USCG, NRC)
Process Details:
- Automated USCG notification
- National Response Center (NRC) alert
- 24-hour compliance timeline tracking
- Delivery confirmation and receipts
Key Stakeholders:
Documentations
Generate reports
Process Details:
- PDF report generation
- Compliance documentation
- Security metrics update
Key Stakeholders:
Built-in Compliance Features
Every step of the workflow is designed to ensure regulatory compliance and audit readiness
24-Hour Reporting
Automated timeline tracking ensures USCG compliance
Audit Trail
Complete documentation of all actions and decisions
Regulatory Mapping
Automatic mapping to MTSA Cyber Rule requirements
Multi-stakeholder
Coordinated workflow across all responsible parties