CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR Apr 01, 2026

Expert offers tips for cyber-related incident response - Commercial Carrier Journal

Commercial Carrier Journal Archived Apr 01, 2026 ✓ Full text saved

Expert offers tips for cyber-related incident response Commercial Carrier Journal

Full text archived locally
✦ AI Summary · Claude Sonnet


    'Don't trust, always verify' is the expert advice when carriers onboard new products Angel Coker Jones Nov 25, 2025 Updated Nov 28, 2025 Trucking companies are on the receiving end of products like ELDs, telematics, dash cameras, and more. These product vendors come with their own hardware and software, widening the attack surface for the trucking companies that use them. In the event of a cyberattack, these products could be a hacker’s entry point into a trucking company’s systems. Many fleets are targets because trucking is critical to the economy. That’s why Amadou Kane, senior solution architect/engineer of automotive cybersecurity at VicOne, said he doesn’t abide by the old adage “trust but verify.” He said trucking companies should "never trust and always verify" when it comes to security. Trucking companies typically have IT teams managing enterprise security for systems like transportation management software. However, even when they are not the maker of a product they bring into their environment, they still have a responsibility to ensure the security of those third-party solutions. Managing third-party product security Kane told the audience during a recent session at the National Motor Freight Traffic Association Cybersecurity Conference that the first step to managing the security of third-party products within a trucking company’s environment is requesting the SBOM (software bill of materials) from suppliers. “If you can have access to the binaries of those firmware and do the scans yourself, that is the most ideal situation,” he said. Kane noted that other elements to request include vulnerability reports, the Crypto BOM report (Cryptographic Bill of Materials, which is an inventory of all cryptographic elements in a software application, system, or product), and the HBOM (Hardware Bill of materials). “The focus tends to be on products, usually just on software vulnerabilities, and we tend to brush off the hardware portion, but that also needs to be part of the equation,” he said. Art Ocain, Airiam vice president of cybersecurity and incident response, asked Kane what carriers on the receiving end of these products can do when they don’t have access to the product code. PARTNER INSIGHTS Information to advance your business from industry suppliers VIEW MORE » Kane said there should be a team responsible for monitoring data coming in from CAN bus traffic, telematics traffic, server logs, API logs, and any other connected applications. He said teams need to monitor the vehicle communication system and the communication between the vehicle and the cloud. “Then you need to have some detection rules,” he added. “Certain organizations have certain use cases that are very specific to them, so you need capabilities within your SOC (security operations center) to create these detection rules that allow you to monitor these use cases that are relevant to you.” Most importantly, he said, carriers need a SOC that can act as an XDR (extended detection and response) to perform cross-data correlation. Because data streams come from different sources, an XDR unifies data from multiple security layers. “If you cannot cross-correlate them, then it's almost useless. You're missing out on a lot,” Kane said. “You need that context, and that context comes from the first data correlation.” Training an incident response team Kane said there are differences between enterprise incident response and product incident response. They are similar in that you want to minimize impact, ensure continuity, and improve cyber resilience, but the implementation is different. “When we look at enterprise, if there is an incident, you can usually just isolate a system or rebuild your system,” Kane said. “When it comes to vehicles or products, you cannot just simply do that. If there is a large-scale instance, you cannot rebuild all vehicles on the road; you cannot just shut down all the vehicles. “There is a safety-critical element that is tied to product incident response,” he added. “On the enterprise side, delays are acceptable, but on the product side, people’s lives are at risk, so it’s more time-sensitive.” It requires a more holistic approach. That means the incident response team has to work with the product security operations team, and there are huge gaps between the two that result in inefficiencies in terms of how they respond to incidents, Kane said. He said IT, operational technology, and product teams need to converge because attackers will find and exploit the gaps between them. “That's a disservice from a security perspective to treat them as separate entities because they're tied together in so many different ways,” said Ben Wilkens, cybersecurity principal engineer at NMFTA. Kane said it’s all connected, from the manufacturing of the products to the customers implementing them, so it’s important to have a more comprehensive incident response plan to cover all areas. “Additionally, it's important to know that maybe on the enterprise side, it will be more acceptable when you have a static incident response plan,” he said. “In products, you really need a more living incident response plan, meaning it has to adapt; it needs to change. The threat actors change, the attack surfaces change constantly, and it needs to change with it.” Secure by design is number one, Kane said. A critical element is the integration of threat intel within the deployment lifecycle so developers can make changes as needed, Kane said. He noted that integrated vulnerability management within the CI/CD process (continuous integration and continuous delivery, a set of automated practices for software development that speeds up and makes code releases more reliable) to allow for vulnerability scans is also important. “Usually what we see is people just focus on source code scanning … they think source code scanning is important, but source code scanning is very quote-unquote ‘static’ in a way,” Kane said. “New vulnerabilities will come long after you develop and sell the product. Therefore, binary scan is important, because once you deploy those products, you can continue to monitor them for vulnerabilities. With a source code scan, you cannot do that.” Kane said sometimes developers leave backdoors open when software is deployed for debugging purposes, and that becomes a problem. So it’s also crucial, he said, to add backdoor scanning capabilities within vulnerability management platforms. Lastly, there is workbook automation. Kane said there is a process that should be followed when there is an incident, whether it's during the development phase, coming from threat intel, or coming from a vulnerability scan. Teams must examine and analyze the threat or incident to determine if it’s relevant and if a fix is needed. Then, they must determine who owns the issue, which could be a supplier or an OEM. Understanding that process and updating the workbook for that process is often overlooked in incident response training, he said. Changes in attacker mindsets On the product side, Kane said he has heard more talk from criminals on the dark web about fleet-scale attacks. As more Class 8 electric and autonomous vehicles come into the market, those attacks will expand. Angel Coker Jones is a senior editor of Commercial Carrier Journal, covering the technology, safety and business segments. In her free time, she enjoys hiking and kayaking, horseback riding, foraging for medicinal plants and napping. She also enjoys traveling to new places to try local food, beer and wine. Reach her at AngelCoker@fusable.com. Add us as a preferred source on Google RELATED STORIES CYBERSECURITY Carrier, broker ID verification is essential to protect freight and trust CYBERSECURITY Incident response starts with preparing for an attack CYBERSECURITY How to keep your business running when a cyberattack occurs CYBERSECURITY Think like a hacker: Defending your fleet from cyber threats Comments Post a Comment You must be signed in to leave a comment. To sign in or create an account, enter your email address and we'll send you a one-click sign-in link. Email Address * Continue This article hasn’t received any comments yet. Want to start the conversation? TOP STORIES INSURANCE Chameleon carriers create demand for risk detection Chameleon carriers evade safety regulations by creating new identities, introducing "recycled risk" to the trucking industry. EMISSIONS Bill seeks to strip EPA of power to regulate diesel emissions BUSINESS Current run on diesel prices affects fleets differently than 2022 spike TECHNICIAN TRAINING Vehicle maintenance certification improves repair rates, cuts expense SAFETY & COMPLIANCE Committee advances Dalilah's Law: 'no English, no license' Get all the info on the top 250 trucking companies in America View, sort and download the trucking industry’s most comprehensive ranking of for-hire carriers in North America, based on a blend of metrics including fleet size, annual revenue and number of drivers. Get the free report WHITE PAPERS The Complete Tire Lifecycle How fleets maximize value from cradle to casing View All
    💬 Team Notes
    Article Info
    Source
    Commercial Carrier Journal
    Category
    ◍ Incident Response & DFIR
    Published
    Apr 01, 2026
    Archived
    Apr 01, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗