On January 20, 2026, maritime technology company GTMaritime launched GT Identify, a new cybersecurity solution aimed at helping ship operators manage cyber risk and meet regulatory requirements. The system, built on the company's GT Hub platform, provides a centralized inventory of all onboard IT and Operational Technology (OT) assets across a fleet. By providing visibility and vulnerability reporting, GT Identify is designed to help organizations comply with the International Maritime Organization's (IMO) cyber risk management rules and the International Association of Classification Societies' (IACS) Unified Requirements E26 and E27.
The launch of GT Identify is a direct response to increasing regulatory pressure on the maritime industry. Key regulations addressed include:
The GT Identify solution aligns its capabilities with the "Identify" function of the NIST Cybersecurity Framework, which is the foundational first step in managing cybersecurity risk. This involves understanding the business context, the resources that support critical functions, and the related cybersecurity risks.
The primary audience for this solution is ship owners, ship managers, and operators of maritime fleets worldwide. It is relevant to any organization in the shipping industry that needs to comply with IMO and IACS cybersecurity mandates.
GT Identify helps organizations meet several specific compliance obligations:
The IACS UR E26 and E27 requirements are being phased in, typically applying to vessels contracted for construction on or after a specified date. Ship operators need to implement solutions like GT Identify to ensure their new vessels are compliant from day one and to retrofit or update procedures for their existing fleet to meet IMO guidelines.
For the maritime industry, the failure to comply with these regulations can have significant consequences, including vessels being detained by port state control, loss of insurance coverage, or inability to secure contracts. A lack of visibility into onboard assets, which GT Identify aims to solve, is a major security gap. It prevents effective vulnerability management and leaves vessels exposed to cyberattacks that could disrupt navigation, propulsion, or cargo management systems, with potentially catastrophic safety and environmental consequences.
Maritime organizations should take the following steps:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats