Improving Pipeline Operational Visibility Avoids Costly Downtime

Improving Pipeline Operational Visibility Avoids Costly Downtime

Operators in the midstream oil and gas industry know their main priority is to keep product flowing through the pipeline. With that focus, its hard to notice subtle changes that may cause a costly problem in the future.

Find out how one operator experienced $1.9 million in lost revenue due to unscheduled downtime – and how real-time industrial network monitoring can help.

Black Hat: Understanding TRITON, The First SIS Cyber Attack

Black Hat: Understanding TRITON, The First SIS Cyber Attack

Today at Black Hat USA I am part of a team speaking about the landmark TRITON malware attack. We are presenting new research on TRITON, releasing two tools to help defend against it and publishing a white paper summarizing our findings.

The TRITON malware attack went beyond other industrial cyber attacks by directly interacting with a Safety Instrumented System (SIS). Asset owners should act immediately to secure their SIS — and the information in our white paper will help.

SCADA Cyber Security for an Industry 4.0 Oil and Gas Application

SCADA Cyber Security for an Industry 4.0 Oil and Gas Application

If you’re boots-on-the-ground dealing with the daily oil and gas challenges of control and automation, you’ve likely heard lots about Industry 4.0, the fourth wave of industrial revolution. Given the inter-connection between more and more devices and commercially marketed systems, the cyber security challenges of this phase of automation are daunting.

To overcome these hurdles, let’s examine how an application that’s been around for a long time – hosted SCADA, can be monitored for cyber security, data integrity and reliability.

Improving ICS Cyber Security for Pipeline Systems

Improving ICS Cyber Security for Pipeline Systems

In the last decade market and cost pressures have driven significant technological advances in automation and industrial connectivity across all aspects of petroleum extraction, pipeline transport and refining. While technological advances are delivering business benefits, systems are now exposed to more cyber risks than ever before.

Yet, according to a 2017 survey by the Ponemon Institute, the deployment of cyber security measures in the oil and gas industry isn’t keeping pace with the growth of digitalization in operations.

One way to overcome the ICS cyber security gap is to utilize next generation technology that leverages machine learning and artificial intelligence (AI) to deal with system complexity and deliver immediate benefits. Let’s take a look at two examples of how a passive ICS anomaly detection and monitoring solution secures pipeline networks.

ICS Security Lags Digitization in U.S. Oil and Gas Industry

ICS Security Lags Digitization in U.S. Oil and Gas Industry

A recently released study by the Ponemon Institute finds that 61% of oil and gas operators in the U.S. indicate that their organization’s ICS protection and security is inadequate. While the implementation of digitally connected industrial components is delivering business benefits, it has significantly increased cyber risk. Yet only 41% of companies continually monitor OT infrastructure to prioritize cyber threats and attacks.