Page 7 - NorthAmOil Week 19 2021
P. 7

NorthAmOil                              GUEST COMMENTARY                                         NorthAmOil






















                         updated. (Again, for an oil and gas company,  of Colonial Pipeline. (Similar companies’ pipe-
                         this would involve an explanation of what role  line systems can be extensive and sprawling,
                         every asset plays, both individually and within  with some facilities in remote rural locations and
                         the system as a whole.)              many others distant from headquarters.)

                         Vulnerability assessments: An inventory is  Preparation, practice and prevention: Oil
                         not enough either. Oil and gas companies also  and gas companies should also take a proactive
                         need to know which parts of their systems are  approach to cybersecurity, not just by reacting
                         especially at risk. They also need to know why  to attacks and anomalies, but also preparing for
                         those components are vulnerable – for example,  them, practising for them and looking for ways
                         whether it is because they are legacy technologies  to prevent them. In concrete terms, this means
                         that are not compatible with newer equipment  instituting a regular programme of maintenance
                         used elsewhere or whether it is because they  for security systems, developing a strategy for
                         rely on a specific type of software that cannot be  responding to threats and conducting drills and
                         updated without voiding the terms of service.  simulations through penetration testing and/or
                         Pinpointing these vulnerabilities makes it easier  red-teaming. (Oil and gas companies will benefit
                         to decide where safeguards such as firewalls and  from stepping up such practices, given that the
                         sandboxes are needed most. (In similar cases, we  oil and gas sector is known to be at risk.)
                         have seen that vulnerability assessments have
                         informed decisions to close down pipelines in  Industry-specific expertise: Oil and gas com-
                         order to prevent malware that had infected IT  panies would also do well to seek cybersecurity
                         systems from spreading into the OT realm.)  solutions from providers that understand their
                                                              challenges. These include but are not limited to
                         Visibility: Identifying weaknesses within the  wide geographic dispersion of assets, depend-
                         system is not enough either. Companies should  ence on legacy systems that are ageing but relia-
                         also look for cybersecurity solutions that help  ble, monitors and sensors that generate so much
                         them make sense of the information they have  data that they may make cyberattacks hard to
                         through visibility. That is, since they cannot  spot and the need to avoid shutdowns that can
                         secure what they cannot see, it is imperative  damage equipment or cut off supplies of vital
                         these security solutions have complete packet  commodities. Security providers that are not
                         data to provide a clear representation of the sys-  accustomed to accommodating such conditions   The number of
                         tems being inspected. We are seeing more and  are likely to have a hard time setting up an effec-
                         more companies turning to Data Diode TAPs  tive solution for oil and gas companies.  cyberattacks
                         (test access points) to ensure that monitoring   We know we have given you a long list of   targeting the oil
                         traffic is unidirectional so OT environments  things to think about. But you do not have to
                         are not hackable. Solutions of this type help put  solve the problem by yourself. Garland Technol-  and gas industry
                         everything together by allowing users to see  ogy is happy to discuss network TAP visibility
                         what is in their networks, what is connected to  and other solutions that oil and gas companies   is on the rise,
                         their networks and who is active on their net-  can implement to keep their critical infrastruc-
                         works on the packet level. (This is very important  ture systems working.  not just in terms
                         information for companies whose petroleum                                   of absolute
                         product pipeline networks are considered crit-  Chris Bihary, CEO and Co-Founder of Garland
                         ical infrastructure.)                Technology (http://www.garlandtechnology.  numbers.
                                                              com), has been in the network performance
                         Continuous, real-time monitoring: Visibility  industry for over 20 years. Bihary has established
                         is even more useful when paired with monitor-  collaborative partnerships with technology com-
                         ing solutions that allow users to detect threats  panies to complement product performance and
                         and anomalies as they happen and respond to  security through the integration of network TAP
                         them as rapidly as possible. With continuous,  visibility. Chris started his career owning an IT
                         real-time monitoring, it is easier to act quickly  reseller who built out 9-1-1 call centre network
                         to contain security breaches – even in situations  infrastructure, which shaped his core belief to
                         where fast action may be difficult, as in the case  always ensure uptime for critical networks.™



       Week 19   13•May•2021                    www. NEWSBASE .com                                              P7
   2   3   4   5   6   7   8   9   10   11   12