Training, Updated Procedures Essential to Cybersecurity Efforts
More than 45% of energy companies fell victim to at least one cyberattack in 2014, a higher percentage than in any other corporate sector. With the industry facing constant hacking threats, companies must place a greater emphasis on developing strong cybersecurity strategies, an expert said.
In a presentation, “The Rising Threat—Guarding Against the New Generation of Cyberattacks,” hosted by the SPE Gulf Coast Section, Mario Chiock discussed the key elements of cybersecurity and outlined steps companies can take to reduce potential exposure to cyberattacks. Chiock is a security and technology executive adviser at Schlumberger.
Chiock said a major problem energy companies face is a lack of fragmentation in their enterprise resource planning (ERP) systems. Most ERP systems are connected either to a cloud computing network or mobile devices, leaving significant holes in their firewalls.
With no fragmentation, hackers can access an entire network through one outlet, and oftentimes that outlet is a phishing email. Most major cyberattacks begin with a hacker phishing employees for information such as logins and passwords. Chiock said Schlumberger regularly sends phishing emails to its employees to help raise awareness of the issue. However, even the most diligent companies can have their networks compromised by a single successful phishing attempt.
“All it really takes is one person clicking on something to start an attack,” Chiock said. “[At Schlumberger], we phish our employees once per quarter, and sometimes we think we’re going in the right direction. But all we have to do is change the phishing email and then [the number of breaches] go up again.”
Cloud infrastructures offer benefits and disadvantages. Chiock said storing data in the cloud is safer for companies than storing data on their own servers, but the risk for a security breach is higher because the servers are hosted on the Internet. An additional concern with companies looking to migrate to a cloud infrastructure is that they will likely assume that the cloud provider will bear the financial responsibility for any data lost on its servers in a breach. Most cloud providers, he said, are only responsible for protecting their own servers and not that of their clients.
“When you do things in the cloud, the people who sell you cloud services will promise you everything. They’ll tell you that they’re going to be responsible for handling security. In reality, they’re responsible for the security of their infrastructure and their data, not for the infrastructure of your application,” Chiock said.
Combating cyberthreats is not just a matter of finding a technological solution. Chiock said it is important to promote a culture of responsibility and accountability. Employee training is one step in promoting such a culture, as is the development of policies and standards that can be audited, enforced, and measured. Additionally, companies must constantly update their cybersecurity policies to account for new threats.
“We cannot just have policies and standards that are 10 years old and expect them to protect us today. There is a lot of new technology that opens up holes into our networks, and we need to make sure our policies get updated to protect us,” Chiock said.
While the establishment of proper policies and procedures is important, technology should still play a significant role in cybersecurity. Chiock suggested that companies acquire next-generation security software and automate its protocol in handling cyberattacks. He said hackers will often target companies in the after-hours, and a quick response is critical.
“When you start getting information intel, if it needs to go to a human and that human needs to make a decision, by that point it’s too late. We cannot do that anymore. If there is [intelligence] in the middle of the night, I want it fixed by the time I wake up. All it takes is a little window of opportunity for the bad guys to get in,” Chiock said.
Machine learning, or the development of computer programs that can teach themselves to adapt to new data, is a strategy that has already taken hold in the technology industry. Chiock said Schlumberger develops such programs to help detect false positives in its security systems. But, he said, the technology is still not mature enough to use as the basis of a security strategy.
“I think [machine learning] is the future, but I’m also a big believer that there is no silver bullet that fixes everything. You have to create a strategy, and based on your strategy and your needs you have to use multiple tools and technologies to resolve specific issues,” Chiock said.
Newly Formed JV To Provide Data-Driven Drilling Riser Maintenance Program
The data-driven maintenance program incorporates riser condition, usage, and fatigue analysis with a risk-based inspection process.
Energy Companies Well Suited To Adapt to Industry 4.0
Industry 4.0, the latest industrial revolution, has hit the manufacturing sector, building upon the adoption of computers and automation into industrial processes. How well suited is the oil and gas industry to leverage the new autonomous systems that could emerge from this transformation?
New Innovations Enable Autonomous Pipeline Inspections
As companies look to reduce the time it takes to inspect a subsea pipeline, as well as the costs involved in the operation, autonomous systems have become a more desirable option. How close are they to becoming the norm?
Don't miss out on the latest technology delivered to your email every two weeks. Sign up for the OGF newsletter. If you are not logged in, you will receive a confirmation email that you will need to click on to confirm you want to receive the newsletter.
05 February 2020
12 February 2020
07 February 2020
12 February 2020