UPCOMING WEBINAR

Securing your offshore Oil and Gas Infrastructure

speaker image

Hosted by Sarah Pixley
Cybersecurity Solutions, IBM

Date: Tuesday, June 20th, 2023

Time: 2:00 PM - 3:00 PM Eastern

  • 00

    Days

  • :
  • 00

    Hours

  • :
  • 00

    Minutes

  • :
  • 00

    Seconds

Featured Speaker:

speaker image

Marisol Cruz Cain
Director, IT and Cybersecurity, GAO

speaker image

Kaelin Kuhn
Assistant Director, IT and Cybersecurity, GAO

speaker image

Nouman Abbasi
Sr. VP Cybersecurity, SPS

About Webinar

Offshore oil and gas infrastructure faces significant and increasing cybersecurity risks in the form of threat actors, vulnerabilities, and potential impacts.

Threat actors. State actors, cybercriminals, and others could potentially conduct cyberattacks against offshore oil and gas infrastructure. The federal government has identified the oil and gas sector as a target of malicious state actors.

Vulnerabilities. Modern exploration and production methods are increasingly reliant on remotely connected operational technology—often critical to safety— that is vulnerable to cyberattack. Older infrastructure is also vulnerable because its operational technology can have fewer cybersecurity protection measures.

Potential impacts. A successful cyberattack on offshore oil and gas infrastructure could cause physical, environmental, and economic harm, according federal officials. For example, officials said that the effects of a cyberattack could resemble those that occurred in the 2010 Deepwater Horizon disaster. Disruptions to oil and gas production or transmission could also affect energy supplies and markets.

Goals and Objectives

Share threats to the Oil and Gas industry based on the GAO report and strategie and ideas to mitigate them

Agenda
  • Cybersecurity Risks to offshore Oil and Gas Infrastructure
    • Threat Actors
    • Vulnerabilities
    • Potential Impacts
  • How can we help 
    • Security Management as a Service
    • Risk Assessment
    • Security Policy and Compliance Management
    • Identity and Access Management
    • Data and Privacy Management
    • Security Awareness and Training
    • Security Monitoring and Response
  • Call to Action
Who should join
  • CISOs
  • CFOs
  • CIOs
  • COOs
  • CROs