I. Bramson, ABS Group, Denver, Colorado
Oil and gas companies must focus on building robust industrial cybersecurity programs to prevent and respond to the next attack. Over the last year, a surge of unprecedented attacks has brought industrial cybersecurity to the top of the minds of global industrial organizations. This is particularly true in critical infrastructure sectors such as oil and gas.
Previously, cybercriminals concentrated on infiltrating the information technology (IT) networks that run business systems. However, they are now looking to disrupt the operational technology (OT) networks that control industrial operations. Threat actors have moved beyond stealing valuable data to gaining control over entire market ecosystems.
The Colonial Pipeline incident demonstrated how hackers can wreak havoc when organizations assume IT threats will not impact OT. This ransomware attack resulted from a password breach, which snowballed until OT operations were completely shut down. The consequence was a gasoline shortage along the U.S. East Coast, pushing gas prices to their highest level in 6 yr.
These dangerous breaches and correlated ramifications are just the beginning. In December 2021, a detrimental cyber risk was identified in a widely used software (Java Log4j). Rated a 10 out of 10 on the vulnerability scale by the Cybersecurity and Infrastructure Security Agency (CISA), this threat has been labeled as one of the worst in history, with experts stating that organizations’ IT and OT networks worldwide are at risk until further notice.
This breach and the Colonial Pipeline shutdown were a wake-up call for organizations and cybercriminals. Their impacts on the nation’s supply chain and economy have confirmed that the oil and gas industry is a vulnerable and valuable target. Organizations must act now and prioritize the implementation of an industrial cybersecurity program to protect their operations, the environment and the community.
What makes oil and gas companies vulnerable to attacks? There are several reasons oil and gas organizations are vulnerable to attacks, with the most critical being:
Components of a sound OT cyber program. Many organizations are unsure where to begin when building an OT cybersecurity program. The answer is to start at the beginning. OT environments are best protected when OT systems and networks are identified, so any update, upgrade or renovation must have cybersecurity protocols built in from day one. All is not lost for organizations that need to update security protocols within their existing facilities; they must simply do more legwork. That means hiring an experienced team specialized in OT security who can:
Make OT cybersecurity a priority. Organizations must be proactive regarding securing their OT systems and understand that it is not enough to patch the vulnerability that led to the last high-profile attack. Since attackers are highly adaptable and constantly evolving, oil and gas companies must focus on building robust industrial cybersecurity programs to prevent and respond to the next attack. It is vital to prepare for when, not if, an attack occurs.
The most successful organizations will work to develop a framework to identify potential weaknesses, protect against attacks, detect attacks when they occur, respond quickly and recover effectively. A proactive approach will make an organization resilient to future attempts and give peace of mind in a quickly changing environment. HP
LITERATURE CITED
IAN BRAMSON is the Global Head of Industrial Cybersecurity at ABS Group and a recognized leader in the emerging threat landscape of attacks on industrial operations and critical infrastructure. With more than 20 yr of experience in cybersecurity and technology, Bramson works directly with executives in the energy, industrial and maritime sectors to help minimize their cybersecurity risks.