top of page

How can Oil and Gas Companies Protect Themselves from Cyber-Attacks? 

Across industries, companies have been intensifying their focus on cybersecurity. This is a direct consequence of the expanding role that digitization is playing in their business and operating models and the demonstrated potential for significant damage resulting from a successful cyberattack. Indeed, CIO magazine’s “2015 State of the CIO” survey" revealed that chief information officers now spend roughly a third of their time on cybersecurity-related issues and consider cybersecurity one of their top-four priorities. 


Concern about cybersecurity is particularly high at oil and gas companies, which face a far wider spectrum of threats—threats that are potentially more severe—than do companies in most other industries. Transactions in the oil and gas arena are broad in scope—the life cycle of a transaction can include sensitive information on such diverse topics as possible well sites and end-user consumption—so the companies are vulnerable at many different points. These companies are also subject to relatively large-scale threats, given the global nature of oil and gas production and distribution.


Furthermore, the industry faces threats that are activist (including attacks carried out by environmental groups), rather than purely commercial, in nature. These include threats that, if successful, could have severe effects not just on the industry but also on the environment, public health and safety, and even national security.  


Recognizing the severity of the situation, many oil and gas companies have taken significant measures to address their vulnerability. Have they done enough?

Key Takeaways

  • How cyber threats impact the oil and gas value chain, spanning corporate, upstream, midstream, and downstream operations

  • Understanding cyber-security risks

  • Conducting a maturity assessment

  • Building a unified program to address cyber security systematically across the business and operations with the same objective in mind: moving up the maturity scale to create an ICS environment that is secure, vigilant, and resilient.

  • Implementing key controls: awareness training, access control, network security, portable media and incident response

  • Embracing good governance

Who should attend?

  • Senior Management

  • Mid Management

  • HR Personnel

  • IT Directors

  • Security Directors/Managers

  • Operations Directors/Managers

  • Business Development Managers

  • Marketing Managers

  • Engineering and Technical Staff

Early Fee: USD 995

Standard Fee: USD 1395

bottom of page