The increasing attacks and vulnerabilities in the world’s critical infrastructure call for action now, or the disaster of disruption of the energy supply is inevitable. For the oil and gas and utility industries, this is a critical issue that needs more attention, investments and new holistic security services, presenting tremendous opportunities for service providers and the wider security ecosystem to come together with the industries and build comprehensive capabilities using leading-edge innovations to withstand the attacks on our critical infrastructure.
The recent devastating hurricanes – Harvey, Irma, and Maria – that hit the Caribbean and United States have once again proven the critical importance of our energy supply infrastructure. Since natural disasters such as hurricanes are an imminent threat to the stability of the grid, generation infrastructure, and critical fuel pipelines, the safety and security of our larger energy ecosystem faces another threat – cyberattacks aimed at critical infrastructure. Consider the following examples:
The costs of disruptions due to cyberattacks are rising as are the costs of repairing the disruption and implementing additional measures to shore up cybersecurity. Disruptions also lead to loss of turnover, failure of systems, loss of data, corruption of data, or data theft.
Despite the high level of threats, security remains an underinvested area
There are tremendous vulnerabilities in our energy systems. Behavioral models, advanced analytics, automated responses, and machine learning are key components of modern security measures designed to operate in a heightened threat environment. Security is recognized as a priority across the industry, but remains an area of concern and needs continued investment from oil and gas companies, utilities and energy, and utility operations service providers.
Two findings from a 2016 HfS study of cybersecurity underscore this point. Exhibit 1 shows that in the resources industries, including oil and gas and utilities, the biggest inhibitors to security provisions are limited support from the corporate/executive level and a lack of security budget.
Exhibit 1: Biggest inhibitors to security provisions in energy and utilities
Source: “State of Cyber Security 2016”, HfS Research n=30 Enterprise Security Office
When we drilled down further, only 30% of resources enterprises seem to have enough budget for security technology and talent (See Exhibit 2).
Exhibit 2: Cybersecurity funding – Resources industries report inadequate security funding, talent, and training
Source: “State of Cybersecurity 2016”, HfS Research n=30 Enterprise Security Office
The path forward to try to avoid disaster from happening in the energy industry
We have identified a five-pronged approach that energy and utilities need to safeguard their infrastructure from security breaches:
Exhibit 3: Resources industries are less capable to detect cybersecurity incidents in real time or predictive than other industries
Source: “State of Cyber Security 2016”, HfS Research n=208 Enterprise Security Office
4. Move to the cloud. Notwithstanding regulatory requirements and hurdles (which regulators should look at and modernize their policies as soon as possible), move to the cloud as quickly as possible. The cloud is more secure than on-premises applications. The myth of owning infrastructure because it is more secure has been debunked and cloud providers are superiorly equipped to deal with cyberthreats. Leverage a partner ecosystem.
5. Leverage emerging technologies. Industry actors should set up Centers of Excellence and critical infrastructure security centers in which they leverage all the new technologies that are out there in a holistic security strategy. For instance:
– Behavioral tracking/pattern recognition. At a critical site, cameras track field workers’ movements, looking for anomalies in behavior. This is an example of using digital technologies, artificial intelligence (AI), and analytics to improve physical security.
– Drones are used to inspect remote locations, pipelines, and transmission and distribution lines, often situated in remote and harsh environments. The drones record and analyze the situation on the fly, using advanced analytics, machine learning based pattern recognition software, augmented reality, and mixed reality.
– Augmented and/or Mixed Reality is also used effectively to provide security for people on the ground to detect threats in the physical environment.
Bottom-line: A concerted effort is needed to resist the monster in the dark
The increasing attacks and vulnerabilities in the world’s critical infrastructure call for action now, or the disaster of energy supply disruption is inevitable. For the oil and gas and utility industries, this is a critical issue that needs more attention, investments, and new holistic security services. It presents tremendous opportunities for service providers and the wider security ecosystem to collaborate with the industries and build comprehensive capabilities using leading-edge innovations to withstand attacks on critical infrastructure.
Register now for immediate access of HFS' research, data and forward looking trends.
Get StartedIf you don't have an account, Register here |
Register now for immediate access of HFS' research, data and forward looking trends.
Get Started