Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Webinar recording of Kevin Rittie, Andrew Ginter, and Alan Acquatella introducing a new approach for solving the long standing challenge of safely and securely converging IT and OT networks in an Oil & Gas operation.
Waterfall team
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than just vital data, they also move malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over.
However, understanding what “more” means has been the challenge.
Cyber-Informed Engineering (CIE) is a new approach to securing IT/OT convergence – an approach and a perspective that highlights important opportunities. For example, in CIE, worst-case consequences define security requirements for industrial networks, and consequence boundaries define unique spheres of expertise and approaches, including safety engineering, process engineering, the NIST Cybersecurity Framework and leveraging industrial data in the cloud.
In this webinar Kevin Rittie, Andrew Ginter, and Alan Acquatella covered some important points:
The challenges facing OT engineering as it strives to build secure bridges between operations, corporate, and the cloud in order to satisfy the ever growing need for operational data that drives strategic business growth.
CIE and how this approach of secure-by-design engineering can improve the security and operational integrity of both brownfield and greenfield installations.
Practical examples of cyber-informed engineering and unidirectional networks combining to build safe and secure production environments.
Towards the end of the webinar, we answered some of the listeners questions and provided a list of some tangible next steps that you can take on your continuous cybersecurity journey.
Watch Now:
Share
Trending posts
From Blind Spots to Action: OT Threats Exposed
Where does IT Security END and OT Security BEGIN?
Insights into Nation State Threats – Podcast Episode 134
Stay up to date
Subscribe to our blog and receive insights straight to your inbox