Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Webinar recording of Kevin Rittie, Andrew Ginter, and Alan Acquatella introducing a new approach for solving the long standing challenge of safely and securely converging IT and OT networks in an Oil & Gas operation.

Waterfall team

Waterfall team

Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than just vital data, they also move malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over. 

However, understanding what “more” means has been the challenge.

Cyber-Informed Engineering (CIE) is a new approach to securing IT/OT convergence – an approach and a perspective that highlights important opportunities. For example, in CIE, worst-case consequences define security requirements for industrial networks, and consequence boundaries define unique spheres of expertise and approaches, including safety engineering, process engineering, the NIST Cybersecurity Framework and leveraging industrial data in the cloud.


In this webinar Kevin Rittie, Andrew Ginter, and Alan Acquatella covered some important points:

arrow red right The challenges facing OT engineering as it strives to build secure bridges between operations, corporate, and the cloud in order to satisfy the ever growing need for operational data that drives strategic business growth.

arrow red right CIE and how this approach of secure-by-design engineering can improve the security and operational integrity of both brownfield and greenfield installations.

arrow red right Practical examples of cyber-informed engineering and unidirectional networks combining to build safe and secure production environments.

Towards the end of the webinar, we answered some of the listeners questions and provided a list of some tangible next steps that you can take on your continuous cybersecurity journey.

Watch Now:


Stay up to date

Subscribe to our blog and receive insights straight to your inbox