The Protiviti View  | Insights From Our Experts on Trends, Risks and Opportunities

The Protiviti View

Insights From Our Experts on Trends, Risks and Opportunities
Search

POST

< 1 mins to read

Are Wireless Technologies the Answer for Cyber-Secure Offshore Asset Utilization and Operator Profitability?

FERC Order 2222 Levels the Playing Field for Distributed Energy Resources
Larger Font
< 1 minute to read

A review by Siemens finds that wireless communications are well suited for the often remote locations of oil and gas industry production facilities, both on- and offshore. Previously, satellites provided producers with communications sufficient for transmitting telemetry data, but that method often fell short in system automation controls, which are increasingly required today.

Siemens’ analysis finds that three current terrestrial wireless technologies – WiMAX, WiFi/WLAN and 3G cellular – can meet those requirements with high levels of security while also offering much greater operating visibility, control, efficiency and profitability.

Our Perspective:

Advanced wireless technologies alone will not be sufficient to provide the level of cybersecurity protection oil and gas operators need throughout their production systems. To the extent that much of the industry still relies on older-tech industrial controls in offshore systems, the improved security of advanced wireless systems can be undermined.

Oil and gas producers are advised to do the following:

  • Conduct complete, top-to-bottom security audits regularly to identify gaps and points where even recent technology can be compromised by intruders.
  • Implement real-time monitoring and logging of both wireless and industrial controls systems for immediate identification of and response to threats and vulnerabilities.
  • Integrate wireless technologies into production facilities and systems only after conducting comprehensive threat analysis and vulnerability testing as the foundation for the facility’s security plan.
  • Limit access to any network solely to those with a real need to use it, and implement an identity management system that is consistent with the risk of the data being communicated.

Was this post helpful to you?

Thanks for your feedback!

Subscribe to The Protiviti View Blog

To face the future confidently, you need to be equipped with valuable insights that align with your interests and business goals.

In this Article

Find a similar post by topics

Authors

Danny Rudloff

By Danny Rudloff

Verified Expert at Protiviti

EXPERTISE

Cal Slemp

By Cal Slemp

Verified Expert at Protiviti

EXPERTISE

No noise.
Just insights.

Subscribe now

Related posts

Article

What is it about

What you need to know: Aging systems, data silos, regulatory pressures and talent gaps complicate enterprise transformation for public utilities....

Article

What is it about

The top priority for healthcare internal auditors this year is cybersecurity, according to a survey by Protiviti and the Association...

Article

What is it about

The big picture: C-suite leaders in traditional aerospace and defense (A&D) companies are launching and growing their aftermarket services and...

Search