Intelligent CIO Middle East Issue 36 | Page 41

////////////////////////// BOTH EMPLOYEES AND VENDORS COMING IN NEED TO BE AWARE OF THE SECURITY POLICIES OR RISK BEING DENIED ACCESS TO SENSITIVE EQUIPMENT AND OPERATIONS SOFTWARE. and robust security policies. The added connectivity of these devices makes it easy for outsiders who guess or steal passwords to penetrate the control environment. A reasoned – and steady – approach for deploying cybersecure solutions Fortunately, there are several steps that oil and gas companies can pursue in order to minimise the threat to cyberattack-driven disruptions to business continuity: Step one involves building firewalls to keep outsiders from entering the corporate network and gaining access to control systems. This will work in environments where entry points into the system are somewhat limited. However, in an IIoT world, cybersecurity will need to be built into every control system hardware and software component, protecting every node that has computing capability. Step two requires a gradual approach to strengthening cybersecurity infrastructure. Responsible control systems manufacturers are now designing cybersecurity into every module they build and deliver so that clients don’t have to concern themselves with building in cybersecurity after they purchase a new product. INTELLIGENTCIO 41