THIS THURSDAY: April 11 DGS Luncheon!

04/11/2024 @ 11:30 am – 1:15 pm

0 Comments

Date/Time
Date(s) - 04/11/2024
11:30 am - 1:15 pm

Location
Wynkoop Brewing Company

Categories


If the PayPal option does not allow you to pay with credit card, you can pay with a card in person at the luncheon. Just use the Pay by Check option at checkout so we can get a good headcount.

 

MANAGING CYBERSECURITY RISK IN THE OIL & GAS INDUSTRY

Jim Applegate, PhD & Steve Beaty, PhD

Petro Cyber, Inc.

Cybersecurity threats are an increasing risk for all sectors of the Oil/Gas industry.  One of the issues that increases risk is the confusion between what service your IT department provides compared to what service a cybersecurity consultant can provide.  Our objective is to educate the audience on current threats and discuss precautionary measures they can take to protect not only technical data, but also financial data within their IT environment.

What are the risks to our important data in the upstream oil and gas sector?  We all receive data from vendors and service companies.  Some of our vendors and service companies go to great links to protect data they collect and transmit to us.  For example, seismic acquisition contractors typically send data via hard drive, or from FTP sites.  Measurement while drilling comes over the internet in most cases so that rapid drilling decisions can be made.  Some of these providers go to great links to protect your data, but some may not. However, once the data is inhouse, how is all of this valuable information — drilling including logs, seismic and production data — protected.  All of this data is valuable to a company or a consultant.  Some of it is easy to monetize such as selling or licensing geophysical data, so how do you protect the asset inhouse?

We will discuss simple technical measures that can be implemented very easily and quickly to provide for your data security. In addition, we will discuss measured controls that need to be assessed by your IT Dept or IT firm to prevent a breach.  By the end of our presentation, the audience will be empowered to participate in implementing technical controls for your company to prevent a cybersecurity incident impacting your archived data (seismic, logs, production, financial, etc).

 

 

Doors open at 11:30 am.  Meeting and presentation starts at 12 pm.

 

 

 

Bookings

Bookings are closed for this event.