search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
INDUSTRY VIEWPOINT


WRITTEN BY IAN TODD, VICE PRESIDENT OF PROFESSIONAL SERVICES, RESTRATA


Educating security teams and facility managers on the important of regular self-assessment as a means to improving preparedness is especially important, particularly in high risk regions or where there is a dynamic threat profile.


Bespoke security risk assessment tools can be designed to cover the specific needs of individual operators with training provided to their teams to support proactive risk management.


Each region and the countries therein are different and it pays to focus on the challenges posed by the location. Identification of trends and underlying risks differ from place to place and infrastructure, such as pipelines, which may span an entire country can be vulnerable to malicious damage or theft. This is especially true in the case of remote assets.


In terms of detecting physical issues, the latest technologies aid the identification of potential attacks


better than ever before. As an example, long-range thermal imaging is effective for wide area surveillance and intruder monitoring whilst unmanned aerial vehicles are effective for surveillance and investigating on remote assets. These can also play a role in detecting emerging threats, such as airborne contamination.


The increasing capability of smart phones lends itself to protecting security through integrated personal credentials. It is likely that phones will eventually replace traditional access tokens or cards, providing access control details and e-wallet capabilities.


Finance plays a major role in what we can or can’t do however, cyber security protection costs haven’t changed greatly in recent years. As expectation increases into what a system should be able to do so does the fee, but this has been


balanced by the proliferation of consumer technology such as smart phones that have allowed us to do more.


Empowering oil and gas companies to utilise appropriate risk assessment methodologies and act on their recommendations will go a long way to ensuring the security of operations onshore and offshore. Just as our systems improve, so do the capabilities of those who may be planning cyber-attacks.


Key to stopping this and securing the safety of our assets is a fully rounded security approach which ties in all cyber and physical aspects. Knowing where the vulnerabilities may lie and understanding what is required to address them allows us to deliver a package that will keep the oil and gas industry safe.


www.restrata.com


April 2017 | www.sosmagazine.biz | p11


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52