In the Oil and Gas industry, there is no single adversary and no single threat to the information technology (IT) and operational technology (OT) infrastructures. Attackers run the gamut from hacktivists and cybercriminals to terrorists and state-sponsored hackers, each with their own skillsets and motives.
An organization should be prepared to protect itself from the full range of threat actors. The risk an Oil and Gas organization faces depends on the maturity of its security, the vulnerability of its infrastructure and the impact of a breach. Defenses must be planned accordingly.
In this eBook you will learn to:
- Understand the enemy - Their objectives, risk levels, skills and methods
- Define a Cybersecurity Maturity Model for Oil and Gas
- Apply solutions for securing the oil and gas infrastructures