Exclusive Content

Guide to Cyber Threat Information Sharing

Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. This guidance helps organizations establish information sharing goals, identify cyber threat information sources, scope information sharing activities, develop rules that control the publication and distribution of threat information, engage with existing sharing communities, and make effective use of threat information in support of the organization’s overall cybersecurity practices.

Publication courtesy of Julie Snyder, Lead Security & Privacy Engineer, MITRE.

Best Practices for Cultivating a Culture of Security

Best Practices for Cultivating a Culture of Security

Prior to the upcoming Cyber Security for Oil and Gas Summit this May, we took a look at some best practices for cultivating a culture of security. One of the top ten cybersecurity vulnerabilities is a lack of cybersecurity awareness and training amongst employees. There has been no significant research on proper training materials for reacting to cybersecurity threats. To see a significant improvement in overall cybersecurity, you must properly train your staff and equip them with the knowledge they need. 

Cyber Security Experts Share Top Recommendations for Building an Effective Incident Response Plan

Cyber Security Experts Share Top Recommendations for Building an Effective Incident Response Plan

Prior to the 6th Annual Cyber Security for Oil and Gas Summit, we asked four cyber security experts to share their top five recommendations for creating a cyber security incident response plan. We recieved insight from the FBI, EP Energy, QEP Resources, and Phillips 66. As companies are increasingly basing daily operations on connected technology, it is important to know what to prioritize in the event of an emergency. Download this infographic to learn what these experts see as the most crucial for developing a successful incident response plan. 

The Most Common Cyber Security Weakness in Oil & Gas

The Most Common Cyber Security Weakness in Oil & Gas

We asked Senior Security Engineer at NIST, Jim McCarthy, to give us a hotfix to the industry’s most common problem. He sat down with various cyber security professionals to ask them what their most pressing cyber security problem was - this is what they told him. Jim will be speaking about these findings, as well as NIST's progress on their latest cyber security standards, at the summit.

High Standards

High Standards

We sat down with summit speaker Jim McCarthy of NIST fame to pick his brain on the most common cyber security issues, NIST's progress and priorities in creating industry-wide standards, and the state industry at large.

Challenges, Priorities and Security: The Devon Energy Story

Challenges, Priorities and Security: The Devon Energy Story

We had a chance to sit down for an exclusive interview with Nate Graham, Senior IT Manager, Devon Energy recently, in which he discusses end user awareness and training, as well some of the major challenges and priorities in his role with Devon Energy
The Threat of Cyber Attacks on Critical Infrastructure

The Threat of Cyber Attacks on Critical Infrastructure

Critical Infrastructure makes up the backbone of our nation's economy, security, and health. The nation's critical infrastructure encompasses services that protect the most critical functions of American society, both physical and virtual, from the power in our homes, to the water and food that we consume, to the transportation systems we rely upon to function daily. Should any part of America's critical infrastructure be crippled, the nation's overall security and health would be in imminent danger, and society as a whole would face the threat of collapse.

Cyber Security for Oil & Gas Past Presentations

Cyber Security for Oil & Gas Past Presentations

In preparation for Cyber Security for Oil & Gas 2018, we wanted to exclusively share these past presentations with you. Below you will find expert content on:

  • Massively Scalable Access Control for IT/OT Cross-Domain Networks, Dr. Ernest Hampson, Director of the Jacobs Cyber Innovation Laboratory
  • Understanding the Convergence of OT and IT & How a Unified Security Programs Can Augment Cyber Security,  Daniel Crandell, Supervisor at Cyber Security Enterprise Products
  • Auditing Industrial Control Systems, Kamal Khan, Independent Consultant