Report Cybersecurity Oil and Gas
Report Cybersecurity Oil and Gas
Executive Summary
In spring 2023, Automation.com collaborated with Fortinet to assess the
cybersecurity efforts, priorities, and overall preparedness of companies in the
petrochemical industry. Automation and information technology (IT) professionals
working for and with upstream, midstream, and downstream oil and gas operations
were encouraged to share their views on protecting operational technology (OT)
systems and their companies’ cybersecurity activities in specific areas.
Surveys were sent to active names on lists from Automation.com, the ISA As critical national
Chemical and Petroleum Industries Division (ChemPID), and ISA oil and gas infrastructure, oil and gas
regionally focused sections. We received 207 responses and a survey completion companies are key targets for
rate of 67%. Respondents who were not in the oil and gas industry or did not have cybercriminals. Cyberattacks on
knowledge of their company’s cybersecurity activities were filtered out, leaving 62 oil and gas companies promise
highly qualified respondents. maximum disruption and
extortion opportunities.1
The results show an industry roughly split. About half of companies are well on their
way to what might be called a mature cybersecurity stance. They have completed
most of the steps and subtasks associated with protecting their OT environments and
have systems in place to monitor progress and continuously make adjustments. The
other half of respondents seem to be just getting started, having a range of plans and
good intentions but few concrete implementations of protective tools and procedures.
Both groups can benefit from the results of this survey by comparing where they are
relative to their peers and seeing what they may need to focus on next.
The oil and gas industry, in particular, presents an attractive target for attacks worldwide. In an opportunistic response to
the Russian-Ukraine conflict, ransomware gangs have hit major organizations across Europe over the last year, resulting in
widespread disruption to energy supplies.5
In the United States, the Government Accountability Office found that the Department of the Interior has taken insufficient
steps to address cybersecurity risks to over 1,600 offshore facilities, producing a significant portion of U.S. domestic oil and
gas.6 A cyberattack on this infrastructure could cause physical, environmental, and economic harm and broad disruptions to
oil and gas supplies and markets.
This survey report drills down into how industry leaders view the current state of OT-based cybersecurity risks and the
subsequent preparedness of their organizations to maintain resiliency.
2
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
What’s more interesting is where respondents think their company is performing below average. More than a quarter of
respondents (26%) believe their company is below average when it comes to threat intelligence, incidence response planning, or
visualization of security events, for example. There is also a governance consideration here.
Threat intelligence
0 20 40 60 80 100
3
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
Effective OT cybersecurity involves multiple assessment and implementation steps that, when combined, reflect a company’s
level of cybersecurity maturity. Respondents were asked what their companies had accomplished in six different areas. Broadly
speaking, results fell into two main groups—many organizations are well on their way to a mature OT cybersecurity program,
while many others are just getting started.
About another half of respondents remain in the early stages. Just 6% say their companies have not begun, and 8% say their
companies have plans in place but have not completed any tasks. Only 29% say their company has identified and completed
some asset priority and risk assessment tasks. However, as seen in the answers for the other five aspects of OT cybersecurity
maturity, just because a company hasn’t done assessments doesn’t mean it hasn’t implemented protections.
While hiring more skilled OT security experts to compensate is one approach, like every other business sector worldwide, the oil
and gas industry faces a persistent global shortage of experienced and knowledgeable security staff.8 Leaders should focus on
identifying those who could benefit the company with access to additional training. Upskilling and reskilling offer an alternate
strategy for filling the cyber skills gap and keeping OT environments safe.9
4
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
As more IT assets migrate to cloud-based environments, OT assets become exposed to cybersecurity challenges that
previously did not exist.11 While edge and cloud computing devices are often considered the responsibility of IT, their increasing
application to OT systems means that certain associated cybersecurity responsibilities may fall within the OT realm. Perhaps not
surprisingly, 14% of respondents are unsure if these systems are protected. Another 14% say their company has not addressed
cybersecurity for these systems.
In July 2023 alone, newspapers reported that the Norwegian recycling and mining corporation TOMRA suffered an “extensive
cyberattack,”12 Japan’s Port of Nagoya resumed operations two days after a ransomware attack,13 and a contractor who
worked at the water treatment facility in the Town of Discovery Bay, California, faced charges for a January attack that
intentionally uninstalled the main operational and monitoring system and then shut down the servers running those systems.14
5
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
In addition, Israel’s largest oil refinery, BAZAN Group, was attacked by hacktivists in July, taking its website offline and releasing
screenshots of their SCADA systems as well as diagrams of various systems and code for the refinery’s programmable logic controllers.15
The second most cited reason for pursuing OT cybersecurity is increased regulatory pressure. This speaks to the general
awareness of cybersecurity as a business enabler and the importance of cybersecurity governance ensuring uninterrupted
critical infrastructure operations. One respondent said, “We started when TSA issued the security directive post-Colonial
Pipeline incident.” The U.S. Transportation Security Administration (TSA) recently updated its security directive to reinforce
cybersecurity preparedness and resilience for the nation’s critical pipelines following the initial directive announced in July
2021 and renewed in July 2022.16
President Biden’s National Cybersecurity Strategy Implementation Plan was also recently released, setting up the potential for
more regulation.17 The strategy calls for two fundamental shifts in how the U.S. allocates roles, responsibilities, and resources
in cyberspace and details 69 high-impact federal initiatives, each assigned to a responsible agency and given a timeline for
completion. Eighteen agencies are leading initiatives.
The vast majority (86%) believe that cyberattacks targeting their company’s OT environment will increase in sophistication over
the next one to two years. Similarly, 86% of respondents said their organization will implement new solutions to address cyber
risks to OT. And 84% of those surveyed agree that organizations will increase their effectiveness at mitigating OT security risks
over time (with 47% strongly agreeing).
Their confidence in the future showed less enthusiasm regarding cybersecurity talent. While a majority agreed that their
company will have the right talent in place to address OT cyber risks, only 27% strongly agreed, and a significant 13% disagreed
(either strongly or somewhat).
My company will have the right talent in place to address cyber risks to OT
Employees responsible for IT, OT, or both will work more closely together in my company
Oil and gas organizations will increase their effectiveness at mitigating OT security risks
0 10 20 30 40 50 60
6
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
Not significant
Top 10
Top 5
Top 3
Number 1
0 2 4 6 8 10 12 14 16 18 20
Operational disruption
Insider threat
Unauthorized access
Collateral damage
State-sponsored terrorism
0 10 20 30 40 50 60 70
No
Don’t know
7
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
8
Cybersecurity in the Oil and Gas Industry: Securing the OT Environment REPORT
1 2 3 4 5 6
The results of this survey should help organizations compare their current program’s status with industry peers and guide them
toward critical areas for improving the protection of their OT infrastructure going forward.
1
“Leading oil and gas companies in the cybersecurity theme,” Offshore Technology, May 22, 2023.
2
“2023 State of Operational Technology and Cybersecurity Report,” Fortinet, May 2023.
3
Ibid.
4
“Leading oil and gas companies in the cybersecurity theme,” Offshore Technology, May 22, 2023.
5
“2022 Oil and Gas Sectors Threat Landscape,” Deloitte, October 13, 2022.
6
“Offshore Oil and Gas: Strategy Urgently Needed to Address Cybersecurity Risks to Infrastructure,” U.S. Government Accountability Office, November 17, 2022.
7
“2023 State of Operational Technology and Cybersecurity Report,” Fortinet, May 2023.
8
“Distribution of companies experiencing a shortfall of skilled IT security personnel worldwide from 2018 to 2023,” Statista, May 11, 2023.
9
“Effectively upskilling cybersecurity professionals to help close the skills gap,” CSO, August 14, 2023.
10
“Converge IT and OT to turbocharge business operations’ scaling power,” McKinsey & Company, June 28, 2022.
11
“IT, OT, and ZT: Implementing Zero Trust in Industrial Control Systems,” Carnegie Mellon University, July 18, 2022.
12
“Norwegian Giant Tomra Suffers “Extensive” Attack,” Infosecurity Magazine, July 19, 2023.
13
“Japan’s Nagoya port resumes operations after ransomware attack,” CSO, July 6, 2023.
14
“Former water contractor employee tampers with water treatment systems, posing public health and safety threat,” Industrial Cyber, July 10, 2023.
15
“Website of Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers,” Dark Reading, July 31, 2023.
16
“TSA updates, renews cybersecurity requirements for pipeline owners, operators,” U.S. Transportation Security Administration, July 26, 2023.
17
“National Cybersecurity Strategy Implementation Plan, U.S. White House, July 2023.
www.fortinet.com
Copyright © 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
2310526-0-0-EN