{"id":15146,"date":"2020-07-15T03:08:16","date_gmt":"2020-07-15T01:08:16","guid":{"rendered":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/cyber-security-vulnerabilities\/"},"modified":"2025-03-19T10:48:47","modified_gmt":"2025-03-19T09:48:47","slug":"cyber-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/","title":{"rendered":"Top 10 Cyber Security Vulnerabilities in Oil and Gas"},"content":{"rendered":"<p>No doubts: Digitization creates unimagined possibilities. Do you remember? What was unthinkable just a few years ago has long since become reality. The flipside of the coin is the threats and vulnerabilities that come with it. Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both intentional and unintentional, can affect individuals, businesses, and society as a whole.<\/p>\n<p>In recent years, events show that the energy and oil sectors are among the most vulnerable sectors. As our technology evolves, the methods used by attackers are becoming increasingly innovative and sophisticated.<\/p>\n<h2>Digital vulnerabilities in Oil &amp; Gas<\/h2>\n<p>Why are cyber attacks increasing in the oil and gas sector? Is this a historical fact?<\/p>\n<p>Let us first take a look at the status quo: The industrial automation, control, and security systems used in the oil and gas sector are largely digitalized and dependent on digital technology. In the past, such systems were proprietary. Whereas today they are largely based on commercially available components, such as a PC with a Microsoft Windows operating system. This means that the known weaknesses of these commercially available standard products are also revealed in this sector.<\/p>\n<p>Such kinds of development can also be seen in networks. The networks used between process equipment and control systems were isolated and proprietary in the past, but are now based on Internet technology. Also, industrial automation and control systems used to be physically separated from traditional information systems and open networks. The need to transfer production data to information systems and remote maintenance means that separation is virtually impossible. Increasingly, remote maintenance is performed from an onshore location or a neighboring platform, which can lead to the use of shared computer networks. This means that production equipment is exposed to network-related vulnerabilities.<\/p>\n<h2>Top 10 Cyber Security Vulnerabilities in the Oil and Gas industry<\/h2>\n<ol>\n<li>Lack of cyber security awareness and no staff training<\/li>\n<li>Remote operation and maintenance<\/li>\n<li>Use of standard IT products with known vulnerabilities in the production environment<\/li>\n<li>A limited cyber security culture among vendors, suppliers, and contractors<\/li>\n<li>Insufficient separation of data networks<\/li>\n<li>Use of mobile devices and storage units including smartphones<\/li>\n<li>Data networks between onshore and offshore facilities<\/li>\n<li>Insufficient physical security of server rooms, cabinets, etc.<\/li>\n<li>Vulnerable software<\/li>\n<li>Obsolete control systems in plants<\/li>\n<\/ol>\n<h2>The consequences of unwanted incidents caused by cyber security vulnerabilities<\/h2>\n<p>Customers often ask me: Which are the biggest cyber security vulnerabilities in the oil and gas sector? The answer is simple: It&#8217;s the human being!<\/p>\n<p>Malicious codes are usually spread by human error. An attachment in an e-mail is opened, memory sticks are inserted, mobile phones are charged, laptops are connected to critical networks, and so on. Mobile phones can also easily connect to the Internet. Users are tricked into revealing passwords, etc. Human error is considered the greatest digital vulnerability in this sector.<\/p>\n<p>The consequences of unwanted incidents based on cyber security vulnerabilities are primarily financial. Production must be shut down, and that means a loss of income for the sector. Society will experience a drop in direct and indirect taxes. Unwanted incidents will mean a loss of reputation for the company. If saboteurs and terrorist organizations manage to control vital production facilities, in the worst case, environmental destruction and fatalities may result.<\/p>\n<h2>Dependencies<\/h2>\n<p>In order to reduce the CO2 emissions caused by the generation of electricity from oil plants, the power supply is often based on the coast (electrification). Most of these plants have to shut down production in the event of an onshore power supply failure.<\/p>\n<p>For a long time, there has been an increasing focus on digital vulnerabilities in power distribution systems. Such distribution systems are complex network structures that are highly dependent on management and control systems.<\/p>\n<h2>Emergency readiness<\/h2>\n<p>An unofficial, international survey of companies in the sector revealed that only 40% of companies have an Incident Response Plan \/ Business Continuity Plan in place, which covers digital vulnerabilities and defines how to proceed in case of a cyber attack. The focus of crisis and emergency preparedness is on fires, explosions, outbreaks, etc.<\/p>\n<h2>Future problems and trends<\/h2>\n<p>At the time of writing this report, the price of oil is below USD 40 per barrel and future price developments are uncertain. This means that the sector will have to reduce its costs in order to maintain profitability. The fact that these cost-cutting measures may affect the continuous improvement of safety is a major challenge. The increased focus on cost-benefit assessments and new working methods are important elements for the future.<\/p>\n<p>Digitization of the sector is continuing. The &#8220;Internet of Things&#8221; (IIoT) will lead to more units with cyber security vulnerabilities. The amount of data to be transported is increasing and standard IT equipment will increasingly be integrated into specialised control systems.<\/p>\n<p>The risks that important critical key functions, infrastructures, and information that must be protected for security reasons are increasing. Further, there is a higher risk that individuals will be affected by espionage, sabotage, terrorist acts and other serious acts.<\/p>\n<h2>Most important risk-reducing measures<\/h2>\n<p>So what can be done to protect oil and gas platforms from cyber attacks?<\/p>\n<p>Barriers are introduced to reduce the risk &#8211; partly to prevent an undesirable event from occurring, partly to mitigate the consequences of an undesirable event that has occurred. There is an increasing focus on barriers that prevent an undesired event from happening. However, the quality of these barriers has been tested and verified only to a limited extent. It is not enough to simply rely on a firewall for protection. Additional barriers, including opening\/closing of accesses, procedures, and work processes must also be established.<\/p>\n<p>In most cases, there is not enough equipment and routines to detect that hackers have already targeted ongoing activities to a system. In addition, there is a lack of trained routines to prevent negative consequences when there is a suspicion that an adverse incident may occur.<\/p>\n<h2>What individual actors should implement to mitigate cyber security vulnerabilities<\/h2>\n<p>Regulatory authorities should adopt functional requirements demanding that barriers to digital vulnerability have to be put in place. Cyber security vulnerabilities must be included in the appropriate risk analysis.<\/p>\n<p>Companies must create a culture of reducing digital vulnerabilities, just as there is a culture of preventing fires and explosions. Awareness raising measures must be a priority both within the sector and with the public. Schools should focus more on how to use digital media.<\/p>\n<h2>Outlook<\/h2>\n<p>Yes, you can get quite queasy when it comes to cyber security vulnerabilities. However, it is possible to use suitable barriers to prevent attackers from intruding on your system. Have you already integrated all the necessary barriers? If not, please <a href=\"https:\/\/www.yokogawa.com\/eu\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact<\/a> our <a href=\"https:\/\/www.yokogawa.com\/solutions\/solutions\/plant-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber security team<\/a>. We will be glad to help you.<\/p>\n<hr \/>\n<blockquote class=\"wp-embedded-content\" data-secret=\"LfO89Gafjf\"><p><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/anatomy-cyber-attack-1\/\">Anatomy of a Cyber Attack- ICS Cyber Kill Chain- Part 1<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Anatomy of a Cyber Attack- ICS Cyber Kill Chain- Part 1&#8221; &#8212; Energy and Renewables\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/anatomy-cyber-attack-1\/embed\/#?secret=hTA0DdIc6P#?secret=LfO89Gafjf\" data-secret=\"LfO89Gafjf\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"S8xQuyWkHS\"><p><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\">Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2&#8221; &#8212; Energy and Renewables\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/embed\/#?secret=E6acW6DD5b#?secret=S8xQuyWkHS\" data-secret=\"S8xQuyWkHS\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"vTsN9eLrtc\"><p><a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/dont-give-hackers-a-chance\/\">Don&#8217;t give hackers a chance!<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Don&#8217;t give hackers a chance!&#8221; &#8212; Energy and Renewables\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/dont-give-hackers-a-chance\/embed\/#?secret=7P7vbyqkMI#?secret=vTsN9eLrtc\" data-secret=\"vTsN9eLrtc\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let me summarize the Top 10 Cyber Security Vulnerabilities in the Oil and Gas sector. <\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\"> <span class=\"screen-reader-text\">Top 10 Cyber Security Vulnerabilities in Oil and Gas<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":170,"featured_media":12641,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","footnotes":""},"categories":[2344],"tags":[],"coauthors":[2423],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 10 Cyber Security Vulnerabilities in Oil and Gas<\/title>\n<meta name=\"description\" content=\"Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 Cyber Security Vulnerabilities in Oil and Gas\" \/>\n<meta property=\"og:description\" content=\"Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Energy and Renewables\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-15T01:08:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T09:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"849\" \/>\n\t<meta property=\"og:image:height\" content=\"302\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fatih Denizdas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\"},\"author\":{\"name\":\"Fatih Denizdas\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/d76dffe020ca40a584ba716a030b35ea\"},\"headline\":\"Top 10 Cyber Security Vulnerabilities in Oil and Gas\",\"datePublished\":\"2020-07-15T01:08:16+00:00\",\"dateModified\":\"2025-03-19T09:48:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\"},\"wordCount\":1156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\",\"name\":\"Top 10 Cyber Security Vulnerabilities in Oil and Gas\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website\"},\"datePublished\":\"2020-07-15T01:08:16+00:00\",\"dateModified\":\"2025-03-19T09:48:47+00:00\",\"description\":\"Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 Cyber Security Vulnerabilities in Oil and Gas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/\",\"name\":\"Energy and Renewables\",\"description\":\"Yokogawa\",\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization\",\"name\":\"Energy and Renewables\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png\",\"contentUrl\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png\",\"width\":302,\"height\":89,\"caption\":\"Energy and Renewables\"},\"image\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/d76dffe020ca40a584ba716a030b35ea\",\"name\":\"Fatih Denizdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/image\/5bd23d71d344c69f78a9eb305ec84191\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/10\/Fatih-Denzidas-250-px-150x150.jpg\",\"contentUrl\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/10\/Fatih-Denzidas-250-px-150x150.jpg\",\"caption\":\"Fatih Denizdas\"},\"description\":\"As Head of Automation Cyber Security and IT Manager at Yokogawa Germany, I have 25 years of IT and OT Security experience with focus on worldwide cyber security projects. Cyber Security has become one of the most important topics in the IT &amp; OT landscape. Meanwhile, security plays a crucial role in all areas. Within the scope of my activities as a Global Industrial Cyber Security Professional and Ethical Hacker in the fields of Cyber Security and Hardware Hacking in the Industrial Control System, I examine existing methods for their effectiveness and develop new approaches to improve the security of specific systems. I sensitize you and your staff to threats, transfer expertise on an academic level, and show effective countermeasures in addition to current attack scenarios. In addition to the technical aspects of IT, I am particularly interested in the human factor and knowledge transfer. I am fascinated by human-machine interaction, information architecture, and the impact of new technologies. With my blog articles, I offer an introduction to the topic of IT &amp; OT security, and with my projects, I present concrete solutions for new challenges in information security.\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/author\/fatih-denizdas\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 10 Cyber Security Vulnerabilities in Oil and Gas","description":"Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 Cyber Security Vulnerabilities in Oil and Gas","og_description":"Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both...","og_url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/","og_site_name":"Energy and Renewables","article_published_time":"2020-07-15T01:08:16+00:00","article_modified_time":"2025-03-19T09:48:47+00:00","og_image":[{"width":849,"height":302,"url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image.jpg","type":"image\/jpeg"}],"author":"Fatih Denizdas","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/"},"author":{"name":"Fatih Denizdas","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/d76dffe020ca40a584ba716a030b35ea"},"headline":"Top 10 Cyber Security Vulnerabilities in Oil and Gas","datePublished":"2020-07-15T01:08:16+00:00","dateModified":"2025-03-19T09:48:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/"},"wordCount":1156,"commentCount":0,"publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/","name":"Top 10 Cyber Security Vulnerabilities in Oil and Gas","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website"},"datePublished":"2020-07-15T01:08:16+00:00","dateModified":"2025-03-19T09:48:47+00:00","description":"Every activity in the oil and gas sector is exposed to risks, also due to cyber security vulnerabilities. Adverse incidents, both...","breadcrumb":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/cyber-security-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/"},{"@type":"ListItem","position":2,"name":"Top 10 Cyber Security Vulnerabilities in Oil and Gas"}]},{"@type":"WebSite","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/","name":"Energy and Renewables","description":"Yokogawa","publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization","name":"Energy and Renewables","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png","contentUrl":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png","width":302,"height":89,"caption":"Energy and Renewables"},"image":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/d76dffe020ca40a584ba716a030b35ea","name":"Fatih Denizdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/image\/5bd23d71d344c69f78a9eb305ec84191","url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/10\/Fatih-Denzidas-250-px-150x150.jpg","contentUrl":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/10\/Fatih-Denzidas-250-px-150x150.jpg","caption":"Fatih Denizdas"},"description":"As Head of Automation Cyber Security and IT Manager at Yokogawa Germany, I have 25 years of IT and OT Security experience with focus on worldwide cyber security projects. Cyber Security has become one of the most important topics in the IT &amp; OT landscape. Meanwhile, security plays a crucial role in all areas. Within the scope of my activities as a Global Industrial Cyber Security Professional and Ethical Hacker in the fields of Cyber Security and Hardware Hacking in the Industrial Control System, I examine existing methods for their effectiveness and develop new approaches to improve the security of specific systems. I sensitize you and your staff to threats, transfer expertise on an academic level, and show effective countermeasures in addition to current attack scenarios. In addition to the technical aspects of IT, I am particularly interested in the human factor and knowledge transfer. I am fascinated by human-machine interaction, information architecture, and the impact of new technologies. With my blog articles, I offer an introduction to the topic of IT &amp; OT security, and with my projects, I present concrete solutions for new challenges in information security.","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/author\/fatih-denizdas\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image.jpg",849,302,false],"thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image-150x150.jpg",150,150,true],"medium":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image-300x107.jpg",300,107,true],"medium_large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image-768x273.jpg",768,273,true],"large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image.jpg",849,302,false],"1536x1536":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image.jpg",849,302,false],"2048x2048":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image.jpg",849,302,false],"post-thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Fotolia_70532111_S_featured-image-356x200.jpg",356,200,true]},"uagb_author_info":{"display_name":"Fatih Denizdas","author_link":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/author\/fatih-denizdas\/"},"uagb_comment_info":0,"uagb_excerpt":"Let me summarize the Top 10 Cyber Security Vulnerabilities in the Oil and Gas sector. Top 10 Cyber Security Vulnerabilities in Oil and Gas Read More &raquo;","_links":{"self":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts\/15146"}],"collection":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/users\/170"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/comments?post=15146"}],"version-history":[{"count":2,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts\/15146\/revisions"}],"predecessor-version":[{"id":16886,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts\/15146\/revisions\/16886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/media\/12641"}],"wp:attachment":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/media?parent=15146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/categories?post=15146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/tags?post=15146"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/coauthors?post=15146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}