Trending Content

Content Tagged: "cybersecurity"

Filter Results

Clear

0

Communication and Network Security Featured Image

Communication and Network Security

This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.The content in this course aligns with Domain Four in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Protecting the Digital Oil Field from the Emerging Cyber Threats Featured Image

Protecting the Digital Oil Field from the Emerging Cyber Threats

No matter what we call our Digital Oil Fields – intelligent, smart, integrated, or whatsoever, the ultimate fact is that those fields are data-driven oilfields that are interconnected in between and integrated with business networks and systems. Technological systems may be vulnerable within and may fail due to outside impacts including the cyber risks, however the technology advancement wheel would not stopover because of such emerging cyber threats. We do understand that there is no fully secure system on this earth, however we can still have an advanced level of robust cyber security controls that can be injected during the design of the digital oil field that makes it robust against the emerging cyber threats.

Target, Havex, Shamoon, Night Dragon: How Cyber Espionage Impacts the Oil and Gas Industry and How You Can Make a Difference Featured Image

Target, Havex, Shamoon, Night Dragon: How Cyber Espionage Impacts the Oil and Gas Industry and How You Can Make a Difference

Could "cyber espionage" impact digital oilfield operations? Could you be part of the solution? During this session we will review recent cyber campaigns and how and why cyber adversaries have their sights set not only IT systems, but also engineering systems, control systems and industrial devices of some of the largest companies in the world, including manufacturing and energy. We will also discuss how everyone -- engineers, scientists, IT personnel and executives in the energy industry can collaboratively combat the cyber adversaries that threaten the future of our global digital oilfields.

  • Previous
  • 1
  • Next