ADIPEC ’17: Energy sector overtaking finance as cyber-crime target in Middle East
ABU DHABI, UAE — Energy is overtaking banking and finance as a target for cyber-criminals in the Middle East, yet companies in the sector are leaving themselves significantly more open to a successful attack, leading international experts have told the Security in Energy conference in Abu Dhabi.
Co-located within the Abu Dhabi International Petroleum Exhibition and Conference (ADIPEC), Security in Energy recognizes the increasingly critical importance of IT systems to oil and gas operations.
In an opening address to delegates, Ibrahim Al Shamrani, Executive Director of Operations at Saudi Arabia’s National Cyber Security Center, said 300 new malware samples were being discovered each day, and that his organization was facing a growing number of attacks on the energy industry.
“The energy sector is trending to be the second most targeted sector in the country in 2017, behind the government and ahead of the financial and telecommunications sectors,” Al Shamrani said. “However, attackers are three times more successful in compromising energy companies than they are in the financial sector. In this era, if oil and gas companies think they haven’t been attacked, or even compromised, I can tell them, you are not looking hard enough.”
Recent figures from McAfee estimate the global cost of cyber-related crime, or illicit activity, is between $375 B and $550 B per year.
In a keynote address to the Security in Energy conference, Don Randall, former head of security and chief information security officer (CISO) at the Bank of England, said he believed that figure was probably around $400 B, and growing at between 10% and 20% per year.
“When we look at the types of issues that could affect the oil and gas or energy industries, the three principles are still hacking, phishing, and false identity,” Randall told the conference. “It doesn’t matter if you’re in the financial sector, in energy, utilities, the government, or anything else—the cyberattack will be the same, it’s just the consequences that are different.”
For those making attacks, the chances of getting caught are low. Randal said that in the first 6 mos of 2017, there were 350,000 attacks reported in the UK, but it’s estimated that figure only represents 40% of the actual number of attacks taking place. He added that only 10% of reported attacks are then investigated by law enforcement, and only 1.5% result in any kind of judicial process.
In his Bank of England role, Randall helped develop new security protocols, including the creation of a specific Information Security Division, headed by himself as the Chief Information Security Officer, reporting directly to the board.
That model is now widespread in banking, completely separating the department that runs the IT infrastructure, from the team responsible for recognizing and responding to threats.
“I think we have to be quite radical in how we structure the responsibility and role of those who are there to police cyber activities,” Randall said. “Seriously look at who is policing your IT, and ask is that the same person who is managing it, maintaining it, implementing it, and looking after it—and potentially covering it up? That’s the issue. You’ve got to work in harmony with the IT department, but you’ve got to have an independence there.”
Check out previous coverage:
ADIPEC '17: Execs discuss the changing world of LNG
Comments