Environment & Safety Gas Processing/LNG Maintenance & Reliability Petrochemicals Process Control Process Optimization Project Management Refining

February 2026

Columns

Cybersecurity in oil and gas: Protecting critical infrastructure and operations in the digital age

Spencer Fane LLP: S. Tuma

Cybersecurity is difficult. The odds are against you from the beginning, requiring defenders to get everything right 100% of the time while attackers need only one lucky shot. Cybersecurity in the oil and gas industry is even harder. While cyber criminals are usually motivated by money, the oil and gas sector faces threats not only from financially motivated criminals but also from nation-state actors, hacktivists and others seeking to disrupt critical infrastructure or cause environmental damage. 

The Colonial Pipeline cyber incident is only one example of the sector’s vulnerability. The cyberattack, which occurred on May 7, 2021, targeted computerized equipment managing the pipeline, leading to a shutdown of operations. The pipeline, which carries gasoline and jet fuel mainly to the Southeastern U.S., was forced to halt operations to contain the attack. On May 8, 2021, the company paid a ransom to the hacker group Darkside of 75 Bitcoin ($4.4 MM at the time of the transaction) to restore its systems. Approximately 12,000 gas stations were affected. Operations were restored on May 13, 2021.  

Criminals will attempt to disrupt operations through ransomware attacks, steal sensitive operational data and threaten to publish confidential information if ransom demands are not met. Smaller and mid-size oil and gas companies are as much of a target as industry giants because attackers know they usually have fewer resources for cyber defense, yet their operations are often interconnected with larger players in the industry. 

Even worse, cybersecurity is not a static problem that can be fixed like a technical glitch; instead, it is more like warfare, where an active adversary is continuously attacking and every time you implement new defenses, they counter by adapting, changing tactics and finding another way to circumvent those defenses. This is particularly critical in oil and gas operations, where a successful attack could lead to environmental disasters, safety incidents or disruption of essential energy supplies. 

Reality is not a feel-good message. The only way we can fulfill our responsibilities to our stakeholders, employees and the communities we serve is by having a realistic understanding of the challenges we face. There are many things that can be done to become much harder and more resilient targets. 

In my role as breach counsel, I have advised on thousands of cyber incidents and hundreds of ransomware attacks throughout my career. Being in that detached role and seeing the overall process from a strategic vantage point has helped me develop a perspective that has shown me several things that organizations could have done differently to avoid those situations. These observations are particularly relevant for the oil and gas sector, where operational technology (OT) and information technology (IT) systems are increasingly interconnected. 

Cybersecurity requires an ongoing and continuous process. Threat actors are continuously adapting and changing their tactics. The only way to defend critical energy infrastructure is to have an ongoing process that is evolving and maturing with them. 

Risk assessments are essential. All organizational risks are unique and depend on a multitude of different factors. Because you cannot protect against what you do not know, you must understand your unique risks, not only from a technical standpoint but also from an operational safety and environmental perspective. This risk assessment is essential for prioritizing mitigations efforts. 

Data governance is critical. Your objective includes protecting both operational data and intellectual property. This means you must know what sensitive data you have—not collect or maintain more than is needed—and when you no longer need it, securely archive or dispose of it.  

Data equals risk. If you want to reduce that risk, reduce the data available to threat-actors. The same principles apply to employee data and other forms of sensitive operational information. 

Know the law. Cybersecurity, and especially compliance, is a legal issue that requires a thorough understanding of the laws and regulations that are applicable to your organization, including environmental and safety regulations. Do not forget about your contracts. Many organizations have far more "law" governing them through their contracts than any other source. 

Know your service providers. Your organizational risk assessment should include third parties you rely on for services or that have access to your operational systems. As the Colonial Pipeline attack showed, a successful attack on one service provider in the energy sector can shut down operations across multiple organizations and regions. What service providers do your organization depend on, and how will you continue to operate if something happens to them? 

Cyber risk is an overall organizational risk, not just an IT risk. Your organization must have a team-oriented approach to managing cyber risk, both internally and externally (with the partners you rely on or will rely on if you experience an incident). Your team's different perspectives are invaluable.  

At a minimum, no matter the size of the organization, the risk team should include members (internal or external) that focus on:  

  1. Information security 
  2. OT security 
  3. Industrial control systems 
  4. Legal, compliance, environmental health and safety 
  5. Audits 
  6. Operations  
  7. Human resources  
  8. Communications.  

For smaller organizations, one person may wear a lot of hats to fulfill many of those roles, but each organization must have access to external partners with specific expertise who can fill the gaps that inevitably appear.  

The Author

Related Articles

From the Archive

Comments

Comments

{{ error }}
{{ comment.name }} • {{ comment.dateCreated | date:'short' }}
{{ comment.text }}