Industries- Oil & Gas

[vc_row type=”full_width_background” full_screen_row_position=”middle” bg_image=”7508″ bg_position=”left top” bg_repeat=”no-repeat” parallax_bg=”true” parallax_bg_speed=”fixed” bg_color=”#ffffff” scene_position=”center” text_color=”light” text_align=”left” top_padding=”12%” bottom_padding=”18%” class=”header” overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_position=”bottom” shape_divider_height=”150″ shape_type=”triangle”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”2/6″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” el_class=”header” width=”3/6″ tablet_text_alignment=”default” phone_text_alignment=”right” column_border_width=”none” column_border_style=”solid”][vc_column_text css_animation=”fadeInUp” css=”.vc_custom_1573484219222{margin-bottom: 15px !important;}”]

[/vc_column_text][split_line_heading]

Oil & Gas

[/split_line_heading][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/6″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”top” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” bottom_padding=”3%” row_name=”Save Time” overlay_strength=”0.3″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”padding-3-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][vc_row_inner column_margin=”default” translate_y=”13%” text_align=”left”][vc_column_inner enable_animation=”true” animation=”fade-in-from-left” column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/1″ column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”7509″ alignment=”” animation=”None” border_radius=”10px” box_shadow=”large_depth” max_width=”100%”][/vc_column_inner][/vc_row_inner][/vc_column][vc_column column_padding=”padding-2-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner enable_animation=”true” animation=”fade-in-from-bottom” column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/1″ column_border_width=”none” column_border_style=”solid”][nectar_gradient_text heading_tag=”h1″ color=”extra-color-gradient-1″ gradient_direction=”diagonal” text=”Aligning a company’s priorities and budgets within the organization’s high-level threat landscape.”][/vc_column_inner][/vc_row_inner][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner enable_animation=”true” animation=”fade-in-from-bottom” column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/1″ column_border_width=”none” column_border_style=”solid” delay=”150″][vc_column_text]The Oil & Gas industry comprises a myriad of systems and complex infrastructures that enable the exploration, production, transmission, processing, distribution and retail of petroleum-based products. IT and OT systems form the backbone of these components, providing connectivity and integration of the comprehensive environments within the Upstream, Midstream and Downstream sectors.  It’s the connectivity and integration of systems that promote safe and effective operations within Oil & Gas environments.  With this integration, however, occurs a heightened risk for external and internal cyber threats. For instance, the common use of Internet Protocols in an IT/OT environment creates vulnerabilities from external threats.  Further, the inter-connectivity of process control networks, systems and devices creates vulnerabilities for internal nefarious attacks and un-intended operational events.

The RTI Team comprises highly skilled automation engineers, process engineers, IT/OT Network and ICS cybersecurity specialists with vast experience in the Oil & Gas market.  Our knowledge of the intricacies and nuances of industrial business environments facilitate a “system of systems” approach throughout the discovery, design, build, test and support phases.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#f6f6f6″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”3%” bottom_padding=”3%” row_name=”Sign Up Steps” overlay_strength=”1″ shape_divider_color=”#f6f6f6″ shape_divider_position=”bottom” shape_divider_height=”200″ shape_type=”triangle”][vc_column column_padding=”padding-2-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][vc_column_text]

Red Tridents Partnership

[/vc_column_text][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” animate=”yes” custom_height=”50″][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true”]

  • Design

  • Build

  • Support

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][tabbed_section style=”minimal_alt” alignment=”center” spacing=”side-45px” tab_color=”extra-color-gradient-1″ cta_button_style=”accent-color” icon_size=”36″][tab icon_family=”none” title=”Upstream” id=”1581017155020-0-6″ tab_id=”1581016833241-5″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ce1628″ link_type=”regular” alignment=”left” text=”Email Red Trident For A Free Consultation” url=”mailto:info@redtridentinc.com”][divider line_type=”No Line” custom_height=”30″][vc_column_text]Most oil and gas companies’ business structures are segmented and organized according to business segment, assets, or function.

The upstream oil and gas segment is also known as the exploration and production (E&P) sector because it encompasses activities related to searching for, recovering and producing crude oil and natural gas.

The upstream segment is all about wells: where to locate them; how deep and how far to drill them; and how to design, construct, operate and manage them to deliver the greatest possible return on investment with the lightest, safest and smallest operational footprint.[/vc_column_text][fancy-ul icon_type=”standard_dash” color=”Accent-Color” alignment=”left”]option 1

option 2

option 3

 

[/fancy-ul][/tab][tab icon_family=”none” title=”Midstream” id=”1581017921233-3-9″ tab_id=”1581016833241-5″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ce1628″ link_type=”regular” alignment=”left” text=”Email Red Trident For A Free Consultation” url=”mailto:info@redtridentinc.com”][divider line_type=”No Line” custom_height=”30″][vc_column_text]Most oil and gas companies’ business structures are segmented and organized according to business segment, assets, or function.

The upstream oil and gas segment is also known as the exploration and production (E&P) sector because it encompasses activities related to searching for, recovering and producing crude oil and natural gas.

The upstream segment is all about wells: where to locate them; how deep and how far to drill them; and how to design, construct, operate and manage them to deliver the greatest possible return on investment with the lightest, safest and smallest operational footprint.[/vc_column_text][fancy-ul icon_type=”standard_dash” color=”Accent-Color” alignment=”left”]option 1

option 2

option 3

 

[/fancy-ul][/tab][tab icon_family=”none” title=”Downstream” id=”1581017922639-4-10″ tab_id=”1581016833241-5″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ce1628″ link_type=”regular” alignment=”left” text=”Email Red Trident For A Free Consultation” url=”mailto:info@redtridentinc.com”][divider line_type=”No Line” custom_height=”30″][vc_column_text]Most oil and gas companies’ business structures are segmented and organized according to business segment, assets, or function.

The upstream oil and gas segment is also known as the exploration and production (E&P) sector because it encompasses activities related to searching for, recovering and producing crude oil and natural gas.

The upstream segment is all about wells: where to locate them; how deep and how far to drill them; and how to design, construct, operate and manage them to deliver the greatest possible return on investment with the lightest, safest and smallest operational footprint.[/vc_column_text][fancy-ul icon_type=”standard_dash” color=”Accent-Color” alignment=”left”]option 1

option 2

option 3

 

[/fancy-ul][/tab][/tabbed_section][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#f6f6f6″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”3%” bottom_padding=”3%” row_name=”Sign Up Steps” disable_element=”yes” overlay_strength=”1″ shape_divider_color=”#f6f6f6″ shape_divider_position=”bottom” shape_divider_height=”200″ shape_type=”triangle”][vc_column column_padding=”padding-2-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][vc_column_text]

Cyber Assessments

[/vc_column_text][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” animate=”yes” custom_height=”50″][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true”]

  • Safe

  • Secure

  • Resilient

  • Efficient

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][tabbed_section style=”minimal” alignment=”center” spacing=”side-30px” tab_color=”extra-color-gradient-1″ cta_button_style=”accent-color” icon_size=”24″][tab icon_family=”none” title=”Upstream” id=”1581017155020-0-6″ tab_id=”1581016833241-5″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ce1628″ link_type=”regular” alignment=”left” text=”Email Red Trident For A Free Consultation” url=”mailto:info@redtridentinc.com”][divider line_type=”No Line” custom_height=”30″][vc_column_text]Most oil and gas companies’ business structures are segmented and organized according to business segment, assets, or function.

The upstream oil and gas segment is also known as the exploration and production (E&P) sector because it encompasses activities related to searching for, recovering and producing crude oil and natural gas.

The upstream segment is all about wells: where to locate them; how deep and how far to drill them; and how to design, construct, operate and manage them to deliver the greatest possible return on investment with the lightest, safest and smallest operational footprint.[/vc_column_text][fancy-ul icon_type=”standard_dash” color=”Accent-Color” alignment=”left”]option 1

option 2

option 3

 

[/fancy-ul][/tab][tab icon_family=”none” title=”Midstream” id=”1581017921233-3-9″ tab_id=”1581016833241-5″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ce1628″ link_type=”regular” alignment=”left” text=”Email Red Trident For A Free Consultation” url=”mailto:info@redtridentinc.com”][divider line_type=”No Line” custom_height=”30″][vc_column_text]Most oil and gas companies’ business structures are segmented and organized according to business segment, assets, or function.

The upstream oil and gas segment is also known as the exploration and production (E&P) sector because it encompasses activities related to searching for, recovering and producing crude oil and natural gas.

The upstream segment is all about wells: where to locate them; how deep and how far to drill them; and how to design, construct, operate and manage them to deliver the greatest possible return on investment with the lightest, safest and smallest operational footprint.[/vc_column_text][fancy-ul icon_type=”standard_dash” color=”Accent-Color” alignment=”left”]option 1

option 2

option 3

 

[/fancy-ul][/tab][tab icon_family=”none” title=”Downstream” id=”1581017922639-4-10″ tab_id=”1581016833241-5″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ce1628″ link_type=”regular” alignment=”left” text=”Email Red Trident For A Free Consultation” url=”mailto:info@redtridentinc.com”][divider line_type=”No Line” custom_height=”30″][vc_column_text]Most oil and gas companies’ business structures are segmented and organized according to business segment, assets, or function.

The upstream oil and gas segment is also known as the exploration and production (E&P) sector because it encompasses activities related to searching for, recovering and producing crude oil and natural gas.

The upstream segment is all about wells: where to locate them; how deep and how far to drill them; and how to design, construct, operate and manage them to deliver the greatest possible return on investment with the lightest, safest and smallest operational footprint.[/vc_column_text][fancy-ul icon_type=”standard_dash” color=”Accent-Color” alignment=”left”]option 1

option 2

option 3

 

[/fancy-ul][/tab][/tabbed_section][toggles style=”minimal_small” accordion=”true”][toggle color=”Accent-Color” title=”Up Stream”][vc_column_text]Understanding where you are and where you want to be as an organization is critical to success.  Without a clear plan and target state, project budgets are not easily aligned and disparate application of security across the enterprise and out of control costs are a natural consequence.  Executives need to be able to answer quickly these three questions:

  • Where are we currently as an organization against regulatory obligations, industry recognized standards and guidance, and our own organizational defined values (ODV)?
  • What strategy do we implement to ensure a consistent rollout of security at most efficient cost?
  • Does our organization have the right people, process, and technology to adequately prevent, detect, and respond to rapidly evolving cyber threats?

Cyber Vulnerability Assessments (CVA) – Scanning infrastructure components for vulnerabilities both known and unknown. Different types of scanners are available, and which one is best is determined during initial discussions between the customer and the people doing the assessment.  There are multiple types of vulnerability assessments that may be performed, using both passive and active techniques to ensure a solid balance between generating vulnerability information and limiting risk to production

  • System Scanning – where network gear is scanned (FWs, Servers, Endpoints, IoT devices, OT devices, etc).
  • Application Scanning – where applications running on the network are tested for specific types of well-known vulnerabilities. Typically, these would involve ports 80 and 443 but may involve other ports that the applications are known to be using.
    • SAST – Static Application Security Testing is performed while an application or system is not running. This means the code itself or firmware itself is thoroughly analyzed.
    • DAST – Dynamic Application Security Testing is performed while an application or system is running. The system is exercised, and weaknesses are noted.
    • IAST – Interactive Application Security Testing consists of some combination of SAST and DAST strategies.
  • ICS Protocol Assessment  – are OT  devices susceptible to harmful manipulation by using native ICS protocols launched from unauthorized locations?

Penetration Testing –  An extension to CVA, a classic penetration test may involve simply leveraging a vulnerability assessment. The list of results is then taken, each entry is tested to see how far into the network any respective vulnerability would permit an attacker to go.  Additionally, penetration tests may be performed against applications, firmware, chipsets, network cards, or other devices.  RTI penetration tests extend this basic concept to understand how and why OT environments may be compromised through three attacker profiles:

  •  External Attacker –  Attackers from the Internet with no prior system knowledge.  How do they gain insight, what can they learn, and what can they accomplish based on your attack surface?
  • Client Side Attack – How most attacks today initiate.  How susceptible are you to threats including social engineering, malware, rootkits, botnets, browser hijacking, or ransomware?
  • Insider Threat – Insider threats stretch even the best defenses.  How are your internal systems prepared to prevent, detect, and respond to insider threats?

Social Engineering – Social engineering assessments consist of several types.

  • Vishing – Where an assessor makes phone calls to the pre-determined list of targets and attempts to extract key information or access to the victims devices.
  • Phishing – Where an assessor emails a pre-determined list of targets and attempts to extract key information or get the victim to run an application.
  • Physical – Where a team of assessors physically attempt to enter a facility and gain access to a list of pre-determined targets or flags.

[/vc_column_text][/toggle][toggle color=”Accent-Color” title=”Mid Stream”][vc_column_text]A GAP Analysis is a description of what security controls are in place for any given framework(s) vs what controls are missing to either align fully to the framework(s) or to provide adequate security.  Both, aligning fully to a framework(s) and adequate security controls may both be moving targets.  This ‘moving targets’ concept implies that the gap may be under control ‘today’, but then increase again as changes are made to the infrastructure.

Two things need to be understood to adequately perform a GAP Analysis.

  1. The first thing is a thorough understanding of what information security frameworks the organization is trying to or is required to adhere too. This information may be supplied for review or our team may go out and discuss what the network engineers have been doing to address security to determine which frameworks may best fit the organization.
  2. The second is a thorough understanding of what information security controls are in place throughout the infrastructure. Many types of processes are available to help gather or produce this information.  In OT environments it may not be prudent to make connections to the network.  Thus, a walkdown approach is performed.  The infrastructure if visually reviewed with minimal hands on keyboard testing to verify what is being stated or has been stated by the infrastructure management team. In IT environments performing assessments may be appropriate.  This would exercise the controls in place and also validate their configurations, to validate proper functionality. functioning.

Once this information has been obtained, any controls in placed are documented against what the agreed upon frameworks controls lists are.  The gaps are then determined and documented. Further, the team performing the analysis will also provide feedback on what controls may be required that go above and beyond the framework GAP Analysis.

It is important to understand that frameworks are a ‘low level bar’ for compliance and security and are not always enough to adequately protection network and information traversing those networks.[/vc_column_text][/toggle][toggle color=”Accent-Color” title=”Down Stream”][vc_column_text]The Cybersecurity Capability Maturity Model (C2M2) program is a public-private partnership effort that was established to improve electricity sub-sector cybersecurity capabilities, and to understand the cybersecurity posture of the grid. The C2M2 helps organizations—regardless of size, type, or industry—evaluate, prioritize, and improve their own cybersecurity capabilities.

Implementation of or evaluation against an existing C2M2 Program will leverage three Cybersecurity Capability Maturity Models:

  • Cybersecurity Capability Maturity Model (C2M2) (Energy Sector)
  • Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)(Energy)
  • Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2)

Our team may assist in performing GAP Analysis Assessments against one or more of these capability and maturity models or assist with engineering and implementing a complete compliance program for your IT and or OT networks.[/vc_column_text][/toggle][/toggles][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_image=”6932″ bg_position=”left center” bg_repeat=”no-repeat” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”3%” bottom_padding=”3%” overlay_strength=”0.5″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][/vc_column][vc_column column_padding=”padding-3-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”right” column_border_width=”none” column_border_style=”solid”][vc_custom_heading text=”We’re ready to deploy your strategy.” font_container=”tag:h2|font_size:52|text_align:left|line_height:52px” use_theme_fonts=”yes”][vc_custom_heading text=”Contact us for a briefing of your facility’s needs.” font_container=”tag:p|font_size:18|text_align:left|color:%23ce1628|line_height:26px” use_theme_fonts=”yes” css=”.vc_custom_1572149277742{margin-top: 10px !important;margin-bottom: 10px !important;}”][vc_column_text]

832.493.1153
sales@redtridentinc.com    support@redtridentinc.com
904 Gemini Ave, Houston, TX 77058

[/vc_column_text][/vc_column][/vc_row]

Scroll to Top