{"id":17717,"date":"2021-11-09T14:00:03","date_gmt":"2021-11-09T17:00:03","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=17717"},"modified":"2021-11-09T13:38:03","modified_gmt":"2021-11-09T16:38:03","slug":"definitive-guide-to-cybersecurity-for-the-oil-gas-industry","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/definitive-guide-to-cybersecurity-for-the-oil-gas-industry\/","title":{"rendered":"Definitive Guide to Cybersecurity for the Oil &#038; Gas Industry"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-17718\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/11\/definitive-guide-to-cybersecurity-for-the-oil-gas-industry.jpg\" alt=\"Definitive Guide to Cybersecurity for the Oil &amp; Gas Industry\" width=\"145\" height=\"188\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/11\/definitive-guide-to-cybersecurity-for-the-oil-gas-industry.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/11\/definitive-guide-to-cybersecurity-for-the-oil-gas-industry-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Leidos<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Energy specialist and former CIA Director James Woolsey famously proclaimed that Americans aren\u2019t addicted to oil, \u201cbut their cars are.\u201d This pithy assessment underscores the modern world\u2019s dependence on oil and illustrates why the industry\u2019s security is critical to the security of every nation. From military aggression to cyber threats, the oil and gas sector is a high-profile target for adversaries intent on disrupting production, intercepting sensitive data, and crippling national and global economies.<br \/>\nPast attacks against this industry have proved the value of risk management and riskbased security policies for stakeholders. As a critical infrastructure, the oil and gas industry faces additional risks beyond those in many organizations. In addition to the intellectual property that any company must protect in its corporate Risk Management Framework, threats to the oil and gas infrastructure also put at risk the physical wellbeing of people and the environment as well as the national security. Losing intellectual property through a security breach can damage a company\u2019s revenue stream, but the damage caused by a major industry disaster such as the Deepwater Horizon spill, or the blow-out of the Ixtoc I exploratory well in the Bay of Campeche on June 3, 1979, which resulted in the release of about 475,000 metric tons of oil to the waters of the Gulf of Mexico, endangers lives, local environments and even global economies.<br \/>\nExacerbating the challenges of securing its infrastructure, the industry faces the dangers of dealing with a combustible element in extreme conditions and often in remote locations. In addition to the difficulties of operating in harsh environments, complex socio-political events make the process of finding, transporting, refining and distributing oil and natural gas a high-risk endeavor.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2021\/11\/definitive-guide-to-cybersecurity-for-the-oil-gas-industry.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leidos R\u00e9sum\u00e9: Energy specialist and former CIA Director James Woolsey famously proclaimed that Americans aren\u2019t addicted to oil, \u201cbut their cars are.\u201d This pithy assessment underscores the modern world\u2019s dependence on oil and illustrates why the industry\u2019s security is critical to the security of every nation. From military aggression to cyber threats, the oil and gas sector is a high-profile target for adversaries intent on disrupting production, intercepting sensitive data,&hellip; <\/p>\n","protected":false},"author":3,"featured_media":17718,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,20,112],"tags":[],"class_list":["post-17717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-seguranca-da-informacao","category-download"],"views":150,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=17717"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17717\/revisions"}],"predecessor-version":[{"id":17719,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17717\/revisions\/17719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/17718"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=17717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=17717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=17717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}