Comprehensive ICS Security for Oil and Gas Operations

In 2017, ICS-tailored malware, TRISIS, targeted a Middle Eastern oil and gas facility’s safety instrumented systems–becoming the first ever to specifically target human lives and representing a significant shift in ICS malware capabilities. 

Dragos was on the frontlines of the TRISIS attack and has been for every significant industrial cybersecurity attack globally. Our team’s 200+ years of experience hunting and responding to industrial attacks is codified throughout the Dragos Platform technology, so we can arm you to combat even the most sophisticated industrial adversaries and protect the world’s most critical infrastructure. 

Comprehensively Protect Upstream, Midstream, and Downstream Operations

As threats to oil and gas operations become more frequent and sophisticated, Dragos arms defenders with the comprehensive ICS cybersecurity technology needed to visualize, detect, and respond to industrial adversaries 

HEXANE: The Latest Threat to Oil and Gas

HEXANE is the latest threat activity group discovered to specifically target oil and gas organizations. Learn more about its specific tactics, techniques, and procedures, and how Dragos WorldView helps you stay ahead of the threats it poses to your ICS

Assessing Global Risks to Oil and Gas

Read our latest threat insight report to learn about the increasing threats to oil and gas organizations, how to assess risk to your ICS, and recommendations for improving defenses 

Prevent Significant Breaches with Proactive Defenses

Dragos’ ICS security services helps oil and gas organizations prepare for and respond to significant threats–no matter where you’re at in your ICS journey–with assessments, threat hunting, penetration testing, tabletop exercises, incident response, and training

Proactive ICS Security Services

Assessments

Identify vulnerabilities in your ICS devices, applications, or networks

Penetration Testing

Learn how attackers move through ICS networks by leveraging real-world adversary tactics, techniques, and procedures 

Threat Hunting

Find undiscovered threats in your ICS networks and identify weaknesses in architecture, security controls, and policies

ICS Training

Learn actionable ICS skills in our 5-day ICS cybersecurity course: Assessing, Hunting, and Monitoring ICS Networks

Responsive ICS Security Services

Rapid Incident Response

Stabilize your ICS networks with rapid onsite and offsite incident response support

Incident Response Retainer

Reinforce your response strategy with various retainer options with specific response time SLA commitments

Tabletop Exercise

Learn how an attacker would move through your ICS environment with a customized, consequence and intelligence-driven scenario 

Oil and Gas Resources

Dragos Oil and Gas Threat Perspective Summary

Dragos Oil and Gas Threat Perspective Summary

Threat Proliferation in ICS Cybersecurity: XENOTIME Now Targeting Electric Sector, in Addition to Oil and Gas

Threat Proliferation in ICS Cybersecurity: XENOTIME Now Targeting Electric Sector, in Addition to Oil and Gas

TRISIS Takeaways: Defensive Techniques and Trench-Building for the Blue Team

TRISIS Takeaways: Defensive Techniques and Trench-Building for the Blue Team

Evolution of ICS Attacks and the Prospects for Future Disruptive Events

Evolution of ICS Attacks and the Prospects for Future Disruptive Events

Detecting and Responding to ICS Threats With the Dragos Platform

Detecting and Responding to ICS Threats With the Dragos Platform

Analyzing TRISIS

Analyzing TRISIS

XENOTIME & SIS

XENOTIME & SIS

Analyzing and Understanding Trisis

Analyzing and Understanding Trisis

TRISIS: Analyzing Safety System Targeting Malware

TRISIS: Analyzing Safety System Targeting Malware

Contact Us for a Demo