Skip to content

Cyber Security: “A Marathon, Not a Sprint” – Permian Basin Oil and Gas Magazine

    By Paul Wiseman

    The great majority of successful hacks—for ransomware, spyware, information theft, or just plain chaos—come through human error. That is, someone opened a phishing email and entered a password or account number. But three oil and gas industry security experts said that, while education on that front is vital and ongoing, hackers are finding new ways to slip sideways into back doors and cracks. And artificial intelligence (AI) is expanding the ability of phishing campaigns to look more real than ever.

    Michael Kosonog

    The experts are: Michael Kosonog, Deloitte’s U.S. cybersecurity lead for energy resources and industrials; Leo Simonovich, V.P. and global head of industrial cyber and digital security at Siemens Energy; and Jason Christopher, certified instructor and director of cyber risk for Dragos. Christopher also teaches cyber security classes for SANS, a cybersecurity education company.

    All agreed that because hackers never sleep, neither can security firms and teams—nor can any individual who has access to their company’s network at any level. That includes both the obvious—information technology (IT, the back office such as accounting)—and the less obvious—operational technology (OT, machine sensors and edge computers that send data back to the office).

    That’s because the digital revolution is connecting the two formerly disparate elements, as companies increasingly want real-time data from the field, delivered through wireless networks. Kosonog pointed out that most OT and SCADA systems are based on older technology, “where security wasn’t planned into it. They create this extra attack surface, with more devices and more systems, where threat actors can get in.”

    Leo Simonovich

    In SCADA’s early days, pumpers would travel to a site and download data onto a thumb drive or a laptop, then deliver that to the office for uploading. There was an air gap with no remote attack point. While a threat actor could theoretically go to each site and steal some data, they could not use such a point to access the larger network, making that a very inefficient and mostly pointless process.

    Today’s oil field—upstream, midstream, and downstream—uses wireless technology to give personnel real-time data and control. That’s all great if it’s secure. Added Simonovich, “Operational technology is the new risk frontier. It is now on par with safety as a top concern for oil and gas companies’ boards and CEOs and for Chief Information Security officers, who have to work with the business to figure out how to address the topic.”

    Kosonog listed four main categories of threats in the sector: ransomware, phishing, systems, and supply chain attacks. “Think SolarWind—where a piece of software allows a threat to get into multiple, multiple systems,” he said.

    The supply chain risk is one of the surprising but growing threats. Tulsa-based SolarWinds provides system management tools for monitoring networks and infrastructure—and it has thousands of clients, including the U.S. government. In late 2020, international hackers infiltrated its Orion software, allowing them to spread malware to many of those thousands of users. All of that was accomplished through a single hack.

    Simonovich suggested oil and gas firms should take a threefold approach to dealing with supply chain hacks.

    “First, think about having a dedicated OT program that you measure yourself against—something that tells you how well you’re doing. Second, put together a joint response plan with your OEM (original equipment manufacturer—the supplier).” He noted that smaller suppliers are the most likely to get hacked, because they often lack the resources to have robust cyber security systems themselves.

    Third, he said, companies need a clear response plan for when something does happen because, even with extreme diligence, it only takes one hack to create havoc.

    To that point, Simonovich said Siemens Energy had polled oil and gas operators about security issues and found a disturbing fact. “What we see is that the majority of the oil and gas entities that we surveyed had at least one major operational event that led to a shutdown or a safety issue.”

    While that is far from encouraging, Simonovich pointed out that a successful hack does not need to be the end of the world. Resiliency, he said, is the key. It is “both about the speed to detect, and the speed to recover and get back up. Can you handle the volume of threats that are coming your way? Ultimately, do you have a plan for when a breach occurs? It’s not enough to monitor, you have to build contingency plans to be able to recover, as well.”

    Diligence never ends, he warned. Companies must continue working jointly with suppliers to mature their programs. “Innovation is really key: building a roadmap, one that has visibility at the core. Then,” he added, “the main thing is “seeing it as a marathon, not a sprint.”

     

    Safety Dance

    Jason Christopher

    Hackers specifically attacking safety systems began in 2017 with a limited attack from hackers known as XENOTIME. That year their Trisis/Triton software compromised safety systems in Saudi Arabia, said Dragos’ Christopher. Trisis/Triton attacked safety instrumented systems (SIS) in Saudi Arabia, specifically the Schneider Triconex SIS. While Schneider caught and stopped the attack with only a temporary shutdown of safety operations, the fact that hackers managed to get deep into the system before being caught was unsettling to the company and to safety managers at large. Christopher said that these are “things that are more concerning from an operational perspective than just ransomware.”

    Simonovich said that “digital safety” is a common term that refers strictly to digital issues. But with new attacks, the lines between digital and safety are becoming blurred.

    In oil and gas, cybersecurity in ICS is also about safety, Christopher explained, even if the attack does not specifically attack safety operations. “If I don’t have a cyber-secure system, do I really have a safe system?  We now have demonstration that hackers are going after safety systems. And if I don’t have the right level of security—nobody wants to go to a site where they know they’re not going to be safe, and that’s really the thing we need to understand from a cultural perspective.”

     

    Off the Shelf and AI Hackers’ Assistance

    Like an Amazon for hackers, said Kosonog, “There are ransomware-as-a-service sites where these threat actors and cyber criminals pay a monthly charge to get a service to launch ransomware attacks on targets that they want.”

    That anyone can start hacking as almost a hobby, with little training, is one thing. But another threat, AI, is looming even bigger. You may have heard of Chat-GPT, a virtual writer service that uses AI to write emails, sales materials, and other things. It’s considered bad news for some writers but not for many others.

    Now, think of a system like that, accessing massive amounts of data from the web, assembling strategies for realistic-looking phishing campaigns. Kosonog continued, “There’s been a lot of discussion lately around AI. The real next layer around some of the phishing is leveraging more and more of the newer Chat-GPT’s generative AI solutions for the threat actors, and continuing to create more and more realistic phishing attacks. With some of this AI we’ve been talking about in the last few years, we’re beginning to see the threat actors using it to further the realistic nature of some of these campaigns. For us it’s more to think about on a daily basis.”

     

    Prevention

    As stated, there is no way to ensure complete safety. But human instruction, along with systems designs that include safety measures, are becoming more and more critical. Training workers to recognize and avoid phishing emails would be an obvious first step, as it’s one of the main sources of hacks.

    Kosonog said, “A lot of times it really comes back to making sure your organization is educated—not opening, not clicking on emails you don’t know where they come from, having a programmer on your security awareness team, where the human side…. that needs to be one of the most basic things that we do. Along with that, making sure that you’re looking for vulnerabilities in your systems, that you’re monitoring for threats in both your IT and OT environments—basic hygiene. Training for things that don’t look right—a copyright that’s a year off, a company logo that doesn’t quite look like the logo. It starts off with not knowing who this is.”

    He also suggested companies conduct phishing campaigns internally to test their people’s responses. Would they click on a link? If so, it’s time to retrain.

    Simonovich pointed out how safety issues vary. “The difference between physical safety and digital safety is that with physical safety you can box the environment [with occasional exceptions for weather or unexpected outside forces]. In the digital safety world, it’s threatened by machines all the time. They’re constantly looking for new techniques to get in. Digital safety is about continuous training and vigilance.”

    For Christopher, more formal training, even certification for IT professionals, would go a long way toward securing systems. “One of the things we do recommend is that there is some sort of security training before you grant that employee access to your system.”

    The kind of training depends on where the person will be working. On the rig or at the refinery, training is different than in the office. “I would more want the person that’s on the rig or at the refinery to understand how an attacker may target them and go after safety systems or after production systems, topics that don’t normally come top-of-mind now,” Christopher said.

    And for IT professionals, he noted that certification does exist for cyber security. The Global Information Assurance Certification (GIAC) organization offers that option, and SANS trains in achieving it.

    On the systems side, said Christopher, “If we’re just enabling features, but you’re not putting in the security controls, to make sure that the bad guys can’t also have access, that can lead to some catastrophic scenarios. Those are the types of things folks need to have at the forefront of any upgrade decision or digital transformation decision. It’s not either-or, it’s what I would call a yes-and.”

    Older systems were more trusting of who they were working with. He continued, “Most systems were designed thinking a trained, knowledgeable engineer was operating it. If it’s told to reverse flow, it will do that even if it breaks the system because it trusts the input. Non-accessible fail-safes, such as a valve that releases when overpressured, which only works manually—that’s part of your cybersecurity priorities.”

    Christopher noted that SANS has issued a white paper (find it here: https://sansorg.egnyte.com/dl/4hgxqaIF7N) entitled, “The Five ICS Cybersecurity Critical Controls.” Those five are:

    • ICS INCIDENT RESPONSE: Operations-informed IR plan with focused system integrity and  recovery capabilities during an attack. Exercises designed to reinforce risk scenarios and use cases tailored to the ICS environment
    • DEFENSIBLE ARCHITECTURE: Architectures that support visibility, log collection, asset identification, segmentation, industrial DMZs, process-communication enforcement
    • ICS NETWORK VISIBILITY MONITORING: Continuous network security monitoring of the ICS environment with protocol-aware toolsets and system of systems interaction analysis capabilities used to inform operations of potential risks to control
    • SECURE REMOTE ACCESS: Identification and inventory of all remote access points and allowed destination environments, on-demand access and MFA where possible, jump host environments to provide control and monitor points within secure segment
    • RISK-BASED VULNERABILITY MANAGEMENT: Understanding of cyber digital controls in place and device operating conditions that aid in risk-based vulnerability management decisions to patch for the vulnerability, mitigate the impact, or monitor for possible exploitation

    In sum, said Simonovich, “This should be a top issue that we focus on. It should not just be treated as a cost. It should be treated as a strategic imperative that enables digitalization, and that enables companies to get more competitive.”

    #bwg_container1_0 { display: table; /*visibility: hidden;*/ } #bwg_container1_0 * { -moz-user-select: none; -khtml-user-select: none; -webkit-user-select: none; -ms-user-select: none; user-select: none; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_image_wrap_0 { background-color: #000000; width: 800px; height: 500px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_image_0 { max-width: 800px; max-height: 410px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_embed_0 { width: 800px; height: 410px; } #bwg_container1_0 #bwg_container2_0 #bwg_slideshow_play_pause_0 { background: transparent url(“http://pboilandgasmagazine.com/wp-content/plugins/photo-gallery/images/blank.gif”) repeat scroll 0 0; } #bwg_container1_0 #bwg_container2_0 #bwg_slideshow_play_pause-ico_0 { color: #FFFFFF; font-size: 60px; } #bwg_container1_0 #bwg_container2_0 #bwg_slideshow_play_pause-ico_0:hover { color: #CCCCCC; } #bwg_container1_0 #bwg_container2_0 #spider_slideshow_left_0, #bwg_container1_0 #bwg_container2_0 #spider_slideshow_right_0 { background: transparent url(“http://pboilandgasmagazine.com/wp-content/plugins/photo-gallery/images/blank.gif”) repeat scroll 0 0; } #bwg_container1_0 #bwg_container2_0 #spider_slideshow_left-ico_0, #bwg_container1_0 #bwg_container2_0 #spider_slideshow_right-ico_0 { background-color: #000000; border-radius: 20px; border: 0px none #FFFFFF; box-shadow: 0px 0px 0px #000000; color: #FFFFFF; height: 40px; font-size: 20px; width: 40px; opacity: 1.00; } #bwg_container1_0 #bwg_container2_0 #spider_slideshow_left-ico_0:hover, #bwg_container1_0 #bwg_container2_0 #spider_slideshow_right-ico_0:hover { color: #CCCCCC; } #spider_slideshow_left-ico_0{ left: -9999px; } #spider_slideshow_right-ico_0{ left: -9999px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_image_container_0 { top: 90px; width: 800px; height: 500px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_container_0 { display: table; height: 90px; width: 800px; top: 0; } /* Filmstrip dimension */ #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_0 { left: 20px; width: 760px; /*z-index: 10106;*/ } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_thumbnails_0 { left: 0px; width: 109928px; height: 90px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_thumbnail_0 { width: 180px; height: 90px; margin: 0 1px; border: 1px solid #000000; border-radius: 0; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_thumb_active_0 { border: 0px solid #FFFFFF; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_thumb_deactive_0 { opacity: 0.80; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_0, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_disabled_0 { background-color: #3B3B3B; display: table-cell; width: 20px; left: 0; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_right_0, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_right_disabled_0 { background-color: #3B3B3B; display: table-cell; right: 0; width: 20px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_0 i, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_right_0 i, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_disabled_0 i, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_right_disabled_0 i { color: #FFFFFF; font-size: 20px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_0 { display: none; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_disabled_0, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_right_disabled_0 { display: none; opacity: 0.3; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_filmstrip_left_disabled_0 { display: table-cell; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_watermark_spun_0 { text-align: left; vertical-align: bottom; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_title_spun_0 { text-align: right; vertical-align: top; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_description_spun_0 { text-align: right; vertical-align: bottom; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_watermark_image_0 { max-height: 90px; max-width: 90px; opacity: 0.30; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_watermark_text_0, #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_watermark_text_0:hover { text-decoration: none; margin: 4px; position: relative; z-index: 15; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_title_text_0 { font-size: 16px; font-family: segoe ui; color: #FFFFFF !important; opacity: 0.70; border-radius: 5px; background-color: #000000; padding: 0 0 0 0; margin: 5px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_description_text_0 { font-size: 14px; font-family: segoe ui; color: #FFFFFF !important; opacity: 0.70; border-radius: 0; background-color: #000000; padding: 5px 10px 5px 10px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_description_text_0 * { text-decoration: none; color: #FFFFFF !important; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_dots_0 { width: 12px; height: 12px; border-radius: 5px; background: #F2D22E; margin: 3px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_dots_container_0 { width: 800px; top: 0; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_dots_thumbnails_0 { height: 18px; width: 10872px; } #bwg_container1_0 #bwg_container2_0 .bwg_slideshow_dots_active_0 { background: #FFFFFF; border: 1px solid #000000; }

    DSC 0012
    DSC 0014
    DSC 0013
    DSC 0010
    DSC 0007
    DSC 0030
    DSC 0032
    DSC 0033
    DSC 0039
    DSC 0034
    DSC 0038
    DSC 0041
    DSC 0042
    DSC 0044
    DSC 0045
    DSC 0047
    DSC 0048
    DSC 0050
    DSC 0053
    DSC 0051
    DSC 0057
    DSC 0055
    DSC 0059
    DSC 0067
    DSC 0068
    DSC 0072
    DSC 0081
    DSC 0082
    DSC 0088
    DSC 0084
    DSC 0090
    DSC 0106
    DSC 0107
    DSC 0109
    DSC 0110
    DSC 0113
    AI Feature1
    DSC 0114
    AI Feature 2
    DSC 0111
    AI Feature 3
    DSC 0120
    AI Feature 4
    DSC 0117
    DSC 0123
    thumb DSC 0231 1024
    undefined
    PBPA2018final-45
    IMG_7466
    747h
    12PBPAMeetingphotos20192-79tommyTaylor
    1NationalPhilanthropyDayLuncheonPic_33
    4PBWIECpicDrewDarby20200220_PBWIEC-Day2_42
    20200729 DoubleEagle-POTUS 146
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 1
    To Infinity  Beyond (32)
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 088
    IMG 1810
    PBPA President Ben Shepperd confers the award on recipient Autry Stephens.
    05
    Top Hand Banquet 2023-05
    PBWEIC
    20230417 PBAP Golf occ 032A
    DSC 0251
    2016-SANS-DC-251
    thumb DSC 0233 1024
    undefined
    PBPA2018final-6
    239
    781a-3
    12PBPAMeetingphotos20192-107
    1NationalPhilanthropyDayLuncheonPic_36
    20200218_PBWIECnetworking_03
    20200729 DoubleEagle-POTUS 114
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 2
    IMG 1629
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 063
    IMG 1811
    Ben Shepperd and Autry Stephens
    20221201030557025 0001
    Top Hand Banquet 2023-02
    5FeaturePbwiec_012
    20230417 PBAP Golf occ 007A
    DSC 0252
    RGP9881 print
    thumb DSC 0232 1024
    undefined
    PBPA2018final-5
    2017-1
    IMG_1411
    12PBPAMeetingphotos20192-72fourAtTable
    1NationalPhilanthropyDayLuncheonPic_43
    20200218_PBWIECnetworking_10
    20200729 DoubleEagle-POTUS 133
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 3
    DSC 4097
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 112
    IMG 1813
    Autry Stephens, Lyndal Stephens Greth, and Rich Greth
    20221201030235533 0001
    Top Hand Banquet 2023-04
    PBWEC
    20230417 PBAP Golf occ 001A
    DSC 0262
    2016-SANS-DC-329
    thumb DSC 0235 1024
    undefined
    PBPA2018final-4
    2018-1
    678b
    12PBPAMeetingphotos20192-104panel
    1NationalPhilanthropyDayLuncheonPic_47
    20200219_PBWIEC-Day1_08
    20200729 DoubleEagle-POTUS 138
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 4
    SummerRecap3
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 023
    IMG 1815
    Chuck Meloy and Autry Stephens
    03
    Top Hand Banquet 2023-03
    PBWEC
    20230417 PBAP Golf occ 041A
    DSC 0257
    RGP5485 print
    thumb DSC 0234 1024
    undefined
    PBPA2018final-3
    IMG_2704
    601b
    12PBPAMeetingphotos20192-69
    1NationalPhilanthropyDayLuncheonPictorialPicClaytonModesta_23
    20200219_PBWIEC-Day1_39
    20200729 DoubleEagle-POTUS 118
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 5
    IMG 0611
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 119
    IMG 1816
    20221201031333588 0001
    Top Hand Banquet 2023-01
    PBWEC
    20230417 PBAP Golf occ 010A
    DSC 0250
    Peter-Szczepankiewicz-Final-Classroom-2
    thumb DSC 0064 1024
    undefined
    PBPA2018final-94
    4003
    StandardSkim
    12PBPAMeetingphotos20192-85laterPanel
    1NationalPhilanthropyDayLuncheonPic_28
    20200219_PBWIEC-Day1_42
    20200729 DoubleEagle-POTUS 6
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 6
    IMG 0518
    IMG 1819
    Mike Short, Autry Stephens, and Damon Button
    06
    Top Hand Banquet 2023-07
    PBWEC
    20230417 PBAP Golf occ 056A
    DSC 0281
    Sans SEC487-HoffmanMicah-LomasJeffrey-JYK3634.print
    thumb DSC 0063 1024
    undefined
    PBPA2018final-92
    2016
    trailers
    12PBPAMeetingphotos20192-83
    20200219_PBWIEC-Day1_60
    20200729 DoubleEagle-POTUS 108
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 7
    IMG 2801
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 018
    IMG 1821
    Dusty Hicks, Autry Stephens, and Dana Chandler
    20221201031355140 0001
    Top Hand Banquet 2023-06
    PBWEIC
    20230417 PBAP Golf occ 065A
    DSC 0298
    Sans.SEC460.ToussainMatthew.JYK2185.print
    thumb DSC 0067 1024
    undefined
    PBPA2018final-91
    2004
    IMG_0665
    12PBPAMeetingphotos20192-81sustainabilityPanelIthink
    20200219_PBWIEC-Day1_61
    20200729 DoubleEagle-POTUS 100
    Bedrock CaseStudy FrackingWater 200911(EN)Web Page 8
    Picture1
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 114
    Stephens, third from left, is joined by staff members of the PBPA: Scott Kidwell, Ben Shepperd, Jamie Ramirez, Michael Lozano, and Stephen Robertson.
    20221201030749132 0001
    Top Hand Banquet 2023-11
    PBWEIC
    20230417 PBAP Golf occ 072A
    DSC 0326
    thumb DSC 0066 1024
    undefined
    PBPA2018final-90
    494
    12PBPAMeetingphotos20192-70dontKnowName
    20200219_PBWIEC-Day1_68
    20200729 DoubleEagle-POTUS 5
    Picture2
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 021
    20221201031513139 0001
    Top Hand Banquet 2023-10
    PBWEC
    20230417 PBAP Golf occ 094A
    DSC 0347
    thumb DSC 0065 1024
    undefined
    PBPA2018final-88
    realestate
    12PBPAMeetingphotos20192-66markMills
    20200219_PBWIEC-Day1_71
    20200729 DoubleEagle-POTUS 86
    Picture4
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 068
    20221201031937239 0001
    Top Hand Banquet 2023-09
    PBWEC
    20230417 PBAP Golf occ 111A
    DSC 0355
    thumb DSC 0068 1024
    undefined
    PBPA2018final-80
    493
    12PBPAMeetingphotos20192-49kylesPanel
    20200219_PBWIEC-Day1_75
    20200729 DoubleEagle-POTUS 84
    Picture3
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 056
    20221201032049199 0001
    Top Hand Banquet 2023-08
    20230417 PBAP Golf occ 120A
    DSC 0359
    thumb DSC 0069 1024
    undefined
    PBPA2018final-79
    IMG_1317
    12PBPAMeetingphotos20192-65markMills
    20200219_PBWIEC-Day1-Dinner_03
    20200729 DoubleEagle-POTUS 68
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 122
    20221201032403876 0001
    dBI5 WOo
    20230417 PBAP Golf occ 003A
    DSC 0383
    thumb DSC 0070 1024
    undefined
    PBPA2018final-78
    IMG_1352
    12PBPAMeetingphotos20192-11
    20200219_PBWIEC-Day1-Dinner_13
    20200729 DoubleEagle-POTUS 8
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 021
    20221201032449523 0001-2
    I0bxAAEk
    20230417 PBAP Golf occ 043A
    DSC 0402
    thumb DSC 0072 1024
    DSC 0166
    PBPA2018final-66
    824
    12PBPAMeetingphotos20192-37kylesPanel
    20200219_PBWIEC-Day1-Dinner_20
    20200729 DoubleEagle-POTUS 1
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 132
    20221201032624939 0001
    image001
    20230417 PBAP Golf occ 024A
    DSC 0423
    thumb DSC 0071 1024
    DSC 0164-e1542399862995
    PBPA2018final-63
    12PBPAMeetingphotos20192-36kylePanel
    20200220_PBWIEC-Day2_07
    20200729 DoubleEagle-POTUS 30
    20221201032730338 0001
    image006
    20230417 PBAP Golf occ 009A
    DSC 0437
    thumb DSC 0074 1024
    DSC 0160
    PBPA2018final-62
    12PBPAMeetingphotos20192-38
    20200220_PBWIEC-Day2_11
    20200729 DoubleEagle-POTUS 20
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 024
    20221201032757333 0001
    image004
    20230417 PBAP Golf occ 020A
    DSC 0476
    thumb DSC 0075 1024
    DSC 0157
    PBPA2018final-55
    12PBPAMeetingphotos20192-54
    20200220_PBWIEC-Day2_13
    20200729 DoubleEagle-POTUS 10
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 014
    20221201033119721 0001
    image005
    20230417 PBAP Golf occ 045A
    DSC 0486
    thumb DSC 0073 1024
    DSC 0156
    PBPA2018final-50
    12PBPAMeetingphotos20192-55JimNewmanPlus
    20200220_PBWIEC-Day2_23
    20200729 DoubleEagle-POTUS 76
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 054
    IMG 3826
    20230417 PBAP Golf occ 060A
    DSC 0487
    thumb DSC 0077 1024
    DSC 0155
    PBPA2018final-49
    12PBPAannualMeetingPicBensPanelLegislative
    20200220_PBWIEC-Day2_47
    20200729 DoubleEagle-POTUS 3-crop
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 029
    20230417 PBAP Golf occ 085A
    thumb DSC 0076 1024
    DSC 0153
    PBPA2018final-46
    12PBPAMeetingphotos20192-26wayneChristianAndOthers
    20200220_PBWIEC-Day2_48
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 047
    20230417 PBAP Golf occ 088A
    thumb DSC 0078 1024
    DSC 0152
    PBPA2018final-45 (1)
    12PBPAMeetingphotos20192-60kidwell
    20200220_PBWIEC-Day2_49
    11CommunityPic20200918 SkyHighForKidsMidlandBanquet 147
    20230417 PBAP Golf occ 105A
    thumb DSC 0080 1024
    DSC 0150
    PBPA2018final-43
    20200221_PBWIEC-Day3_08
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 034
    IMG 1123
    thumb DSC 0079 1024
    DSC 0149
    PBPA2018final-40
    20200221_PBWIEC-Day3_14
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 069
    IMG 1129
    thumb DSC 0081 1024
    DSC 0148
    PBPA2018final-39
    20200221_PBWIEC-Day3_17
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 062
    IMG 1131
    thumb DSC 0082 1024
    DSC 0145
    PBPA2018final-36
    thumb DSC 0236 1024
    DSC 0142-e1542399884715
    PBPA2018final-35
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 028
    thumb DSC 0083 1024
    DSC 0141
    PBPA2018final-31
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 061
    thumb DSC 0085 1024
    DSC 0139
    PBPA2018final-30
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 063
    thumb DSC 0084 1024
    DSC 0138
    PBPA2018final-29
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 064
    thumb DSC 0086 1024
    DSC 0137
    PBPA2018final-22
    11CommunityPic20200919 SkyHighForKidsMidlandClayShoot 041
    thumb DSC 0087 1024
    DSC 0135
    PBPA2018final-19
    thumb DSC 0091 1024
    DSC 0133
    PBPA2018final-18
    thumb DSC 0092 1024
    DSC 0132
    PBPA2018final-16
    thumb DSC 0090 1024
    DSC 0129
    PBPA2018final-12
    thumb DSC 0094 1024
    DSC 0128
    thumb DSC 0095 1024
    DSC 0126
    thumb DSC 0096 1024
    DSC 0084-e1542399904932
    thumb DSC 0099 1024
    DSC 0082-e1542399919393
    thumb DSC 0100 1024
    DSC 0077
    thumb DSC 0104 1024
    DSC 0076
    thumb DSC 0097 1024
    DSC 0075-e1542399940183
    thumb DSC 0098 1024
    DSC 0074
    thumb DSC 0105 1024
    DSC 0192 (1)
    thumb DSC 0106 1024
    DSC 0190 (1)
    thumb DSC 0108 1024
    DSC 0187 (1)
    thumb DSC 0112 1024
    DSC 0184 (1)
    thumb DSC 0111 1024
    DSC 0182 (1)
    thumb DSC 0114 1024
    DSC 0180-1 (1)
    thumb DSC 0115 1024
    DSC 0179-1 (1)
    thumb DSC 0119 1024
    DSC 0177 (1)
    thumb DSC 0120 1024
    DSC 0173 (1)
    thumb DSC 0116 1024
    DSC 0171 (1)
    thumb DSC 0117 1024
    DSC 0170 (1)
    thumb DSC 0121 1024
    DSC 0169 (1)
    thumb DSC 0122 1024
    DSC 0168 (1)
    thumb DSC 0123 1024
    DSC 0166 (1)
    thumb DSC 0130 1024
    DSC 0164-e1542399862995 (1)
    thumb DSC 0127 1024
    DSC 0160 (1)
    thumb DSC 0125 1024
    DSC 0157 (1)
    thumb DSC 0124 1024
    DSC 0156 (1)
    thumb DSC 0132 1024
    DSC 0155 (1)
    thumb DSC 0131 1024
    DSC 0153 (1)
    thumb DSC 0135 1024
    DSC 0152 (1)
    thumb DSC 0133 1024
    DSC 0150 (1)
    thumb DSC 0137 1024
    DSC 0149 (1)
    thumb DSC 0139 1024
    DSC 0148 (1)
    thumb DSC 0140 1024
    DSC 0145 (1)
    thumb DSC 0136 1024
    DSC 0142-e1542399884715 (1)
    thumb DSC 0141 1024
    DSC 0141 (1)
    thumb DSC 0145 1024
    DSC 0139 (1)
    thumb DSC 0149 1024
    thumb DSC 0148 1024
    thumb DSC 0142 1024
    thumb DSC 0150 1024
    thumb DSC 0151 1024
    thumb DSC 0152 1024
    thumb DSC 0154 1024
    thumb DSC 0155 1024
    thumb DSC 0153 1024
    thumb DSC 0156 1024
    thumb DSC 0158 1024
    thumb DSC 0159 1024
    thumb DSC 0160 1024
    thumb DSC 0162 1024
    thumb DSC 0167 1024
    thumb DSC 0166 1024
    thumb DSC 0161 1024
    thumb DSC 0163 1024
    thumb DSC 0168 1024
    thumb DSC 0170 1024
    thumb DSC 0171 1024
    thumb DSC 0169 1024
    thumb DSC 0157 1024
    thumb DSC 0173 1024
    thumb DSC 0172 1024
    thumb DSC 0174 1024
    thumb DSC 0176 1024
    thumb DSC 0175 1024
    thumb DSC 0178 1024
    thumb DSC 0177 1024
    thumb DSC 0180 1024
    thumb DSC 0179 1024
    thumb DSC 0182 1024
    thumb DSC 0181 1024
    thumb DSC 0183 1024
    thumb DSC 0186 1024
    thumb DSC 0185 1024
    thumb DSC 0184 1024
    thumb DSC 0187 1024
    thumb DSC 0190 1024
    thumb DSC 0188 1024
    thumb DSC 0191 1024
    thumb DSC 0189 1024
    thumb DSC 0192 1024
    thumb DSC 0194 1024
    thumb DSC 0193 1024
    thumb DSC 0196 1024
    thumb DSC 0195 1024
    thumb DSC 0199 1024
    thumb DSC 0200 1024
    thumb DSC 0201 1024
    thumb DSC 0202 1024
    thumb DSC 0203 1024
    thumb DSC 0204 1024
    thumb DSC 0205 1024
    thumb DSC 0207 1024
    thumb DSC 0208 1024
    thumb DSC 0211 1024
    thumb DSC 0210 1024
    thumb DSC 0212 1024
    thumb DSC 0209 1024
    thumb DSC 0214 1024
    thumb DSC 0215 1024
    thumb DSC 0213 1024
    thumb DSC 0216 1024
    thumb DSC 0217 1024
    thumb DSC 0218 1024
    thumb DSC 0220 1024
    thumb DSC 0219 1024
    thumb DSC 0224 1024
    thumb DSC 0223 1024
    thumb DSC 0222 1024
    thumb DSC 0225 1024
    thumb DSC 0227 1024
    thumb DSC 0226 1024
    thumb DSC 0230 1024
    thumb DSC 0228 1024
    thumb DSC 0229 1024

    DSC 0012

    Cyber Security: “A Marathon, Not a Sprint” appeared first on Permian Basin Oil and Gas Magazine.

    https://pboilandgasmagazine.com/cyber-security-a-marathon-not-a-sprint/”>

    #Cyber #Security #Marathon #Sprint #Permian #Basin #Oil #Gas #Magazine