E2B: Energy Industry Cybersecurity Threats In The Digital Age

Are energy companies taking cybersecurity seriously? Are they shifting focus to application security?

E2B host Daniel Litwin speaks with Dan Cornell, Chief Technology Officer of the Denim Group and Kent Landrum, Managing Director at Opportune LLP, to get answers to these questions and more.

Cornell begins by explaining cybersecurity challenges for the energy industry. “The energy sector is so diverse from a cybersecurity standpoint—different sizes, economics, and types of business. Many under invest in cybersecurity,” he says.

Cornell notes that many organizations are adopting important tactics like threat modeling, vulnerability scans, code analysis and software composition analysis. “Firms will be better off to be more programmatic than tactical in cybersecurity,” Cornell says. “The awareness around risk, especially in the software supply chain, is becoming greater because every organization consumes software.”

Cornell and Landrum also discuss different types of cybersecurity risks, with Cornell noting that cyber-attacks by nation-states actors are the most dangerous as opposed to the “hacktivist” variety because they have resources. Cornell and Landrum point to several high-profile cyber attacks have hit the energy industry in recent years—most notably being Saudi Aramco, the biggest OPEC exporter, being targeted by the “Shamoon” virus, which cripples computers by wiping their disks, in 2012 and 2017. “Aramco was a wake-up call for the [energy] industry,” Landrum says.

The attack on Ukraine’s power grid in December 2015 is also startling, according to Landrum. This well-coordinated cyber incident took 30 substations offline and put 230,000 people in the dark for hours. “The Ukraine example is one of the first cases where we saw the progression from the enterprise or the corporate side of IT over into operations technology,” Landrum says.

Cornell speaks about digital transformation and its opportunities and challenges. “Companies are adopting more technology faster and a DevOps culture where they break down the silos between development and operations teams, which is good, but there are application security implications,” he says. “It’s really more of a cultural change than anything.”

Meanwhile, Landrum says he continues to see many energy firms use legacy enterprise resource planning (ERP) and energy trading and risk management (ETRM) systems that run on outdated versions of commercially available applications, which can open up cyber vulnerabilities and hinder technical advancements . “The consequence of that is it essentially traps the IT department and prevents them from being able to upgrade and patch those components to close known security vulnerabilities,” he says.

In summary, Landrum and Cornell agreed that updating or “modernizing” legacy energy enterprise applications like ERP and/or ETRM systems can go a long way in reducing a system’s attack surface and ensuring energy companies become a harder target for malicious cyber threat actors.

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

technology
Clarity Under Pressure: Technology, Trust, and the Future of Public Safety
February 7, 2026

When something goes wrong in a community—a major storm, a large-scale accident, a violent incident—there’s often a narrow window where clarity matters most. Leaders must make fast decisions, responders need to trust the information in front of them, and the systems supporting those choices have to work as intended. Public safety agencies now rely…

Read More
weather Intelligence
Clarity in the Storm: Weather Intelligence, GIS, and the Future of Operational Awareness
February 6, 2026

For many organizations today, weather has shifted from an occasional disruption to a constant planning factor. Scientific assessments show that extreme weather events—including heatwaves, heavy rainfall, and wildfires—are occurring more frequently and with greater intensity, placing growing strain on infrastructure, utilities, and public services. As weather-related disruptions become more costly and harder to manage,…

Read More
AI in sterile processing
AI in Sterile Processing Is Proving Its Value by Acting as a Co-Pilot, Not a Replacement
February 5, 2026

Sterile processing departments are dealing with persistent operational pressures. Surgical case volumes are rising, instruments are more complex, and staffing shortages remain across many health systems. Accuracy and documentation requirements continue to tighten, leaving little room for error. In busy hospitals, sterile processing teams may handle 10,000 to 30,000 surgical instruments per day, with…

Read More
IC-SAT100
Meet IC-SAT100, a Satellite PTT Radio Built for the World’s Most Demanding Environments
February 5, 2026

Let’s have a look at Icom’s IC-SAT100, a satellite Push-To-Talk radio designed for moments when ordinary communication just isn’t an option. Powered by the Iridium satellite network, this rugged handheld delivers instant one-to-many communication at the push of a button—no cell towers or ground infrastructure required. Built to thrive in harsh environments, it’s waterproof,…

Read More