E2B: Energy Industry Cybersecurity Threats In The Digital Age

Are energy companies taking cybersecurity seriously? Are they shifting focus to application security?

E2B host Daniel Litwin speaks with Dan Cornell, Chief Technology Officer of the Denim Group and Kent Landrum, Managing Director at Opportune LLP, to get answers to these questions and more.

Cornell begins by explaining cybersecurity challenges for the energy industry. “The energy sector is so diverse from a cybersecurity standpoint—different sizes, economics, and types of business. Many under invest in cybersecurity,” he says.

Cornell notes that many organizations are adopting important tactics like threat modeling, vulnerability scans, code analysis and software composition analysis. “Firms will be better off to be more programmatic than tactical in cybersecurity,” Cornell says. “The awareness around risk, especially in the software supply chain, is becoming greater because every organization consumes software.”

Cornell and Landrum also discuss different types of cybersecurity risks, with Cornell noting that cyber-attacks by nation-states actors are the most dangerous as opposed to the “hacktivist” variety because they have resources. Cornell and Landrum point to several high-profile cyber attacks have hit the energy industry in recent years—most notably being Saudi Aramco, the biggest OPEC exporter, being targeted by the “Shamoon” virus, which cripples computers by wiping their disks, in 2012 and 2017. “Aramco was a wake-up call for the [energy] industry,” Landrum says.

The attack on Ukraine’s power grid in December 2015 is also startling, according to Landrum. This well-coordinated cyber incident took 30 substations offline and put 230,000 people in the dark for hours. “The Ukraine example is one of the first cases where we saw the progression from the enterprise or the corporate side of IT over into operations technology,” Landrum says.

Cornell speaks about digital transformation and its opportunities and challenges. “Companies are adopting more technology faster and a DevOps culture where they break down the silos between development and operations teams, which is good, but there are application security implications,” he says. “It’s really more of a cultural change than anything.”

Meanwhile, Landrum says he continues to see many energy firms use legacy enterprise resource planning (ERP) and energy trading and risk management (ETRM) systems that run on outdated versions of commercially available applications, which can open up cyber vulnerabilities and hinder technical advancements . “The consequence of that is it essentially traps the IT department and prevents them from being able to upgrade and patch those components to close known security vulnerabilities,” he says.

In summary, Landrum and Cornell agreed that updating or “modernizing” legacy energy enterprise applications like ERP and/or ETRM systems can go a long way in reducing a system’s attack surface and ensuring energy companies become a harder target for malicious cyber threat actors.

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

MarTech
How CMOs Must Respond as AI Redefines Marketing and MarTech Strategy
February 16, 2026

AI is shifting marketing from experimentation to operational integration. In this episode, Aby Varma speaks with Palmer Houchins, VP of Marketing at G2, about embedding AI into workflows, rethinking org design, and navigating rapid change across the MarTech landscape. From LLM copilots to agentic workflows, they unpack practical adoption lessons and the increasing importance of…

Read More
experiential learning
Flood the Zone: University of Virginia’s New Strategy to Scale Experiential Learning for Every Student
February 16, 2026

Experiential learning is having a bit of a reckoning moment in higher ed. For years, the default answer was “get an internship” or “do a co-op”—as if every student can pause life, relocate for a summer, and take on a high-stakes role that’s supposed to define their future. But students’ realities have changed: many…

Read More
free tools
The True Cost of Free Tools: When Free Platforms Own More of Your Network Than You Do
February 12, 2026

Nowadays, getting a project off the ground usually means moving fast. A quick map gets sketched. A file gets shared. A design gets reviewed in whatever tool is closest at hand. In the moment, it feels efficient — even smart. But in the telecommunications industry, as networks become more automated, location-aware, and powered by AI,…

Read More
telecom
Predictive Networks: How Baron Weather and GIS are Strengthening Telecom Operations
February 12, 2026

Severe weather is no longer an occasional disruption for telecom providers—it’s becoming part of the operating environment. During Hurricane Ida in 2021, the Federal Communications Commission reported that nearly 1,000 cell sites across Louisiana and Mississippi went offline. In 2024, Hurricane Milton left more than 12% of cell sites in impacted areas of Florida…

Read More