E2B: Energy Industry Cybersecurity Threats In The Digital Age

Are energy companies taking cybersecurity seriously? Are they shifting focus to application security?

E2B host Daniel Litwin speaks with Dan Cornell, Chief Technology Officer of the Denim Group and Kent Landrum, Managing Director at Opportune LLP, to get answers to these questions and more.

Cornell begins by explaining cybersecurity challenges for the energy industry. “The energy sector is so diverse from a cybersecurity standpoint—different sizes, economics, and types of business. Many under invest in cybersecurity,” he says.

Cornell notes that many organizations are adopting important tactics like threat modeling, vulnerability scans, code analysis and software composition analysis. “Firms will be better off to be more programmatic than tactical in cybersecurity,” Cornell says. “The awareness around risk, especially in the software supply chain, is becoming greater because every organization consumes software.”

Cornell and Landrum also discuss different types of cybersecurity risks, with Cornell noting that cyber-attacks by nation-states actors are the most dangerous as opposed to the “hacktivist” variety because they have resources. Cornell and Landrum point to several high-profile cyber attacks have hit the energy industry in recent years—most notably being Saudi Aramco, the biggest OPEC exporter, being targeted by the “Shamoon” virus, which cripples computers by wiping their disks, in 2012 and 2017. “Aramco was a wake-up call for the [energy] industry,” Landrum says.

The attack on Ukraine’s power grid in December 2015 is also startling, according to Landrum. This well-coordinated cyber incident took 30 substations offline and put 230,000 people in the dark for hours. “The Ukraine example is one of the first cases where we saw the progression from the enterprise or the corporate side of IT over into operations technology,” Landrum says.

Cornell speaks about digital transformation and its opportunities and challenges. “Companies are adopting more technology faster and a DevOps culture where they break down the silos between development and operations teams, which is good, but there are application security implications,” he says. “It’s really more of a cultural change than anything.”

Meanwhile, Landrum says he continues to see many energy firms use legacy enterprise resource planning (ERP) and energy trading and risk management (ETRM) systems that run on outdated versions of commercially available applications, which can open up cyber vulnerabilities and hinder technical advancements . “The consequence of that is it essentially traps the IT department and prevents them from being able to upgrade and patch those components to close known security vulnerabilities,” he says.

In summary, Landrum and Cornell agreed that updating or “modernizing” legacy energy enterprise applications like ERP and/or ETRM systems can go a long way in reducing a system’s attack surface and ensuring energy companies become a harder target for malicious cyber threat actors.

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

personal branding
Personal Branding Now Drives B2B Success, Customer Trust, and Competitive Advantage
December 5, 2025

Personal branding has rapidly shifted from a “nice-to-have” to a strategic imperative in B2B marketing, reshaping how companies communicate, differentiate, and build trust. As industries evolve and professionals take on more dynamic, multi-stream careers, visibility and authenticity have become critical assets. Key findings from the Edelman + LinkedIn Thought Leadership Impact Report show that…

Read More
IT
Real-World IT Practices Are Streamlining AV Deployments and Raising the Bar for Consistency
December 4, 2025

For years, the AV industry has discussed the long-anticipated convergence with IT—but that shift is no longer theoretical. With cloud adoption accelerating, hybrid work normalizing, and organizations rebuilding digital infrastructure after years of rapid change, AV systems now sit squarely on the IT backbone. In fact, the majority of newly upgraded conference rooms require network-centric…

Read More
ROI
ROI Case Study
December 3, 2025

Denials are no longer a slow leak in the revenue cycle—they’re a fast-moving, rule-shifting game controlled by payers, and hospitals that don’t model denial patterns in real time end up budgeting around losses they could have prevented. PayerWatch’s four-digit, client-verified ROI in 2024 shows what happens when a hospital stops reacting claim by…

Read More
coverage
Clip 2 – Fighting for Coverage: One Patient’s Story
December 3, 2025

Health insurers love to advertise themselves as guardians of care, but the real story often begins when a patient’s life no longer fits neatly into a spreadsheet. In oncology especially, “coverage” isn’t a bureaucratic checkbox—it’s the fragile bridge between a treatment that finally works and a relapse that can undo years of grit…

Read More