SpecialReport: Production Operations based on industry collaboration and guidance. As a rule, however, there always should be an identifiable business reason-whether it is to improve safety or productivity-for connecting any given asset. Convenience never should be the driving force behind any digital transformation strategy. Intrusion detection systems alert administrators when unauthorized connections are attempted or made, but they only identify attacks; they don't stop them. Intrusion prevention systems (IPS) actually can block connections according to preconfigured policies and definitions. Subscription services can be employed to update malicious connection information and identify malware and command and control servers. IPS subscriptions provide the benefit of blocking known malicious connections based on shared industry and global cybersecurity intelligence. Other Considerations Other fundamental considerations for ensuring safe and secure digital oil field operations include: · Leveraging behavioral analysis; · Performing system audits and assessments; · Carefully selecting equipment and service vendors; · Properly training personnel on both technology and procedures; and · Using key performance indicators to bench mark cybersecurity performance. Behavioral analysis techniques include polices and workflows designed to flag abnormal behavior in both personnel and systems. A combination of controls-such as a security incident and event manager that aggregates logs from security and other systems, along with an intrusion or prevention detection system-put both electronic detection policies and opera- tional cyber-response capabilities in place to speed the detection of abnormal behavior and give security teams more time to detect and neutralize an attack. Deploying carefully designed electronic and physical workflow authorization procedures can help to protect critical processes as well as implement change management strategies across organizations. Instituting regular audits and assessments to identify security gaps is an essential component of any successful strategy, but it is also important to review the assessment process itself periodically to determine its effectiveness in finding and addressing threats. This may involve auditing systems to achieve the appropriate security posture based on the risk tolerance determined in the risk assessment process, which if thorough, will identify gaps either in the technology apparatus or the implementation of poli- What you're reading is more than just copy. It's also copyrighted. So before you head over to the photocopier, make sure you have permission. Contact the publisher or visit www.copyright.com. 72 THE AMERICAN OIL & GAS REPORTERhttp://www.copyright.com