You are on page 1of 45

DRILLING DOWN

Oil and Gas Magazine


First edition

Articles include:
Top risks facing the oil and gas industry in 2022 — and
what you can do about it
Accelerating OT security for rapid risk reduction
Bringing cyber process hazard analysis to the digital era
Safeguard your digital environments from all angles

KPMG International

home.kpmg/drillingdown
Foreword
W
elcome to the first edition
of KPMG’s new oil and gas
magazine, Drilling Down —
designed to be of interest to anyone
with a connection to the industry. We
hope it will bring you valuable topical
insights and promote discussion and
debate around the key issues facing
our sector.
The current global geopolitical
tensions combined with intense
uncertainty in supply chains have
resulted in a rise in hydrocarbon
prices, giving the industry a
temporary financial break. This price
environment is not all positive as Given this fraught environment, our
it creates significant challenges as
external scrutiny increases. Given
view is that the industry should continue
this fraught environment, our view is to strengthen its defenses and controls
that the industry should continue to around an array of risks ranging from
strengthen its defenses and controls
around an array of risks ranging from geopolitics to cyber and talent.”
geopolitics to cyber and talent.
Regina Mayor
In this issue, we hone in on some Global Head of Energy
of these specific risks, particularly KPMG International
cyber. At KPMG we believe the
oil and gas industry is a principal
target for cyber threats and the
industry must plan for future threats.
Our authors put forward detailed
views on the nature of the risks
confronting oil and gas and related
industrial businesses and set out
best practice approaches to mitigate
them.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 2
More broadly, there is an existential has enabled substantial
risk facing oil and gas companies. improvement of everyday lives.
Negative public sentiment — from
— The lives of 40 percent of
investors and the public at large —
the global population can be
continues to grow. Demands to
significantly improved by having
The Statement
boycott the industry are increasing —
reliable access to affordable on the Purpose
encompassing everything from
museums to sporting competitions.
energy. of a Corporation
These views are more prevalent — Gas is a significantly cleaner fuel (published by the
in well developed economies but than coal, less from the point of
do not really represent those less view of carbon emissions and
American Business
developed economies where 759 more from the perspective of air roundtable, August
million people2 still do not have quality — a highly topical issue 2019) acknowledges
access to reliable energy supply, or in India and China but also in
other economies where revenues Western economies. the need to go
from hydrocarbons fill state reserves
— The oil and gas industry beyond the creation
and contribute to a redistribution of
wealth by lifting millions of people out
is focused on developing of shareholder
carbon capture processes
of poverty.
and technologies to mitigate
value to focus
In my view, the global oil and gas negative climate effects. also on investing
industry has a unique opportunity
— The industry is actively in employees,
to shift the narrative — becoming
more proactive around all the things
rebalancing its portfolio of supporting
assets towards cleaner fuels by
the industry can do to drive the
increasing the role of gas and
communities,
planet toward a net zero reality.
The industry as a whole could do
alternative energy assets such as delivering value
more to promote what it is doing for
wind, solar, etc. to customers
the common good — to be more — The industry plays a meaningful and dealing fairly
proactive in its communications and role in sustaining millions of
not as reactive. people by funding government and ethically with
The Statement on the Purpose of
budgets in many oil and suppliers.”
gas dependent nations and
a Corporation (published by the
contributes to sustaining these
American Business roundtable,
economies.
August 2019) acknowledges the
need to go beyond the creation of The promotion of these themes
shareholder value to focus also on to the public at large through a
investing in employees, supporting concerted industry effort would
communities, delivering value to help mitigate negative perception
customers and dealing fairly and risks by showcasing all that the
ethically with suppliers. In my industry does to make a meaningful
view the industry could benefit contribution to all its stakeholders.
from a similar oil and gas specific We plan to explore these issues in
statement, working with public more detail in a later edition.
companies, state regulators and
I hope Drilling Down becomes a
industry organizations to promote a
useful source of ideas for oil and gas
new industry paradigm around the
professionals around the world. Do
following themes:
please get in touch if it stimulates
— The world needs energy to any thoughts or questions that you
power economic growth well would like to discuss.
into the future. The industry

2
World Bank

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 3
Contents
05 15 24 32
Top risks facing the Accelerating OT Bringing cyber Safeguard your
oil and gas industry in security for rapid process hazard digital environments
2022 — and what you risk reduction analysis to the from all angles
can do about it digital era

06 Seven keys to get your 15 The convergence of 26 A rising threat 34 Cybercrime is big and
company ready for the OT and IT landscape growing
unexpected
17 Top-down and 27 Strengthening 35 Zero trust basics: The
07 The uncertain state of the bottom-up defenses through perimeter-less border/
world’s oil supply approaches cyber PHA Trust no one
08 Impact of rising tensions 19 Eight key questions 29 The benefits of 36 Key potential benefits
with Russia on Europe’s cyber PHA of zero trust
20 Leveraging
gas supply and prices
emerging 29 Cyber PHA on the 37 Getting started on your
09 Potential impact of global technologies regulatory radar zero trust journey
decarbonization efforts on
21 Getting the 31 How KPMG firms 39 Continue on your zero
the oil and gas industry
people and teams can help trust journey — or
10 “Activist” impact on the oil approach right start today
31 About the authors
and gas industry
22 Four takeaways 40 How KPMG firms can
11 Hope for the best, prepare help
23 How KPMG firms
for the worst
can help 41 About the authors
12 Final thoughts: Navigating
23 About the authors
through the uncertainty
12 Risks on the horizon:
The search for talent
14 Tips for improving employee
recruiting and retention
14 About the authors

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 4
Top risks facing
the oil and gas
industry in 2022
and what you
can do about it
By: Raad Alkadiri, Regina Mayor and
Stefano Moritsch

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 5
Seven keys to get your company
ready for the unexpected

In my nearly 30 years of looking at oil markets, The oil and gas industry perpetually
seems rife with uncertainty and
I can't think of a time when geopolitically there potential volatility. Between rising
was as much uncertainty over potential high and diminishing consumer demand,
price fluctuations, and of course,
and low points in terms of prices, supply and geopolitical issues where one global
demand.” supplier or another threatens to
cut off supplies, every day holds
Raad Alkadiri
surprises and risks. But 2022
Managing Director, Energy,
seems to be upping the stakes in
Climate & Resources, Eurasia Group
terms of risk and uncertainty. The
Russian invasion of Ukraine is a
reminder of how quickly changes
in the geopolitical landscape can
impact energy prices. Negotiations
over a new nuclear deal with Iran
add another complication to the
energy outlook.
At the same time, the lingering
impact of COVID-19 is still being
felt. While cases seem to be
moderating in many parts of the
world, the supply chain and vaccine
mandate issues are ongoing,
and China’s “zero-COVID” health
policies pose a major risk for energy
demand growth. Add to this mix
the increasing measures across the
globe promoting decarbonization
efforts and growing activist
pressure over climate change.
What you are left with is a lot of
uncertainty and unanswerable
questions. This article drills down
into the top risks looming over
the oil and gas industry for the
remainder of 2022 and attempts to
provide answers and some steps
companies can take to prepare for
them.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 6
The uncertain state of the
world’s oil supply
In 2022, we are seeing the results of curtailment of Russian oil exports
a supply shock with a tight oil supply — including more drastic measures
and supply disruptions driving prices from Europe. Outrage over the
well north of $100/barrel to near invasion has led to some self-
record highs. But believe it or not, sanctioning by western buyers; the
there is a scenario where we can U.S. has already initiated a ban on
see a situation with excess supply Russian oil, and the European Union
later this year or early next. Volatility (EU) is actively contemplating one.
will likely be with us for some time. The IEA currently predicts as much On the demand side,
The potential oversupply scenario
as 3MM BPD of Russian exports
could be taken off the market. On
higher energy
happens if OPEC makes good on its
commitment to continue unwinding
to the demand side, higher energy prices from the
prices from the Ukraine crisis
the supply cuts it made in 2020,
and U.S. unconventional production
could have a knock-on effect on Ukraine crisis
grows as much as some analysts are
international economic growth. could have a knock-on
forecasting. If these events occur, Meanwhile, China appears to be effect on international
organizations may end up with an sticking with its “zero COVID” policy, economic growth.
oversupply of oil, with as much as an which includes severe lockdowns
extra 6.4 million barrels per day late and other business-limiting
this year. Add to that a potential new measures. What’s more, President
nuclear agreement with Iran and Xi's economic and environmental
the volume of new oil coming onto policies may slow down China’s
the market this year will be even economic expansion, and therefore
higher; some estimates have Iranian decrease its demand for oil. This
exports growing by up to a million could have a ripple effect on the
barrels a day within a few months if global economy, making forecasts of
a new pact is struck. (Of course, if a increased global oil demand of 3.3
U.S.-Iran deal occurs, it might factor million barrels per day illusory.
into OPEC’s decision to continue
For the time being, we’re still
unwinding its cuts.)
experiencing a tight oil market
On the flipside, of course, is although many are forecasting a
Russia’s invasion of Ukraine, and growing oil surplus beginning in the
the risks that it will lead to a further second half of the year.1

1
Reuters, OPEC+ trims forecast for 2022 oil market surplus in latest data, 27 February 2022

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 7
Impact of rising tensions with
Russia on Europe’s gas supply
and prices
Russia’s invasion of Ukraine has believe that this vulnerability will
prompted the U.S. and EU to motivate EU countries to double
impose severe economic sanctions down and accelerate the pace of
on Russia. their transition to renewables and
This tense geopolitical issue is
clean energy in order to decouple “In some parts of
from reliance on Russian gas. This
casting a long shadow over gas
will likely have a big geopolitical the world, energy
supplies and prices, especially in
Europe.
impact in terms of Russia's transformation and
leverage over Europe, and also in
Reductions in Russian spot sales terms of where Russia would sell
energy security
of gas to Europe in late 2021 its oil and gas supplies. are seen as being
contributed to an energy crunch
Is it politically feasible for EU synonymous rather
and record natural gas prices in the
EU. The fear now is that fighting in
governments to do this? Can the than disruptive.”
EU accept the potential short-term
Ukraine and the impact of sanctions Regina Mayor
pain in terms of increased prices
will disrupt much larger volumes Global Head of Energy
and limited gas supplies in order to
of gas, keeping prices high and KPMG International
gain a long-term advantage? And
undermining EU economic growth
what steps will it take to ease the
this year. If Moscow were to
burden on its citizens?
retaliate to U.S. and EU sanctions
by cutting off all gas exports to For example, Germany has said
Europe, the results would be that, in light of the Ukraine invasion,
even more onerous for European it will not certify the Nord Stream 2
economies. gas pipeline, which was designed
to deliver more Russian gas to the
How this crisis plays out in the
EU.2 The bloc is also taking steps
longer-term will have significant
to displace some Russian gas with
implications for the energy mix in
supply from the U.S. and Qatar
Europe over the next 5–10 years.
until its transition efforts are further
There is one school of thought that
along and bear more fruit. These
Europe will delay implementation of
are all questions that many hope
some of its key “green transition”
will be answered as the year moves
energy policies to avoid short-term
forward.
pain. On the other hand, many

2
Reuters, Germany freezes Nord Stream 2 gas project as Ukraine crisis deepens, 22 February 2022

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 8
Potential impact of global decarbonization
efforts on the oil and gas industry

Beyond environmental and economic


considerations, geopolitical volatility is, more than
ever, triggering a fundamental re-think of energy
strategy around the globe. National security
interests will likely determine the speed and
direction of the decarbonization journey” Fallout from the
Ukraine crisis may
Stefano Moritsch
Global Geopolitics Lead accelerate the EU’s
KPMG International “Fit for 55”
proposals, which aim
When it comes to global energy to be willing to put up with higher to reduce greenhouse
transformation efforts, it seems cost and burdens as it forges ahead
like it is one step forward and two with its emission reductions. It
gas emissions by at
steps back. While global energy turns out that in some parts of the least 55 percent by
transformation efforts to reduce world, energy transformation and 2030.
emissions are being baked into energy security are seen as being
policies around the world, it’s not synonymous rather than disruptive.
a one-size-fits-all approach and it’s
Ultimately, the tension between
happening at different speeds in
governments’ balancing of long-term
different countries. And as events
energy goals and the short-term
in Europe illustrate, politics have a
needs of their citizens will make
major impact.
the road to energy transformation
Fallout from the Ukraine crisis extremely bumpy. Governments will
may accelerate the EU’s “Fit have their work cut out for them in
for 55” proposals, which aim to trying to minimize the pain that will
reduce greenhouse gas emissions likely be caused by the transformation
by at least 55 percent by 2030. efforts while still making progress on
Meanwhile, China also appears its energy policies.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 9
“Activist” impact on the oil and
gas industry
It is not just governments that oil green energy and away from oil and may lead to even greater reliance
and gas companies need to pay gas is that national oil companies on the NOCs for their production.
close attention to. Environmental (NOCs) may end up with even more And this may give them greater
and social activists are putting power — at least in the short term. political leverage. But NOCs should
increasing pressure on the industry, Regardless of what happens in the act judiciously; if they push their
questioning its “social license” to long term, worldwide energy needs advantage too hard, it may backfire
operate. This is largely based on are not decreasing. So while some and end up with a faster shift away
the pollution and climate change oil and gas firms may gradually from consumption of oil and gas in
damage they believe the industry is get squeezed out of the market, it the longer term.
responsible for.
The industry has dealt with this
issue for decades but the increasing
attention on the threat of global
warming has really increased.
Activist investors are speaking
with their pocketbooks and shifting
more of their investment dollars
toward green energy. Another game
changer has been the expansion
of social media platforms and new
technology that provides activists
with the ability to get their message
out more widely to the general
public and also more directly to
corporate executives and board
members. In addition, climate
activists are also taking to the
courts; although the results have
been mixed, the potential liability
and bad publicity it generates
creates great uncertainty and risk
for the industry.
As a result, oil and gas companies
are feeling intense pressure to
respond in terms of capital allocation
decisions and strategy out of fear
of damage to both their corporate
reputation and bottom lines.
A somewhat surprising
development that may come out
of the private sector continuing to
shift its investment focus toward

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 10
Hope for the best, prepare for the worst
It’s impossible to predict the future. Who could have imagined the COVID 19 pandemic that’s upended the world
and the global economy for two years? Or the military invasion of Ukraine by the Russian government that will
likely be a profound political and economic global fallout.
Much of what may happen is out of the control of the oil and gas industry. However, the following are some steps
you may want to consider taking so that your organization will be as well positioned and prepared as possible
regardless of what occurs in 2022.

1 Have an ESG (environmental, social and


governance) plan in place to proactively address
cooperation efforts to proactively shape reasonable
regulation with governments.
activist investor and stakeholder concerns. Tackle
the issues head-on rather than waiting to respond 6 Get your supply chains in order: Review your
current setup and determine how you can reduce
under pressure.
disruption and improve resilience.
2 Review your organizations’ crisis playbook. Does
it include all potential scenarios, and is it updated — For example, are your operations flexible
regularly? and resilient enough to adapt and adjust
in real-time to changes in trade flows,
new regulations, continued COVID-19
3 Review your organization’s commodity risk
management philosophy. Prepare for how short disruption, climate change, trade tensions
and long-term changes in the pricing environment and other geopolitical movements?
could impact customer and shareholder sentiment,
— Is your technology current so you can
and also government involvement.
reduce operating costs, provide visibility,
and seamlessly diversify the way
4 Understand how proposed legislation and
government actions could impact your company:
customer needs are met?
Determine if your organization has the flexibility
to shift gears quickly to take advantage of 7 Review your organization’s cyber defense
protection: The risk of a cyber breach is perhaps
opportunities as political agendas change.
the most underestimated above-ground risk in
the oil and gas sector. It cuts across political
5 Focus on relationship building: Continue or
and geographical boundaries and any company,
increase efforts to build relationships with all
regardless of size, is a potential target. No matter
relevant stakeholders, including consumer groups,
your location or where you operate, you are equally
governments, regulators, and society at large. In
vulnerable to a cyber security breach.
the same way, consider industry and cross-industry

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 11
Final thoughts: Navigating through the uncertainty
As this article has highlighted, There will likely be a continuing The speed and intensity of the
there hasn’t been a time where push for decarbonization and other transformation may be impacted by
there’s been more uncertainty climate control efforts, whether short-term supply and price issues
for oil and gas companies. What by governments or activist and and geopolitical events, but the
is certain, however, is that the consumer groups, and incremental future direction is clear. The oil and
world is not going to go back to tweaks to technology may not do gas industry will need to change,
where it was, and the oil and the trick. and you should be taking steps now
gas industry will need to change. to prepare for the inevitable.

Risks on the horizon: The search for talent


The oil and gas industry has faced
a talent shortage for years due to
an aging workforce, limited new/
young talent entering the industry,
and growing competition for talent
with the technology industry. This
difficulty in getting and retaining
talent, which may pose significant The oil and gas workforce of the future4
issues for the future of the industry,
can be attributable to several
factors:
of current energy workers want to leave the
The negative perception of the 43% industry altogether within the next five years
industry: The industry is often cast
in a negative light by the media. As
a result, many talented individuals
tend to shun the industry —
although this is by no means
universal.
of those currently working in oil and gas said they’d
That’s why oil and gas companies 56% consider jobs with renewables organizations
continue to rely on the experienced
crews who often come back after
retirement as contractors.
What’s more, there may be a need
to “import” foreign employees from of university students considering a career in the oil
India, China and Russia, for example, and gas industry said it is important that their future
to help fill the breach. But that 85% employer has policies aimed at addressing climate
also may entail a host of political, change and environmental factors5
immigration and security issues.

4
Brunel International/Oil and Gas Job Search, Energy outlook Report 2021–2022
5
University of Houston, Insights into the Oil and Gas Workforce of the Future

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 12
Lack of employees with the modern workforce. Spurred on by
“right” skills: India has been the COVID-19 pandemic, many
leading the world in awarding companies permitted or accelerated
bachelor’s degree equivalent remote and more flexible working
science and engineering (S&E) arrangements for their employees
degrees, followed closely by China.6 whenever possible. This is a change
The United States is a distant third that can help energy companies
with the largest percentage of connect better with the values of
S&D degrees awarded in the field coming generations.
Energy executives
of social sciences and behavioral
Also, as the workforce diversifies, have noted that
sciences, a stark contrast to other
managers should seek to expand
S&E producing countries who tend their companies
their understanding of how to
to award engineering or physical,
work with people from different
lack employees with
biological, mathematics, and skills needed for the
backgrounds. This may include
statistics degrees (PBMS).7
acknowledging and embracing successful delivery of
Employees with engineering and the increased importance of ESG their decarbonization
PBMS degrees are exactly the and diversity, equity, and inclusion
strategy, including
type of skills needed to develop demographics (e.g., race, gender,
technology and operationalize sexual orientation) and values. technical/
decarbonization investments in the This should be done at both the engineering
oil and gas industry. workforce and board levels.
For example, energy executives You may also want to consider
have noted that their companies crafting a value proposition that 18%
lack employees with skills needed resonates with younger employees
for the successful delivery of their and potential recruits. Keep in carbon markets
decarbonization strategy, including mind that money isn’t everything, expertise
technical/engineering (18 percent), particularly for millennials; they tend
carbon markets expertise (17 percent) to want challenging experiences
or policy, regulation, or government that help grow their capabilities. 17%
relations expertise (16 percent).8 What’s more, different groups and
different generations may require or policy,
The onus is on oil and gas
companies to make sure they get
different value propositions and also regulation, or
have different learning styles and government
and retain the necessary talent
communication styles that should
by reviewing their recruiting and
be taken into account.
relations expertise
retention efforts. They also need
to find ways to upskill or retrain For example, one oil and gas
their current workforce, which is company found that it was losing 16% 8

what over 92 percent of energy many of the millennials it had


companies plan on doing to address recruited. They were using the same
this climate skills gaps.9 onboarding procedures that had been
used successfully for decades, with
New workplace dynamics: The
dozens of written forms, endless
oil and gas industry is regarded
pages of orientation materials, and
as a relatively staid, conservative
hours of classroom sessions. They
one. But to successfully compete
decided to switch to a more virtual,
for talent these days, you may
mobile and automated training
have to become more flexible and
process, which resulted in a much
adapt to the new realities of the
higher retention rate.10

6
National Science Federation, Higher Education in Science and Engineering, (2018).
7
National Science Federation, Higher Education in Science and Engineering, (2018)
8
Eversheds Sutherland/KPMG, Climate change and the people factor (2021).
9
Eversheds Sutherland/KPMG, Climate change and the people factor (2021).
10
KPMG/Rigzone, When one crisis meets another: Focusing on talent for the long term (2015).

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 13
Tips for About the authors
improving Based in Washington, DC, Raad's work

employee focuses on the nexus between politics,


economics, climate, and the energy
sector, as well as its effects on market

recruiting and behavior and investment risk. He works


closely with clients to advise on capital-
allocation options, risk-mitigation

retention Raad Alkadiri


Managing Director, Energy,
Climate & Resources
Eurasia Group
strategies, and policymaking. He also
closely follows medium- and long-
term geopolitical, energy, and climate
trends, and their impact on the risk
Here are several ideas oil and E: alkadiri@eurasiagroup.net environment.
gas companies may want to run
with to improve their recruiting
efforts with potential employees:
Regina Mayor serves as KPMG’s Global
— Ramp up (or reinstate)
Head of Energy and Natural Resources.
summer internship programs
She is a recognized thought leader on
— Sponsor (or increase your the disruptive trends facing the various
investments in) scholarships, segments of the energy value chain —
prizes, fairs and afterschool from the impact of millennial and baby
programs that focus on boomers on gasoline consumption to
STEM disciplines the rapidly changing demands in the
power generation segment. Regina
— Organize business school Regina Mayor brings over 25 years of experience
conferences and job fairs Global Head of Energy delivering largescale business and
— Forge stronger relations with KPMG International technology changes to major energy
universities and other training E: rmayor@kpmg.com companies around the world.
institutes
— Promote interest in the
STEM disciplines among
high school (or younger)
Stefano leads KPMG’s efforts, globally,
students with campaigns and
to help companies and governments
programs designed to appeal
deal with today’s geopolitical
to this audience
challenges. By connecting the dots
between the macro political trends and
their commercial implications in various
sectors, Stefano hopes to help global
businesses not only survive but thrive
in geopolitical volatility. He can help
Stefano Moritsch identify the 'so what' of macro trends
Global Geopolitics Lead through strategic scenario planning,
KPMG International due diligence and geopolitical risk
E: stefano.moritsch@kpmg.co.uk management.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 14
Accelerating OT security
for rapid risk reduction
Securing operational technology
environments as they become
increasingly digitized and
connected
By: Serdar Cabuk, Jayne Goble, Ronald Heil,
and Walter Risi

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 15
Oil and gas and other That’s why there should be an Certainly, attackers are becoming
Industrial organizations are increasing focus on ensuring that more professionalized and
OT environments are secure and organized — and have the tools at
increasingly facing cyber subject to the same kind of good their disposal to reach OT systems.
threats not only to their practice safeguards as in the IT IT malware and some OT malware
information technology domain. In just the past year, the are easily available on the dark web
(IT) systems but to their roll-call of OT related incidents has that can enable a hacker to get
operational technology grown. This includes a cyberattack through the ‘front door’ and into
on two German fuel and oil an organization’s systems. With
(OT) environments as well. distributors1 in late January 2022, the right skills and knowledge,
As OT becomes more disrupting operations and supply attackers can then apply other
connected, digitized and chain management, and an attack malware to move laterally and reach
automated, so the potential in 2021 that attempted to disrupt the OT environment. Attackers
for cyber attackers to break the water supply in Oldsmar, will be doing their due diligence
Florida2 by gaining remote access too — researching what software
in and cause dangerous to the system’s control station and an organization’s industrial control
disruptions or overrides attempting to increase the levels of systems (ICS) run on and assessing
increases with it. Accidents sodium hydroxide. what malware they may be
and unintentional exposures It’s fair to say that events like these
susceptible to. In our experience,
have also caused major some software commonly used
are probably just the tip of the
to run ICS have potentially severe
incidents. iceberg. Whether the motive is
vulnerabilities.
financial — installing ransomware
to extort large payments — or Against this backdrop, hardening
whether it’s simply to cause OT security should be an absolute
disruption and danger to the priority. And it is something that
performance and safety of critical must be addressed at pace —
infrastructure, we can expect to cyber attackers won’t wait to give
see more of this threat to industrial organizations a decent chance to
businesses in the future. prepare first!

1
BBC, Cyber-attack strikes German fuel supplies (2022)
2
CNN, Someone tried to poison a Florida city by hacking into the water treatment system, sheriff says (2021)

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 16
The convergence of OT and IT
It is also an imperative because useful — and will likely become
OT is increasingly being converged more necessary in the future as
with IT as new technologies are operations become ever more
introduced to realize efficiencies, digital — to think simply in terms
productivity gains and smarter of technology. Whether you look
operations. Whereas going back a at OT or at IT, it’s technology that
decade or so, OT was segregated they both come down to. The
and inaccessible, now it is being choice to keep them as separate
connected to other systems. environments will increasingly Now, the convergence
Standalone, non-connected OT diminish. of OT and IT means that
simply doesn’t meet today’s
This blending is becoming more organizations must
performance and other needs. One
visible in some interesting ways,
analogy would be to the financial
such as the rise across industrial bridge the gap
services industry: 10 —15 years
organizations of the Chief between the two
ago, banks’ mainframe systems
were locked away, but they have
Technology Officer (CTO). In many environments’ people,
senses this is still an emerging processes and systems
had to re-engineer and digitize
role — the responsibilities of a CTO
them to meet various modern
vary from business to business in
to build a smarter,
needs including Open Banking more secure network
our experience. But as Boards place
and regulations such as PSD2,
an ever-higher priority on digital with high visibility to
requiring new security protocols
and protections.
transformation, it is CTOs to whom monitor and control
they are often looking to lead the both environments.
Now, the convergence of OT and change, comprising both IT and
IT means that organizations must OT. The Chief Information Security
bridge the gap between the two Officer (CISO) remains a key role
environments’ people, processes for security, and as OT security
and systems to build a smarter, becomes a priority, it is extending
more secure network with high to cover that too. In some ways,
visibility to monitor and control both the CISO is moving from protecting
environments. IT (usually, the domain of the CIO)
to protecting all the organization’s
This brings us to an important
technology (the domain of the CTO).
point: to what extent is it useful
Alternatively, some businesses have
anymore to distinguish OT from IT?
a specific OT CISO who reports
As the two domains get closer to
into the overall CISO. The patterns
each other, a lot of OT is IT. After
vary — it’s a developing picture —
all, 80 percent of industrial plants
and it will be fascinating to see the
have more servers and IT than an
direction of travel as this plays out.
average bank. It is perhaps more

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 17
Top-down and bottom-up approaches
Whatever the case, clearly an These are valid questions — and
essential component of securing OT they point to the fact that there are
is to have a top-down governance a number of bottom-up measures
framework setting out roles, that can be taken alongside the top-
responsibilities and reporting lines, down framework to make a fast and
while not deferring a bottom-up significant difference.
detection and defense mechanism
In many ways, it’s a simple case of
implementation. The definition of
not reinventing the wheel: import
OT can be very broad, and it is
best practices from IT security
While the governance
found right across an organization’s and operating model
into OT (just as IT can import best
operations meaning that usually
practice from OT in other ways such is instrumented,
there is no single person with
responsibility for all of it. So,
as safety consciousness). So, there
are three immediate areas that
detection
coordinating efforts to address OT
security is essential. This requires
should be assessed and addressed: technologies
a clear governance structure — Endpoint protection of OT assets (ideally, integrated
and operating model. A strong into a security
— Perimeter firewalls around OT
mandate from the very top of the
business is also a pre-requisite,
assets operations Cerisano
to drive OT security as a strategic — Network segmentation, within (SOC)) should be
priority. That said, a bottom-up OT and between OT/IT implemented,
detection and defense approach
Alongside this, organizations should
response playbooks
must proceed almost in parallel, for common scenarios
implement OT network visibility in
since threat actors won’t wait until
a governance framework is set.
the early stages of their OT security must be defined (e.g.,
journey. There are a number of ransomware) and
While the governance and operating
technologies that allow monitoring
model is instrumented, detection basic cyber-hygiene
of the OT network for either known
technologies (ideally, integrated
threats or suspicious behavior.
measures should be
into a security operations Cerisano taken care of.
Ideally, these technologies should
(SOC)) should be implemented,
be integrated into the organization’s
response playbooks for common
existing monitoring and response
scenarios must be defined (e.g.,
framework (which typically would
ransomware) and basic cyber-
include a SOC and computer
hygiene measures should be taken
security incident response team).
care of.
Additionally, organizations need
Mature governance and operating
to strive for integrated asset
model structures are geared towards
management, at least for the most
delivering sustainable improvements
critical assets. Most businesses
over the longer term, helping also to
have a wide number of assets
future proof the organization as new
and several asset management
technologies (and threats) emerge.
systems, from IT’s configuration
But it’s a simple fact that while
management database to specific
organizations appreciate the value
asset management systems the
and importance of these top-down
OT areas may have. The ability
structural approaches, at the same
to manage these assets means
time what we almost always get
firstly getting and then maintaining
asked is: “What can I plug in today
visibility of them — so this should
to make an immediate difference?
be a priority. There are a number of
What can I do to rapidly deliver OT
tools available in the market that
risk reduction?”
can instill asset visibility.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 18
Eight key questions
To understand the current state and then implement controls and processes that can make a
speedy difference, we recommend asking yourself these eight questions:

1 Have you identified the cyber-related risks to which your control network is exposed
and are you actively working to mitigate them?
An OT security risk assessment and cyber maturity assessment can provide you with a high-
level view of what needs to be addressed at both the technical and governance levels.

2 Does an up-to-date inventory of your control network exist?


It’s vital to know what needs protection within your production environment. Many commercial
solutions for automatic asset detection are available which combine discovery and threat-
detection capabilities.

3 What is the integration level between OT and the corporate network?


Ransomware commonly spreads through the network it attacks. Segmentation can limit its
movement such as from the corporate network into OT and vice versa. Industrial intrusion
detection systems (IDS) tools have features that can help with the modeling of a segregated
network.

4 How is remote access to the network managed?


Secure remote access is a vital topic when it comes to maintaining and repairing assets from a
distance, especially in the COVID and post-COVID world. Common remote access types include
Remote Desktop Protocol (RDP) and virtual private network (VPN). Secure remote access
software is now commonly available on the market and should be considered.

5 Is a solid back-up mechanism in place and consistently tested for security?


If OT assets are infiltrated, the only options may be to either pay whatever ransom is being
requested (and, increasingly, it is becoming more common for organizations to take out
ransomware insurance) or to restore a backup. Backups can be complex and the medium where
they are stored is critical to prevent them becoming infected with malware too.

6 What methods are used to apply security patches?


Patch management is essential — and can be difficult if an asset is in use 24/7. Critical assets
must be regularly updated. However, for assets with low criticality, it may be possible to apply a
patch in the next scheduled maintenance interval.

7 What are your current anti-malware solutions?


Early detection is crucial — such as through IDS tools. Detection tools should
be connected to a Security Incident and Event Management (SIEM) system
which should log multiple sources including firewalls, assets and remote access tools so that it
can alert teams to a possible attack.

8 Do you have a zero trust mindset?


Many organizations consider OT to be a walled garden from IT, and anything behind that wall is
trusted. This model has proven to be flawed — we can go back as far as the Stuxnet attack of
2010 when a truly air-gapped system was breached through a compromised vendor. Instead,
organizations need to start adopting a zero trust mindset and architecture that doesn't assume
anything about trust levels, but entails gathering additional context within the network traffic
and then making decisions on what to allow or deny based on this information. While having its
roots in IT, zero trust can be adapted for OT.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 19
Leveraging emerging technologies
Once a solid security foundation
is in place, there is also a role
for AI technologies to play. A
robust security posture calls for
“shifting security to the left”,
that is, expanding preventative
and detection capabilities,
averting threats before they
become damaging incidents.
A robust security posture calls for
This requires asset identification
and characterization, early-stage “shifting security to the left”,
threat detection — and, where that is, expanding preventative and detection
appropriate, autonomous response. capabilities, averting threats before they
AI technologies have been
developed that can provide a way
become damaging incidents.
for organizations to increase these
capabilities with layered applications
of machine learning.
By passively observing and
dynamically understanding the
contextual behavior of all assets,
self-learning AI provides a continually
updated asset inventory that allows
organizations to gain full visibility
into their IT, OT and IT-OT converged
environments. Further, self-learning
AI’s understanding of the nuances
that underpin unusual behavior
allows it to identify threatening
activity at its earliest stages,
presenting the threats to be dealt
with before they can escalate into a
crisis.
Accelerating responses through
machine learning is also of particular
use when defending against
ransomware. Companies must take
decisive action in the moment to
halt the propagation — and machine
learning enables them to assess the
threat faster.
For ransomware threatening
industrial environments, self-
learning AI’s abilities to respond
autonomously — mathematically
calculating the most precise way to
neutralize a threat without affecting
normal operations — is particularly
valuable, as it can disrupt threats in
IT long before they have the chance
to spread into OT systems.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 20
Getting the people and teams
approach right
This brings us back again to the In short, there are things that
question of the boundaries between people in each team can take
IT and OT — in many senses the from each other and teach each
challenge for organizations is to other. Creating a common culture
keep prudent security segregations and sense of team — underlining
between the two while at the same the fact that everyone ultimately
operationally converging them. shares the same objectives — is
key to success. There is often a lack
Key to the success of this balancing Creating a common
of collaboration between IT and
act is people. Both functions should
OT teams, which leads to weak, culture and sense of
learn from each other as they come team — underlining
uncoordinated security programs,
closer together.
as well as poor funding and low the fact that everyone
For example, one of the hallmarks risk awareness. This needs to be ultimately shares the
that is absolutely baked into people overcome through a collaborative
same objectives — is
working within OT environments mindset that recognizes today’s
is the safety and challenge culture. increasing convergence of key to success.
These attitudes should be adopted technology and operations.
within IT. Now that their work
At the same time, there may be
is more directly integrated with
scope to combine teams or aspects
manufacturing or production
of teams for greater clarity and
systems — and the humans
simplicity. For example, there may
physically operating them — IT
be teams managing firewalls on
administrators need to recognize
both sides of the OT/IT fence —
the elevated stakes associated with
removing duplication of effort here
cybersecurity. The resulting cultural
makes business sense and could
change within IT should better
also produce cost savings.
prepare IT processes and workflows
for convergence. It may be some way off in the
future, but as tasks are increasingly
On the other hand, OT processes
carried out remotely — even by
and workflows should be adapted
OT staff who no longer need to
to fit a more regular schedule
be physically on-site for routine
of updates. This approach is
activities — it would not be
necessary to support cybersecurity
surprising if, eventually, IT and OT
in a converged environment that
teams became one. Just as the
contains more connected devices
disciplines of IT and OT themselves
and potential vulnerabilities. IT
may become subsumed into the
administrators are acquainted with
one concept of technology.
this approach and their expertise
should be utilized when designing
new OT processes, systems and
capabilities to support convergence.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 21
Four takeaways
Managing OT in today’s aggressive
cyberattack environment is challenging.
It demands rapid action to reduce the
risks faced and find approaches that
recognize OT’s increasing convergence
with IT.
But it can be done — and here are
some priority tips to check against to
measure your progress.
1 Take best practices from IT
Take the processes that are common
in the IT environment and apply
them to OT. For example, patch
management can be carried across
— it’s not something that has to be
reinvented.
2 Consolidate and combine
Reduce the number of products
and asset management approaches
in use where you can. Simplifying
makes the task more manageable.
Combine groups across OT and IT
where they are carrying out the
same tasks where appropriate too.
Of course, you need to make sure
you are not harming service quality
and standards when doing so.
3 Think strategically — but
also like an attacker
Focus on your long-term program
but don’t lose sight of the here and
now. What are your most valuable
OT assets in a cyber criminal’s eyes
and how are they likely to try to
reach them?
4 Don’t ‘boil the ocean’
Focus on your priority assets and
protect those. If half of your asset
base is already behind a segregated
network, focus on the other half.
Don’t create solutions for things
that are already up to standard —
concentrate on vulnerabilities and
threats.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 22
How KPMG About the authors
firms can Serdar is a partner in the Corporates Consulting
practice at KPMG focusing on cyber and tech

help transformation in energy and consumer sectors.


Previously he was the managing partner for a
big four cyber practice in the Nordics and IBM’s
European leader for cyber risk services before
that. He brings 20 years’ of cyber, cloud and
KPMG firms have extensive Dr Serdar Cabuk digital transformation experience also having
experience of helping oil Partner, Cyber and Technology Risk led major response and recovery operations
and gas and industrial KPMG in the UK with global energy firms during several major
organizations rapidly E: serdar.cabuk@kpmg.co.uk incidents.
reduce the risks in their
OT. We can advise on
and implement industry
best practices, effective
standardization and
available market solutions. Jayne Goble, PhD leads KPMG’s UK
Through our wide range OT and IoT team and has over fifteen
of industry relationships years’ experience working with a range
and work, we ‘speak both of global clients to oversee and deliver a
languages’ — fluent in both Jayne Goble variety of capital projects, ranging from
OT and IT! We can help you Director, Cyber Security responding to critical security failures of
bridge the gap between KPMG in the UK national infrastructure, to deployment of
the two as well as create E: jayne.goble@kpmg.co.uk interception and intelligence platforms.
engagement at all levels
of the organization — from
the boardroom to the
operational control room.
We’d be delighted to talk
to you about any aspect of
accelerating your OT — Ronald is a partner at KPMG in The
keeping it modernized, Netherlands and is the Global Cyber Lead
secure and safe, and for the Energy and Natural Resources
making it fit both for the Ronald Heil sector for KPMG International. He
present and the future. Global Cyber Security Leader for has extensive experience helping
Energy and Natural Resources, international companies connect their
KPMG International and Partner, products and devices to the Internet of
KPMG in the Netherlands Things and providing information security
E: heil.ronald@kpmg.nl and ICS/SCADA advice.

Walter is the Global IOT Lead and the


Technology and Cyber Security Consulting
leader at KPMG in Argentina. During his
20-year career, he has assisted companies in
the application of technology management
best practices, cybersecurity, transformation
and software engineering. He’s led both
Walter Risi technology consulting teams and software
Global IoT Lead and Partner development factories and is currently
KPMG Argentina focused on the convergence of agility and
E: wrisi@kpmg.com.ar cybersecurity in Digital Transformation.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 23
Bringing cyber
process hazard
analysis
to the digital era
Extending process hazard
analysis to cover cyber risks
By: Hossain Alshedoki and Tim Johnson

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 24
Process hazard analysis But as the hardware within industrial OT networks have been multiplying,
(PHA) is an established businesses’ networks becomes soaring five-fold from 2018 to
increasingly enabled by technology, 2020. Out of these, manufacturing
feature of the oil and gas with process control components entities comprised over one-third of
and industrial plant world, communicating with each other confirmed ransomware attacks on
performing reviews and in an Industrial Control System industrial organizations, followed by
remediations over hardware (ICS)/Operational Technology utilities, which made up 10 percent.2
in the operations that (OT) domain, so new risks arise The estimated global cost of these
that demand new levels of PHA. ransomware attacks has skyrocketed
processes depend on. Based Process control components are and has been predicted to reach
on the OHSA 1910.119 no longer standalone items that USD20 billion in 2021— up from
methodology, PHA relies on exist in isolation, shut off from USD325 million in 2015.3 Operational
14 inter-related elements other parts of the ICS domain or disruption due to ransomware in OT
to create a comprehensive information technology (IT) network. environments has seen a 23-fold
ICS/OT requirements to interact increase. In 2020, there was a 32
program to prevent the with IT is producing increasing percent increase in ransomware
release of hazardous convergence, expanding paths attacks against energy and utilities
materials.1 and pivot points through critical organizations.4
process control processes. There
Over time, ransomware attacks
is a growing intersection between
have become more sophisticated
safety systems and process control
and have changed to achieve
systems resulting in new attack
their ends by different methods.
vectors that can be exploited by
Additionally, these kinds of attacks
cyber attackers.
have increasingly targeted ICS
This issue is becoming all too real. environments like oil and gas and
Incidents of ransomware attacks on manufacturing.

Ransomware on the rise5

2017 2018 2019 2020

Ransomware Ransomware Ransomware


generation 1 generation 2 generation 3

— Ransomware focused — Ransomware focused — Ransomware pivots from only


on encrypting file on vulnerabilities business disruption to disruption and
systems and data exfiltration
demanding ransom — Ransomware develops
lateral propagation and — Ransom techniques include
— Simple ransomware, wormable capabilities encryption of data and leakage of
motivated on end sensitive data online if not paid
points — Largely focused on IT
organizations — APT-like behavior starting to come
out with mean time for detection up
to 45 days

— Pivots to ICS environment — oil and


gas, manufacturing, etc.

1
US Department of Labor, Occupational Safety and Health Administration, 1910.119 — Process safety management of highly hazardous chemicals
2
Ransomware in ICS Environments, Dragos, December 2020.
3
Global ransomware damage costs predicted to exceed $265 billion by 2031, Cybersecurity Ventures, June 3, 2021.
4
Claroty Biannual ICS Risk & Vulnerability Report: 1h 2020, Claroty, 2020.
5
Securing a hyperconnected world, KPMG International, 2021.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 25
A rising threat landscape
Ransomware attacks are just one feature of a complex and increasingly aggressive threat
landscape that organizations should protect themselves against. This includes:

Evolving threat actors


Cybercriminals are adapting, diversifying and behaving more like state actors. Criminal
operations are changing their tactics to reduce risks of detection and increase disruptions. They
are attempting to maximize the return on their effort in several ways such as: shifting away
from partnerships to operating within close-knit syndicates; taking advantage of the increased
availability of ICS information to launch attacks; increasing the precision of targeting by using
legitimate documents to identify likely victims before delivering malware; or selling and
buying direct access to networks for ransomware delivery rather than carrying out advanced
intrusions.

Targeted ransomware
There is a complex range of motives at play in targeted ransomware attacks. While the
motivation behind an attack may appear to be financial, there may be hybrid motives at work — a
combination of financial, ideological and/or political drivers. Regardless, such attacks have the
potential to impact the availability of ICS/OT. While the ransomware threat remains, organizations
should ensure they take adequate measures to prepare, prevent, detect, respond, and contain a
corporation-wide ransomware attack.

Supply chain threats


Improved ecosystem hygiene is pushing threats to the supply chain, turning friends into enemies.
The global interconnectedness of business, the wider adoption of traditional industry cyberthreat
countermeasures and improvements to basic cyber security hygiene appear to be pushing
cyberthreat actors to seek new avenues to compromise organizations, such as targeting their
supply chains — including those for software, hardware and the cloud.

Life after meltdown


Vulnerabilities in ICS/OT infrastructure demand tuned/targeted solutions to prevent impact
to availability. The discovery of vulnerabilities in proprietary process control hardware such as
programmable logic controllers (PLCs), in recent years combined with the use of commercial
software and hardware used for human machine interfaces (HMIs), Engineering Workstations, and
ICS supporting systems such as Historians, have an impact on system availability increasing the risk
to organizations which could lead to loss of life.

Compromising geopolitics
As new threats emerge from disinformation and technology evolution, global businesses may
find themselves in the crosshairs as geopolitical tensions persist. Cyberthreat actors may
not only sustain current levels of activity but also take advantage of new capabilities as new
technologies enable more sophisticated tactics, techniques and procedures (TTPs) which are
focused on ICS/OT environments.6

6
Security magazine, Five factors influencing the cyber security threat landscape (2019)

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 26
Strengthening defenses
through cyber PHA
As a result of these factors, A cyber PHA can help identify,
expansion of traditional PHA verify, and design ICS/OT domain
is required to protect process boundaries. The Cyber PHA is a
control performed in the ICS/OT safety-oriented methodology to
domain. This need is made more identify and assess cyber risk for ICS/
acute because safety system OT domains and safety instrumented
communication is becoming systems (SIS). It usually follows a
integrated into the ICS/OT domain methodology similar to a HAZOP
The Cyber PHA is a
as these systems become more (hazard and operability study) but
digitized and connected. If the adapted for cyber specifically — to be safety-oriented
interconnected safety system
is compromised, the ability to
known as CHAZOP.
methodology
control a runaway process is
A cyber PHA is typically performed to identify and
in phases, is scalable, and can be assess cyber risk for
compromised — potentially leading
applied to individual systems, or
to environmental and operational
entire facilities or enterprises. There
ICS/OT domains and
hazards, and even loss of life. And safety instrumented
are six key phases:
with control and safety systems
systems (SIS).
becoming more converged with 1 The site personnel and threat
IT systems, a cyber breach into IT assessor - the Hazard and
could then more easily spread into Operability team (HAZOP) should
the ICS/OT domain as well. align and agree on the focus area
that will be assessed.
That is why additional Cyber PHA is
needed, to address the cyber risks 2 Gather information about the OT
and threats that now characterize components with the OT network
today’s industrial landscape. and the SIS, and its connections
Welcome to cyber PHA. to identify vulnerabilities.
In an ideal world, the first step 3 Analyze the data and document
is to ensure that your ICS/OT potential vulnerabilities that may
domain is cyber resilient through be exploited during a cyber event.
network segmentation. This
4 Conduct a cyber PHA workshop
involves segmentation of the
where information is gathered,
network into zones and conduits,
analyzed and integrated with
and a distinct boundary between
threat scenarios to develop a
IT and ICS/OT domains. This is the
complete picture of risks.
premise of IEC 62443, a series of
standards to guide on secure ICS/ 5 Once the cyber PHA is
OT. It covers general guidance, completed, a broad report is
policy and procedures, system produced showing the risks to
technology and design, as well the ICS/OT domains and SIS, and
as component requirements. In a plan to mitigate risks to the
any event, regardless of whether organization’s acceptable level.
formal network segmentation is in
6 An effective remediation plan
place, there should be a focus on
includes a prioritized list of actions,
bolstering cyber resiliency such that
budgetary estimates, schedule,
operations can continue to function
and resource requirements, which
even if a threat actor has penetrated
together can provide appropriate
the perimeter of a network.
levels of resiliency.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 27
An ideal scenario would see a cyber PHA carried out as
a follow-on shortly after a traditional PHA, building on its
findings to identify and address cyber issues.
The outcome of the hazard and risk analysis should
identify potential hazards and vulnerabilities while
providing actionable risk themes facilitating practical
recommendations for implementation. Although the cyber
security threat landscape is continually changing, there
are general classifications of potential threat agents or
sources for an organization to consider:

1 6
External attack — System
technical malfunction

2 7
Internal attack — Process
non-technical interruption

3 8
Internal misuse Safety-system
and abuse interruption

4 9
Unauthorized Human
access error

5 10
Compromise of Unforeseen
information effect
(Logic Mod) of changes

A detailed cyber security roadmap can be developed and


broken into summarized key quick wins, multiple short-
term remediations, and long-term strategic alignments to
align OT and IT security programs.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 28
The benefits of cyber PHA
There are multiple potential benefits facilitating vulnerability and risk
to be gained from conducting management.
a cyber PHA. Most obviously,
— Targeted and prioritized
ensuring system availability by
cyber response and incident
removing system cyber risk. But
management.
a cyber PHA can also benefit an
organization’s broader business — SecOps defined metrics,
practices. Applying a cyber PHA reporting, and technology
methodology documents an requirements to help meet
The Cyber PHA is a
organization’s business processes business objectives. safety-oriented
and requires the creation of ICS/OT
aligned information security policies,
A cyber PHA also gives methodology
organizations the visibility from to identify and
procedures, standards and controls
a cyber point of view that can be
with organization objectives. assess cyber risk for
leveraged to expedite ICS/OT and IT
— Clearly defined articulation of convergence, thus helping achieve ICS/OT domains and
the information security strategy what is rapidly becoming a key safety instrumented
based on organization and strategic aim for many businesses. systems (SIS).
business unit objectives. ICS/OT and IT convergence
has the potential to create and
— Engineering knowledge defined
streamline the exchange of data
and aligned security controls
facilitating business operations.
based on risk and business
But cyber risks are hindering this
objectives.
IT/OT convergence — so carrying
— Confident effective staffing out a rigorous cyber PHA that
resulting from established roles helps identify operational risk,
and responsibilities. required mitigations, and residual
risk, can provide the data to
— Interconnected system cause
give management confidence in
and impact identification
pursuing the convergence agenda.

Cyber PHA on the regulatory radar


But cyber PHA is not only a matter oil and gas and other critical
of potential business benefits and infrastructure entities should
best practice — it is also coming conduct formal process hazard
onto the regulatory radar and may, in analysis which should include, as
varying shapes and forms, become a minimum, qualitative analysis of
mandatory in the coming years. cyber risks.7
Indeed, in Saudi Arabia the National If this becomes adopted into the
Cyber Authority has already launched framework, it will effectively be
a new regulatory framework for making cyber PHA a mandatory
Operational Technology which regulatory requirement — and that
includes a specific revision that could take effect later on this year.

7
National Cybersecurity Authority, Operational Technology Cybersecurity Controls (2022)

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 29
Meanwhile in the US, new measures
have been introduced by the
Department of Homeland Security
(DHS) in the wake of last year’s Gas
Pipeline cyberattack which disrupted
the flow of gasoline and jet and
diesel fuel along the East Coast.
The DHS issued two Transportation
Security Administration (TSA) The direction of travel is towards more
Security Directives that feature a
number of measures that owners formalized regulatory requirements
and operators of critical oil and gas around the cyber-related aspects of operational safety —
pipelines must implement.8 The the very area that cyber PHA is designed for.
first directive features guidance
around cyber security incident
reporting, the appointment of an
organizational cyber coordinator,
and gap assessment. The second
directive is the one that really has
teeth, requiring specific mitigation
measures, a formal cyber security
contingency and response plan, and
an annual review of cyber security
architecture.
These requirements, that also
include the need to carry out an
analysis of network traffic in OT
systems, can almost be regarded
as ‘cyber PHA-lite’. What DHS is
really asking of these companies is
to quickly gain an appreciation of the
unique systemwide cyber security
components and communications,
as well as the interdependencies of
IT and OT and the protections that
are, or are not, in place.
Elsewhere, the International
Electrotechnical Commission (IEC) published a worksheet (NA 163) PHA is designed for. At present,
61511 Functional Safety standard titled “Security assessment of SIS.” there may be few jurisdictions who
now requires a SIS security risk Here, a cyber PHA methodology can are explicitly moving in a cyber PHA
assessment. The updated report be used to assess the risks linked to regulatory direction, but the number
summarizes the risk assessment identified cyber security escalation may quickly grow. In addition, due
procedure called cyber PHA. The factors and recommended to the global and inter-connected
link to PHA here is a step in the risk mitigations to reduce risks to a nature of the energy and natural
assessment to firstly, review the certain level. By creating a bridge resources industry, requirements
output of the PHA to identify worst- between PHA methods and cyber in one jurisdiction are likely to
case health, safety, security, and security risk assessment methods, be felt elsewhere by others. If
environment (HSSE) consequences safety systems become more robust a supermajor operating in Saudi
for the asset and secondly, to against cyber security attacks. Arabia, for example, becomes
identify any hazard scenarios. required to conduct a cyber PHA,
In short, the direction of travel is
Another example comes from the then it may ask the partner
towards more formalized regulatory
User Association of Automation organizations it works with in other
requirements around the cyber-
Technology in Process Industries parts of the world to carry one out
related aspects of operational
(NAMUR), who have already too. A rising tide lifts all boats after all!
safety — the very area that cyber

8
Department of Homeland Security, DHS Announces New Cybersecurity Requirements for Surface Transportation Owners and Operators (2021)

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 30
How KPMG
firms can help About the authors
KPMG firms have already Hossain is an IT/OT Cyber Security leader,
helped a number of clients by specializing in leading teams within a
leading and performing a cyber converged business and operational
PHA. Our multidisciplinary technology environment. Hossain provides
teams with extensive sector intermediary client stakeholder guidance from
experience work closely with technical design to board level in areas that
CISOs, CTOs and Risk teams utilizes Industrial Controls Systems (ICS), Big
at a corporate level, as well as Data integration, SCADA, DCS, SIS, IoT and
Plant Managers, Operations, IIoT. Hossain comes from an engineering
and other ICS/OT domain key background with a Cyber Security focus on
stakeholders. Hossain Alshedoki technical critical infrastructure and consulting
IT/OT Cyber Security & in different sectors have been instrumental
For example, we helped one
Data Privacy Energy and in the firm's growth and success within the
firm’s client who needed to
Natural Resources Lead, Cyber Security space and a major contributor
standardize its processes
KPMG in Saudi Arabia to the Kingdom of Saudi Arabia vision 2030 on
across a heterogenous
E: halshedoki@kpmg.com a national level.
environment of systems across
multiple vendors, bringing
all to the same operating
security level. Following a gap
assessment and stakeholder
interviews, we conducted
an analysis based on cyber
PHA as part of the response
alongside other technical Tim is a seasoned cyber security leader
security assessments, the with significant experience leading some of
design of zones and conduits the world's most influential organizations
for two different types of ICS through cyber security transformation of
network, and the design of Industrial Control System (ICS) technology
monitoring dashboards to better and governance. During Tim's career in
understand risk exposure. Tim Johnson critical infrastructure and consulting, he
Director Advisory, has built a reputation for safeguarding ICS
If you would like to discuss any
Cyber Security Services availability while implementing cyber security
aspect of a cyber PHA and how
KPMG in the US and governance requirements across various
it relates to your broader IT and
E: timjohnson@kpmg.com industries.
OT security posture, please
don’t hesitate to get in touch.
After all, the signs are that
cyber PHA requirements are
coming down the pipe and may
soon be expected of increasing
numbers of industrial players.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 31
Safeguard your
digital environments
from all angles
Five steps to beginning the ‘zero trust’ journey
By: Ronald Heil, Manuel Kanagasuntherie, Dani Michaux and Brad
Raiford

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 32
If oil and gas companies weren’t were built to last and operate for a
already on notice, recent events long time, the downside is that its
should have hammered home the cyber protection is outdated. And
message that they need to shore up in addition to the usual “in-it for the
cyber defense protections of their money” cybercriminals, the oil and
digital networks. As information gas industry has to contend with
technology, operations technology environmental “zealots” who are not
and IoT departments — and the above trying to sabotage business
hardware and software systems they
access — continue to converge, the
operations by hacking into computer
systems.2
More
need for digital security becomes
That’s why it’s high time for the
companies
even more critical as an exposure in
any one area can spill over to others.
oil and gas industry to likewise using zero trust
evolve and take the next step
In a similar fashion, oil and gas
companies have a complex
ecosystem of partners, suppliers
forward in protecting their business,
employees and customers by
adopting a “zero trust” approach.
80%
and service providers, many of The zero trust approach enables you
of new digital business
whom have connected computer to set up adaptive and continuous applications opened up
networks. If any one of these third protection for users, data and to ecosystem partners
parties experience a cyber breach, it assets that proactively manages will be accessed through
can endanger the systems of the oil risk through key enforcement zero trust network
or gas company with whom they’re points. This allows you to potentially
doing business.1 continue operating your business
access by 2022
even while under attack. Source: Gartner
What’s more, cyber criminals are
continuously evolving, becoming So, for example, the zero trust
more creative and devious, and approach could have significantly
wreaking more havoc on businesses, mitigated damages in the Colonial
consumers and governments. Pipeline incident. Colonial could
And oil and gas companies are have simply walled off the part
particularly susceptible. of their operations infected with
the “ransomware” and continued
Their headquarters, operations and
to operate while simultaneously
power plants, production sites,
fighting the cybercriminals; but
gathering systems, refineries,
since it couldn’t be certain that the
chemicals processing sites, and
“infection” wouldn’t spread, it opted
midstream pipelines, as well as their
to essentially shut down its entire
wider partner, supplier and services
business operations.3
interconnections, are often spread
out over wide geographic areas Although the zero trust concept has
around the globe, leaving them been around for quite some time,
precariously exposed. And because only recently has the technology
many locations and sites involve caught up to it and made it feasible.
more than one firm — for example, In other words, since zero trust
one company owns an oil platform typically relies on cloud/hybrid cloud
but another operates it — the lines adoption, identity, and network
for responsibility for security get modernization, only recently has it
blurred. become conducive for companies to
realize the full potential value of zero
What’s more, their digital networks
trust. In this report, we will explore
and physical equipment are
the zero trust journey, what it is,
frequently in need of updating for
how it works, and how to design and
cyber security purposes; while they
implement a program.

1
Shell, Third-party cyber security incident impacts Shell (3/16/21).
2
The Intercept, Dakota Access Pipeline Activists Face 110 Years in Prison (2019).
3
 he Hill, Embracing zero trust is the right answer to the colonial-pipeline-hack (2021); Cyolo, 4 Cybersecurity breaches in Q2 2021 & how to prevent them
T
from reoccurring (July 7, 2021).

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 33
Cyber crime is big and growing
Opportunities for cyber breaches play both nationally and globally, Even the US government
have expanded exponentially over and depending on the nature and has strongly endorsed the
the past several years. New, more severity of a breach, a company’s zero trust concept. The Biden
mobile working arrangements, ability to survive as an ongoing Administration recently rolled
innovative cloud technology, and entity can be called into question. out a zero trust mandate for
increased business dealings with federal agencies, and the fallout
vendors and other third parties have That’s why more companies are
is expected to ultimately filter
created a more porous perimeter, taking a zero trust approach to
down to private industry.6
increasing the attack surface and shore up their cyber defenses.
exposing vulnerabilities (i.e., more
opportunities) for cybercriminal
attacks. In the face of these
developments, the traditional
“cyber security perimeter” defense Exhibit A: Outdated castle cyber defense setup
[See Exhibit A] has become far less Below is an example of the traditional “castle-moat”
effective, enabling cyber criminals security defense system
and other “bad actors” to exploit
weaknesses and holes with more
frequency and do far more damage.
By 2025, global cybercrime damage
is expected to reach $10.5 trillion Vault
annually.4 And in the US in 2020,
the average data breach cost
Courtyard
organizations $8.64 million.5
Aside from a purely dollars-and-
Castle
cents damage, these breaches
can also have worker safety as
well as environmental and safety
implications on the surrounding
communities. They can also
jeopardize a company’s brand
and reputation, undermining its
customers’ trust in the reliability
of the company and the safety of
their private data. In addition, these
breaches also expose the company Moat Castle wall
to litigation and regulatory penalties.
For oil and gas companies,
the stakes can be even higher.
Considering the essential role they

4
Cybercrime Magazine, Cybercrime To Cost The World $10.5 Trillion Annually By 2025 (November 13, 2020).
5
Statista, Average organizational cost to a business in the United States after a data breach from 2006 to 2020 (November 15, 2021).
6
 he White House, Executive order on improving the nation’s cybersecurity (May 12, 2021); OMB Memo M-22-09, Moving the US Government
T
Toward Zero Trust Cybersecurity Principles (Jan. 26, 2022); mimecast: Cyber Resilient Insights, Biden Aims to Drive Zero-Trust Architecture
Nationwide (Jan. 20, 2022).

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 34
Zero trust basics:
The perimeter-less border
With zero trust, you establish what device they’re using — is identified,
is often referred to as a “perimeter- assessed, authenticated and
less” defense system7 based on authorized in light of the system
the principal of never trusting and they are trying to access, and that
always verifying individuals and session is continuously monitored.
devices, regardless of whether And when they seek to access
they are inside or outside of the another system, the process is
organization. Before access to done all over again.
a system or app is granted, the
So using the castle analogy once With zero trust,
person or device seeking access
must be identified, assessed,
individuals manage to cross the whomever (or
moat, they would have to go whatever) attempts to
verified and authorized. And this
through a reauthorization process
authentication process takes
to get through the front door.
access your systems —
place each and every step of the along with the device
And the same thing would occur
way. However, from the user’s
whenever they attempted to move they’re using — is
perspective, the process is quick,
easy and seamless — unless issues
to a different part of the castle.
In some cases, depending on the
identified,
are detected.
individual’s approved authorization, assessed,
This stands in marked contrast to
the traditional “castle and moat”
he or she would only be allowed to
go directly to a particular room; in
authenticated
cyber security defense, where once fact, the individual wouldn’t even and authorized
a person (or device) manages to have visibility into any other room in in light of the system
cross the moat and enter or breach the castle. (Think hotel or building they are trying to
the front door or wall of the castle, elevator that only takes you to a
there’s relatively easy access to the particular floor.)
access, and that
“crown jewels.” That approach is session is continuously
Taking it one step further, with
no longer enough in this new world monitored.
the right zero trust model that is
environment where cyber criminals
implemented properly, an individual
are more cunning then ever and
would only be able to go directly
more employees — as well as
to the bathroom off of a particular
vendors, contractors, suppliers
guest bedroom (assuming the
and even business partners —
bathroom was the intended
need immediate access to data
destination). And with today’s
from enterprise apps and systems
powerful computer capabilities,
located anywhere in the world and
the identification/authentication/
from any device via the internet.
authorization process would
With zero trust, whomever (or occur seamlessly and nearly
whatever) attempts to access instantaneously (or at least quickly).
your systems — along with the

7
Technically, a zero trust process is not truly perimeter-less. Zero trust does not rely on the traditional “moat” style perimeter, but instead replaces it with
hundreds and thousands of smaller perimeters, each one wrapping around every user, device, connection and so on.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 35
Principles of zero trust
Key potential
Principles are the lynchpin to zero trust.
All solutions should embrace multiple of
benefits of
them to align with the overall enterprise
vision of zero trust.
zero trust
01 "Perimeter-less" design — Connecting from a
particular network must not determine which
Key potential benefits of a zero trust
approach are that (1) it prevents bad
services you can access actors from getting authorized and
then accessing your system and (2)
in the event of an initial breach, your

02 Context-aware — Access to services is


granted based on what we know about you
company would be able to detect
and isolate the intruding person,
and your device device or “bug” and turn off its
access to the system, not allowing
it to pivot or escalate the attack.

03 Dynamic access controls — All access to services


For example, one of the world’s
leading shipping companies,
must be authenticated, authorized, and encrypted was brought to a standstill by
cybercriminals who installed
ransomware on a local office server
in the Ukraine. The virus then
04 Continuous assessment — Shifts away from spread throughout the company’s
one-time binary decisions entire global network, causing an
estimated $250–$300 million in
damages. But a zero trust approach,
with its multiple reauthentication
05 Fine-grained segmentation — Uses granular
policies and controls to segment network and
security and continuous session
monitoring process, could have
access limited the damage to the Ukraine
and not caused a company-wide
shut down.8

06 Active risk analysis — Discovers, monitors,


assesses and prioritizes risk, both reactively and
Similarly, in 2021, a state-owned oil
company was the victim of a cyber
proactively attack. The perpetrator accessed
confidential data through the
system of a third-party contractor
with whom the company did
07 Establish and review trust — Performs risk and business. Although its business
trust assessments early and often operations weren’t interrupted,
the cybercriminal demanded
$50 million from the company or
threatened to sell the information
08 Real-time monitoring — Continuous feedback
to any other party for $5 million.
Had the company been operating
and anomaly detection
a zero trust strategy, it’s unlikely
its systems would have been
breached.9

8
Forbes, Why manufacturing supply chains need zero trust. (2019)
9
Flashpoint, Saudi Aramco Data Breach Highlights Risks to Oil and Gas Industry (2021).

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 36
There are a host of other
potential benefits to be gained
by a zero trust approach. For
example, it can:
KPMG helps global retailer implement zero
trust program
Due to the COVID-19 pandemic, a global retail client’s entire
workforce started working remotely from home and connecting
Improve network to their network through virtual private network (VPN). The
visibility, breach employees were using a cloud-based collaboration platform
detection, and to work with their teams. In addition, the company started
leveraging more cloud-based applications and platforms to
risk vulnerability support the business.
management.
This led to a significant increase in VPN traffic, poor network
performance, and a poor user experience. What’s more, the
increased work from outside the office from a variety of devices
increased the potential for a cyber breach.
Client solution: KPMG helped the client implement a zero trust
process that enabled it to secure the new cloud environments
Break down by shifting away from one-time binary access decisions to
interdepartmental contextual, risk and trust-based decisions. This allowed remote
siloes as IT, HR, users to access their data and resources securely over the
marketing, operations Internet while also reducing the amount of VPN traffic and
compliance and others providing a better user experience.
need to work together
to get it right.

Reduced both capital


Getting started on your
and operational costs in
the long-term. zero trust journey
A critical element in designing technology, IOT, HR, compliance
and implementing a zero trust and regulatory, and sales and
architecture is understanding marketing — to get it right.
that it may represent a cultural
The zero trust security architecture
Enables and supports change and challenge to your
must integrate with the
digital business organization. Therefore, you will
organization’s security and IT
transformation and need commitment from senior
environments to enable speed and
management to help overcome
improved business resistance to it.
agility, improve incident response,
agility. and support policy accuracy and the
And while the CIO and the delegation of responsibilities. At
cybersecurity department may the same time, the authentication
lead the effort, you also need and reauthentication measures
the buy-in and cooperation of the cannot unduly burden the normal
entire organization — including operations of the business,
information technology, operational particularly in terms of wasted time.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 37
Here are some key steps to help you get started on your journey:

Determine what you’re trying to achieve:

1 Don’t start with the solution. Determine what needs improvement and which
zero trust components make sense. Also, keep in mind that the zero trust model
doesn’t have to be implemented all at once; it can be phased in and tailored to your
organization’s level of maturity.

Identify and prioritize which data and assets are most valuable:
Collect as much information as possible about the current state of assets,
network infrastructure and communications. Also, classify the level of 2
“sensitivity” of each asset, for example, the customer database, source codes,
confidential or proprietary information (e.g., business process), the HR portal.
Which are “restricted,” “highly restricted,” and so on.

Map data flows across your network.

3 This step is a primary reason why you need the input and cooperation of multiple departments and
not just cybersecurity and IT; the zero trust approach impacts everyone. The data flows include:
— North-South traffic, such as from a front-end web portal to back-end servers.
— East-West traffic, such as purchase information to fulfillment and accounting systems within the
corporate network.

Group assets with similar functionalities and sensitivity levels into the same
micro-segment.
This will help you determine when and where authentication and reauthentication may be needed, 4
so you can
— Deploy a segmentation gateway: This can be virtual or physical and will enable you to achieve
control over each segment.
— Define a “least privilege” access policy to each of these assets, whereby access to services
is granted based on context and the risk profile of users and devices (e.g., a public device,
based in a suspicious location or on company premises), and all access must be authenticated,
authorized, and encrypted.

Select the right technologies and services to support zero trust:


The cybersecurity team will be instrumental in this decision, but will certainly need
5 input from other departments, including finance. It’s critical to build in flexibility that
will be needed to adapt to everchanging risks and the ability to conduct real-time
monitoring and continuous assessment and anomaly detection.
— When making the presentation to senior management or other decision makers,
be prepared with a final estimate of resources needed as well as the proposed
timing for implementation.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 38
Continue on
If done correctly, a zero trust approach doesn't
just block cyber criminals and bad actors from your zero trust
doing things they shouldn’t be able to do; it
enables people to do their jobs better — with journey — or
less friction and a higher degree of security”
Brad Raiford
Director, Cyber Security Services
start today
KPMG in the US
The oil and gas industry is a
particularly inviting target for
cybercriminals. It is a financially
Key elements of the zero trust approach lucrative enterprise, it plays an
outsized role in meeting the needs
The four key elements of zero trust are the single sign on, multi of billions of people around the
factor authentication, context inspection and anomaly detection. world, its operations are widely
dispersed, and its accumulated
01. Single Sign On [SSO] technology debt and outdated
03. Context Inspection cyber defense systems have left
Seamless integration
— Device identity it vulnerable. It’s time to move
with a broad range of
— Geo-location forward and reimagine these
third-party identity SSO
— Time of connection defensive capabilities by utilizing a
service providers.
— Connection type zero trust approach.
[VPN, wireless]
Zero trust is flexible enough to
be adapted to meet the needs of
your organization, its culture and
its workforce. Most oil and gas
companies already have some
Identity manner of zero trust enabled
technologies within their network
environments. So for them, it’s a
Identity
confirmation matter of building on what they
have already towards a stronger,
02. Multi Factor 04. Anomaly Detection more complete zero trust world.
Authentication [MFA] Whether you have parts of a
— Multiple unsuccessful
zero trust program in place or are
Seamless integration with a login attempts
starting from scratch, keep in mind
broad range of third-party — Unrecognized device
that it can be matured over time
identity and Multi-Factor — Unusual time and
depending on your resources and
Authentication service location
readiness level. But the key is to get
providers.
started or continue on your journey.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 39
How KPMG Zero trust as the future security design
Provide a strategic path and architecture

can help solution design based on zero trust principles.


Demonstrate current-state maturity, develop
zero trust design, and deliver roadmap for
integrated future solutions.
KPMG firms can help organizations
implement zero trust models
starting with strategic business
case orientation, helping create Accelerate zero trust adoption
roadmaps leading all the way up Implement key solutions that are building
to technology integrations and blocks of zero trust journey — e.g., Build
implementations. Our professionals the Target Operating Model, Advanced/
understand oil and gas systems, Risk-based access model, network
processes, and complete cyber segmentation/SDP, proxy architecture,
challenges. Our first-hand and API security and management.
experience with industry operations
and cultures can help determine
the best method and technology
options to solve the most COVID-19 and SolarWinds
complex and urgent cyber security Embed zero trust models and solutions as
challenges while strengthening part of organization’s digital transformation,
your organization’s ability to handle supply chain, and shift-left security initiatives.
emerging and evolving threats.
Cyber security regulation,
malicious actors, acts of nature,
and accidents will not slow down
Alliances and technology leadership
while organizations leaders are
Support program and technology
thinking about their next cyber
transformation by leveraging our
security steps. Start planning or
ecosystem of alliances and partnerships
continuing your zero trust model
with leading zero trust products and
implementation now so your
technology solutions.
organization is more prepared for
what might happen next.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 40
About the authors
Ronald is a partner at KPMG in The Netherlands and is the Global
Cyber Lead for the Energy and Natural Resources sector. He has
extensive experience helping international companies in the banking,
insurance, health, entertainment and other industries connect their
products and devices to the Internet of Things and providing complex
IT security and ICS/SCADA advice.
Ronald Heil He specializes in large scale penetration testing services in industrial
Partner, Global Cyber Security Leader and other environments, including complex technical challenges
for Energy and Natural Resources and computer security incident response services, networking
KPMG in the Netherlands & infrastructure security design and review (e.g., complex Cloud
E: heil.ronald@kpmg.nl services) and large scale IT Audit services.

Manuel is an experienced Enterprise Architect focused on


Cybersecurity with a 20-year track record for delivering successful
results across a wide range of programs including Digital
Transformation (Cloud), Architecture transformation (Enterprise,
Security and Zero Trust), M&A and Divestitures, Vendor
Management, and Target Operating Model for global client base.
Manuel Kanagasuntherie He has architected and led digital transformations, developed cyber
Senior Manager, Cyber Security Services strategies, developed and implemented new operating models and
KPMG in the UK as well as significant technology enabled business change & culture
E: manuel.kanagasuntherie@kpmg.co.uk programs.

Dani is the leader of the Cyber Security EMA practice and is the
Head of the Cyber Security practice in Ireland. She previously led
the Cyber Security and Emerging Technology Risk Practices for
KPMG in Malaysia and the ASPAC region and KPMG’s global IoT
working group. Dani has worked with government agencies on
Dani Michaux national cyber security strategies and with international regulatory
Partner, EMA Cyber Security leader bodies on cyber risk agenda and regulatory landscape. She also is
KPMG in Ireland an advocate for inclusion & diversity, and women participation in
E: dani.michaux@kpmg.ie computer science and cyber degrees.

Brad Raiford is national lead for IoT & OT Cyber Defense for
KPMG in the US. Brad focuses on embedding the principles of
Brad Raiford cyber-informed engineering into IoT/OT zero trust transformation,
Director, Cyber Security Services trusted autonomy, and cyber automation architecture. He has vast
KPMG in the US experience working with US and international companies building
E: braiford@kpmg.com solutions for challenges today and beyond tomorrow.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 41
KPMG’s Global Energy Institute
The KPMG Global Energy Institute together with member firm clients,
(GEI), launched online in 2007, is external partners and the global
a worldwide knowledge-sharing KPMG network of energy experts
platform detailing insight into current in analyzing the some of the most
issues and emerging trends within pressing challenges facing the
the gas, oil, power, and utilities industry and in developing practical
industries. The GEI helps to shed light solutions for an increasingly complex
on key topics ranging from upstream energy environment.
volatility, midstream constraints,
and industry consolidation, shifting
A complimentary GEI membership The GEI
customer demands and new
is an effective way for energy
executives to gather the latest
interacts with
technologies, alternative and
renewable energy, smart grid
information on trends affecting its over
40,000
the industry and help meet their
technology and transformation,
continuing education requirements.
evolving regulatory and statutory
Members receive early alerts and
requirements, as well as financial
invitations to thought leadership, members through a
reporting and tax updates.
studies, events, and webcasts about
The GEI interacts with its over key industry topics.
variety of channels,
40,000 members through a variety including webcasts,
To receive timely updates and
of channels, including webcasts, publications and white
insights relevant to the oil and gas
publications and white papers,
industry, become a member of the
papers, podcasts,
podcasts, events, and quarterly events, and quarterly
KPMG Global Energy Institute today
newsletters. The institute works
by visiting home.kpmg/energy. newsletters.

Energy industry insights


2021 KPMG CEO Outlook

The energy industry continues to be an enabling and necessary resource as organizations across all
industries begin preparing for a new reality and recovery from the impact of COVID-19.
Energy Taxation Directive
Energy CEOs remain resilient and focused on long-term, sustainable growth,
despite increased uncertainty

100%
The green,
electric future
93%
86% Introduction
77%
KPMG IMPACT is a platform to support and empower KPMG professionals to assist clients in fulfilling their
55% 57% purpose and helping deliver on the UN Sustainable Development Goals (SDG).
50% 45% One focus of KPMG IMPACT is on the latest global climate policy developments and their possible impact

of oil and gas


on international business. To assist with communication of these issues, we have decided to produce a
14% newsletter (on an occasional basis) for those who are interested in the latest climate and decarbonization
developments.

Growth prospects for your company Growth prospects for the global economy Growth prospects for the energy sector Background
Collectively, the EU Member States are a major The European Commission plans to use a program of
2020 KPMG CEO Outlook Survey 2021 KPMG CEO Outlook Pulse Survey 2021 CEO Outlook Survey contributor to the world’s greenhouse gas problem. interventions — with individual components categorized
To address this, on Wednesday 14 July the European as “pricing”, “targets” or “rules” — that will operate Five avenues to allow the traditional oil
Commission (EC) tabled a series of significant carbon together to achieve its objectives. and gas industry to play a more pivotal
reforms as part of its ‘Fit for 55 package’ to meet its
2030 emission goals. Emissions are already 24% below
The main instrument for reducing emissions will likely role in a net-zero world
Climate Change remains top risk for Energy CEOs 1990 levels but the EU is not complacent. Its Fit for 55
continue to be the EU Emissions Trading System (ETS).
Revisions to the ETS were also announced in July and it is
package is a broad range of measures, documented
expected to bring into scope shipping, road and buildings
across hundreds of pages, that sets out the European
emissions for the first time. This will likely operate
Commission’s plans for achieving its 2030 target and then
Energy CEOs now believe that Which of the following risks pose the greatest threat alongside the Energy Taxation Directive as it has done
progressing to carbon “net zero” (i.e. a position where no
environmental and climate change to your organization’s growth over the next 3 years? more carbon dioxide is emitted than is removed from the
since 2005. The ETS is sometimes thought of as a tax but
risk pose the greatest threat to it is, in fact a system for limiting emissions. It does so by
atmosphere) by 2050.
Internal unethical culture risk making certain sectors pay for emission capacity.
their organization’s
Energy industry growth
Interest rate risk
Figure 1: Tax Measures (and other interventions) in the EU Green Deal
Reputational/brand risk

37%
Energy industry Talent risk
37% Green Deal — Net zero emissions — 2050 (to be legislated)
— 50–55 percent emissions reductions from 1990 levels by 2030

Environmental/
Plastics — Revenue collection based on non recycled plastic consumption 10–15 major economies will be levied
climate change risk tax — Each to design own Plastics Tax — different state taxes
Return to territorialism
Energy Taxation — Broad tax base now including aviation, maritime and fishing.
— Tax rates according to energy content and environmental content, not volume.
Regulatory risk Directive (ETD) — Price signals reinforcing innovation and investment. Anti-fossil fuels.

Operational risk Carbon Border


Adjustment Mechanism — Shadow ETS applied to certain high emissions imported covered goods
— Aim: applies equivalent carbon costs between imports and locally produced goods
(CBAM) February 2021
12% All industries
Emerging/disruptive technology
risk
Tax risk
2021 CEO Survey
2021 Pulse Survey
Emissions Trading
System (ETS)
— Pricing of carbon inside the EU with many sectors regulated through the ETS
— Withdrawal of some free allocations in parallel with CBAM introduction
2020 PulseSurvey kpmg.com/energy
Cyber security risk Source: KPMG 2021
Supply chain risk

0% 10% 20% 30% 40% 50%


Source: KPMG 2021 CEO Outlook 1 Energy Taxation Directive
© 2021 Copyright owned by one or more of the KPMG International entities. KPMG International entities provide no services to clients. All rights reserved
© 2021 Copyright owned by one or more of the KPMG International entities. KPMG International entities provide no services to clients. All rights reserved.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 42
KPMG Cyber Security Services
KPMG professionals have a deep security capabilities are truly global,
industry-specific understanding of with over 3,200 information security
information security challenges in professionals across the world
the Energy and Natural Resources
KPMG Cyber Security Services offers
(ENR) sector, including IT and
a four-pillar approach to present a
OT within power and utilities, oil
globally consistent set of services.
and gas, renewables, chemicals
These services are aligned to
and mining. KPMG’s global Cyber
clients’ business priorities to provide
Security Services is an award-
reassurance and help them address
winning market leader in Cyber
the challenges that they are tackling.
Security Consulting. Our cyber

Strategy & Transformation Cyber defense Cyber response


governance Accelerate your initiatives Confidently seize Operate with confidence
Turn risk into competitive in an agile world. opportunities. in a digital world.
advantage.
Helping clients build and Helping clients maintain Helping clients effectively
Helping clients determine improve their programs their cyber agenda as and efficiently respond to
the appropriate levels of and processes, supported their business and cyber incidents and
acceptable risk and by the right organization technology programs conduct forensic analysis
understand how best to and technology, to evolve by providing and detailed investigations.
align their cyber agenda improve their cyber greater visibility and A holistic, adaptive
with their dynamic agenda understanding of strategy aligned to your
business and compliance changing risks business goals
priorities

Aligned with client business priorities and compliance needs

Services across all pillars:


— Operational technology security, resilience and transformation
— Digital cyber security — Cloud | Mobile | Internet of Things | Intelligent Automation | Blockchain
— Secure automation

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 43
Annually, KPMG is identified as a leader across
many key analyst reports that affect clients’ most
pressing business challenges.

KPMG brand recognition among


Energy and Resources consulting
firms.
KPMG rated as most familiar brand for Energy
and Resources consulting from a list of the
world’s top 15 consulting organization. KPMG
also earned top marks for quality by Energy and
Resources clients. This recognition includes
ranking second for quality of work in data and
analytics and third for quality of work in risk
management (including cyber security) by clients
in the Energy and Resources sector.
Based on 238 responses to a survey of senior clients of
consulting firms and featured in Perceptions of Consulting
in Energy & Resources in 2021 published by Source
Global Research.

KPMG brand and risk consulting


services received top score by
clients and prospects.
KPMG ranked number one for ‘current brand
score’ among risk advisory firms and for the
quality of our Security services. KPMG received
the highest score of the 16 vendors evaluated in
this category — a high achievement determined
by clients and prospects alone. This ranking is
based on mindshare, our level of credibility,
authority, and competitive resilience — and
topping this ranking recognizes our brand as the
strongest in clients’ minds today.
Based on 300 responses to a survey of senior clients of
consulting firms and featured in Perceptions of Risk Firms
in 2021 published by Source Global Search.

For more information about Source and


it’s research please visit:
www.sourceglobalresearch.com

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International
entities provide no services to clients. All rights reserved. DRILLING DOWN 44
Acknowledgments
This magazine would not be possible without the collaboration from colleagues around the world who generously contributed their
support, knowledge and insights into the planning, analysis, writing and production of this report. Thank you to Tzouliano Chotza, Lyndie
Dragomir, Nicole Duke, Mark Hamilton, Carmen Millet and Richard Turitz.

Contacts
Regina Mayor Ronald Heil
Global Head of Energy Global Cyber Security Leader for Energy and Natural
KPMG International Resources
E: rmayor@kpmg.com KPMG in the Netherlands
E: heil.ronald@kpmg.nl
Valerie Besson
Regional Energy & Natural Resources Leader for Angela Gildea
Europe/Middle East/Africa (EMA) and National Regional Energy & Natural Resources Co-Leader for
Sector Leader, Energy and Utilities Americas and National Sector Leader, Energy, Natural
KPMG in France Resources and Chemicals
E: valeriebesson@kpmg.fr KPMG in the US
E: angelagildea@kpmg.com
Manuel Fernandes
Regional Energy & Natural Resources Co-Leader Jonathon Peacock
for Americas and National Oil & Gas Leader Regional Energy & Natural Resources Leader for Asia
KPMG in Brazil Pacific (ASPAC) and Oil & Gas Leader
E: mfernandes@kpmg.com.br KPMG Australia
E: jjpeacock@kpmg.com.au

home.kpmg/drillingdown

home.kpmg/socialmedia

The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to
provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the
future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation.

© 2022 Copyright owned by one or more of the KPMG International entities. KPMG International entities provide no services to clients. All rights reserved.

KPMG refers to the global organization or to one or more of the member firms of KPMG International Limited (“KPMG International”), each of which is a separate legal
entity. KPMG International Limited is a private English company limited by guarantee and does not provide services to clients. For more detail about our structure please
visit home.kpmg/governance.

The KPMG name and logo are registered trademarks or trademarks of KPMG International.

Throughout this document, “we”, “KPMG”, “us” and “our” refers to the global organization or to one or more of the member firms of KPMG International Limited (“KPMG
International”), each of which is a separate legal entity.

Designed by Evalueserve.
Publication name:Drillng Down
Publication number: 138002-G
Publication date: April 2022

You might also like