4 minute read
Comment
CONTACT INFO
MANAGING EDITOR James Little
james.little@palladianpublications.com
SENIOR EDITOR Callum O'Reilly
callum.oreilly@palladianpublications.com
EDITORIAL ASSISTANT Pippa Luck
pippa.luck@palladianpublications.com
SALES DIRECTOR Rod Hardy
rod.hardy@palladianpublications.com
SALES MANAGER Chris Atkin
chris.atkin@palladianpublications.com
SALES EXECUTIVE Sophie Barrett
sophie.barrett@palladianpublications.com
PRODUCTION Kyla Waller
kyla.waller@palladianpublications.com
WEB MANAGER Tom Fullerton
tom.fullerton@palladianpublications.com
DIGITAL EDITORIAL ASSISTANT Bella Weetch
bella.weetch@palladianpublications.com
DIGITAL EVENTS COORDINATOR Louise Cameron
louise.cameron@palladianpublications.com
ADMIN MANAGER Laura White
laura.white@palladianpublications.com
CONTRIBUTING EDITOR Nancy Yamaguchi Gordon Cope
SUBSCRIPTION RATES
Annual subscription £110 UK including postage /£125 overseas (postage airmail). Two year discounted rate £176 UK including postage/£200 overseas (postage airmail).
SUBSCRIPTION CLAIMS
Claims for non receipt of issues must be made within 3 months of publication of the issue or they will not be honoured without charge.
APPLICABLE ONLY TO USA & CANADA
Hydrocarbon Engineering (ISSN No: 1468-9340, USPS No: 020-998) is published monthly by Palladian Publications Ltd GBR and distributed in the USA by Asendia USA, 17B S Middlesex Ave, Monroe NJ 08831. Periodicals postage paid New Brunswick, NJ and additional mailing offi ces. POSTMASTER: send address changes to HYDROCARBON ENGINEERING, 701C Ashland Ave, Folcroft PA 19032.
15 South Street, Farnham, Surrey GU9 7QU, UK Tel: +44 (0) 1252 718 999 Fax: +44 (0) 1252 718 992
COMMENT
CALLUM O'REILLY SENIOR EDITOR
The recent cyberattack on the Colonial Pipeline has once again exposed the vulnerabilities in critical infrastructure. At the time of writing, the pipeline had resumed normal operations, but only after Colonial had paid the US$4.4 million ransom demanded by DarkSide, the hacking group responsible for the ransomware attack. Colonial Pipeline’s CEO, Joseph Blount, told the Wall Street Journal that he authorised the payment after consultation with experts, as he did not know the extent of the damage or how long it would take to bring the pipeline’s systems back. A company spokesman said “Tens of millions of Americans rely on Colonial: hospitals, emergency medical services, law enforcement agencies, fi re departments, airports, truck drivers and the travelling public.”
Undeniably, the pipeline is a critically important piece of national infrastructure. Spanning 5500 miles between Texas and New Jersey, the pipeline carries approximately 2.5 million bpd of gasoline, diesel and jet fuel (around 45% of the fuel consumed on the US east coast). Wood Mackenzie has reported that the attack only had a marginal impact on fuel markets due to a combination of increased output from US refi neries and imports from Europe.1 Of course, the fact that the ransom was paid quickly is another key reason for the limited damage; it is clear that the impacts would have been much more serious had the shutdown persisted for longer. It’s easy to sympathise with the dilemma facing Colonial in this instance. In Blount’s own words, the ransom payment was authorised as he felt that it was “the right thing to do for the country.” However, the shared wisdom is that ransom payments only incentivise the hackers and fund future cyberattacks. It’s your classic ‘no-win’ situation (unless you are the hacker).
Our sector needs to learn from the incident and take active steps to protect itself from similar attacks. However, a recent study by Ponemon Institute and Siemens Energy revealed that although 56% of survey respondents had experienced a data breach or outage in the previous 12 months – and 54% expected an attack on critical infrastructure in the following 12 months – there was a pervasive lack of preparedness. Only 31% of respondents believed they were ready to respond to, or contain, a breach.2
This issue of Hydrocarbon Engineering includes a dedicated section on cybersecurity, beginning on p. 15, with articles from the American Petroleum Institute (API) and Siemens Energy. The two pieces are very timely in light of recent events, and I’d encourage you all to take the time to read them. The API explains how its continuously updated standards help to address cybersecurity for the oil and gas sector, while the article from Siemens Energy looks specifi cally at how to optimise refi nery turnarounds with AI-driven cybersecurity advances.
Before I sign off this month, I also wanted to remind everyone that Hydrocarbon Engineering will be hosting ‘SulfurCon 2021’ on 30 June. This free-to-attend virtual conference and exhibition will focus on the latest sulfur technology, innovations and services for the hydrocarbon processing sector, with expert presentations from leaders in the sector. For more information, and free registration, head over to www.hydrocarbonengineering.com/sulfurcon2021.
1. CROOKS, E., ‘Colonial pipeline hack exposes the vulnerability of critical infrastructure’, (14 May 2021), https://www.woodmac.com/news/opinion/Colonial-pipeline-hack-exposes-thevulnerability-of-critical-infrastructure/ 2. ‘Caught in the Crosshairs: Are Utilities Keeping Up with the Industrial Cyber Threat?’,
Ponemon Institute and Siemens, (2019).
FFCs slurry oils sell for just a few hundred dollars/ton, but when converted into Carbon Black – a key component in high-end plastics, tire manufacturing, and other rubber-based components – they can reach a market price of $2,500 USD/ton.
ET Black™: the industry technology of choice
Eurotecnica’s modified furnace black process, ET Black™, efficiently converts slurry oils into a wide range of carbon black grades, giving you access to an exciting and fast-growing industry.
With guaranteed operating flexibility and reliability, easy maintenance, and a low CAPEX, ET Black™ has become the technology of choice for industry leaders like ADNOC Refining.