Education

     

 

EDUCATION SESSIONS

8:00 a.m. - 9:30 a.m.

General Session: Tower Compliance & FCC Regulations Update / ENTELEC Regulatory and Technology Committee Update

Wes Wright & Greg Kunkle, Keller and Heckman

ENTELEC Regulatory and Technology Committee

Room: Red Oak

Track: Tower Regulations (Lighting, Siting, OSHA, etc.)

Join Wes Wright and Greg Kunkle, with Keller and Heckman, as they address various compliance obligations imposed by the FCC, FAA, and OSHA.  The FCC requires approval to change or correct tower information.  Owners must also display the ASR number so that it is visible to a member of the general public.  More recently, OSHA announced plans to revise its rules governing communication tower safety, including fall protection and RF exposures. We will also discuss some trends at the FCC/FAA that will impact the O&G industry and then transition into the ENTELEC  R&T Subcommittee Update.

Session Objectives:

  • Provide a thorough understanding of the FCC's rules relating to towers, including registration, compliance with NEPA and NHPA obligations, marking/lighting, NOTAM, transferring ownership, and other matters.
  • Provide an update on OSHA's proceeding to revise its rules governing communication tower safety, including fall protection and RF exposures. provide the audience with a thorough understanding of the FAA's obligations with respect to communications towers.
  • Discuss trends at the FCC/FAA that will impact the O&G industry.

9:40 a.m. - 10:40 a.m.

Enabling the Industrial Internet of Things with Cyber Security in Mind

Brad Gilbert, FreeWave Technologies

Room: Red Oak

Track: Cyber Security/Physical Security & IIoT Communications Technology for Oil & Gas

Critical infrastructure projects are only as reliable and secure as the technology serving them. Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed. With security, the traditional trade-off is either “easy to use” or “secure” ─ but not both. An operator striving for a reliable Industrial IoT network must consider many factors including SCADA security, the convergence of Operations Technology and Information Technology, physical security and more.

Session Objectives:

  • To present an overview of the common threats to networking and communications technologies today, including Denial of Service, intrusion, packet spoofing, use of worms and Trojans, attacks on DNS infrastructures, etc. In addition, the goal is to also provide an overview of modern security challenges related to legacy SCADA systems.
  • To present the concept of resiliency as part of the industrial IoT security paradigm. This includes an overview of considerations for hardened communications equipment, data encryption options, network access control methodologies and additional security policies and safeguards such as firewalls and packet filtering, limitations of permitted activities, VLANs and more.
  • To present an overview of tactics related to physical security elements and considerations for implementing a multi-layered, multi-technological approach.

 

Short on Spectrum? What really are your options?  An Unbiased Objective Look at the Different Bands, Spectrum Leasing and Buying, and the Regulations that can Help or Hinder Your Mission Critical Operations

Cory Crenshaw, Crenshaw Communications Consulting, LLC

Room: Pecan

Track: Tower Regulations & IIoT Communications Technology for Oil & Gas

As spectrum availability decreases and consumer demands increase, industry at large must navigate a myriad of regulations in order to deliver products to the population.  Each system deployment faces unique challenges and there is no one size fits all solution.  Take an unbiased look at spectrum bands for voice/data and automation, buying and leasing options and considerations for deploying new systems and upgrading legacy systems.

Session Objectives:

  • Review of Common Bands and regulations that can help or hinder in each band
  • Considerations of leasing or buying spectrum
  • Solutions for navigating federal regulations

 

10:50 a.m. - 11:50 a.m.

Real Life Challenges and Solutions for IIoT security for Oil and Gas

Eric Winsborrow, Distrix Networks & Justin Hogue, LEC 

Room: Pecan

Track: IIoT Communications Technology for Oil & Gas & Cyber Security/Physical Security

SCADA and ICS systems for Oil & Gas that are traditionally isolated and locally operated are being opened up for remote management and IIoT enablement, introducing management complexity and risk of cyber attack.

Distrix Networks and LEC will discuss the issues it has seen from a decade of securing sensor networks and SCADA systems and provide practical real life approaches for simplifying and securing data from remote and previously isolated Oil & Gas networks.

Discuss operational and cybersecurity challenges for Oil & Gas companies to enable IIoT including:

  • Risks of unsecured traffic and cyber attack for Remote/field devices
  • Operational and IT support challenges for providing secure, remote access to field devices and networks
  • Administration challenges of keeping up with disparate technologies
  • Discuss best practices and approaches to simplify and secure remote devices and data to enable IIoT including:
  • Leveraging existing infrastructure and devices to provide secure connectivity without requiring device and network upgrades to IP
  • Creating true end to end security from the device level across networks
  • Simplifying network and firewall settings to allow secure remote connectivity without heavy involvement from IT resources
  • Provide real life and practical use cases to illustrate discussion topics and for audience to apply to their own operations.

  

Tower Regulations, Compliance and Safety

Leo Cirbo, UTCG

Room: Red Oak

Track: Tower Regulations

Former Federal Communications Commission, Enforcement Bureau, engineer and manager will discuss the FCC’s tower regulations, including painting and lighting, registration, signage, RF safety, siting and interference resolution.  Information will include coordination with the FAA, OSHA and state agencies regarding their requirements that involve tower matters.  Construction, grounding, lightning protection, icing and other technical and safety matters will be addressed.  Scenarios include single towers, co-located towers in “tower farms” and towers located on buildings and the associated regulations and safety requirements.

Session Objectives:

  • FCC, painting, lighting, registration, siting, signage, RF safety, interference mitigation and resolution
  • Association with FAA, air-studies and advisory circular requirements
  • OSHA & State Agencies, climbing safety, RF safety
  • Other, structure construction, safety, grounding, lightning protection, icing, guy wires

 

1:40 p.m. - 2:40 p.m.

The New Defend Trade Secrets Act of 2016

Wendy Buskop, Buskop Law Firm

Room: Red Oak

Track: IIoT Communications Technology for Oil & Gas & Cyber Security/Physical Security

The new Defend Trade Secrets Act of 2016 was enacted on May 11, 2016. Although the Act is unknown by many, DTSA can be summarized, as a company’s powers and policies with regard to trade secrets. Next will be the dissemination on gathering information on FAQ’s BY CEO’S regarding patents. Finally education on about 5 recently issued patents on security and communication in 2016.

Session Objectives:

  • Learn about the new definitions of trade secrets and misappropriation.
  • Discover who receives the new civil remedies and criminal penalties. Learn about the 2 criminal penalties and 4 civil penalties and 3 other features of DTSA.  Consider two “to Do” tasks in view of the new Law.
  • Also find out about patents, and the 7 most common Frequently Asked Questions about patents by CEO’s.

 

Migration Approaches for Legacy SCADA System Capacity and Security Upgrades

Steve Moffat, 4RF USA Inc

Room: Pecan

Track: IIoT Communications Technology for Oil & Gas

Wholesale or forklift digital transformations of legacy SCADA radio systems is disruptive.  So what are the options for joining the twenty first century and how can migration be managed within constrained budgets?  Understanding digital radio characteristics is important when considering upgrades so that range, latency, and ease-of-use are not lost when embracing new IP-based networks.  Legacy protocols such as Vancom , Redac, Tejas, and Conitel must also be managed.

Session Objectives:

  • Explore the options available for SCADA radio system migration.  Wholesale replacement, parallel deployment, or progressive?
  • Understand digital system trade-offs and impact of IP-based field networks.  Learn how to manage legacy applications.
  • Review RF performance from introductory perspective.

 

2:50 p.m. - 3:50 p.m.

Be Certain Your New System Deployments are Compliant: A Look at the Tower Compliance Piece and the Regulations that can Provide Special Consideration and Potential Exemptions to Utilities in Some Instances

Cory Crenshaw, Crenshaw Communications Consulting, LLC

Room: Red Oak

Track: Tower Regulations

Deployment of towers is changing the landscape of how we operate.  Structures are up at an unprecedented record.  The regulations for tower compliance is an ever-evolving process with changes in requirements for Environmental Assessments, Cultural and Historical Preservation and Lighting requirements.  New considerations for long eared bats have been adopted, exemptions for small cells and DAS have been created which aids utilities, but can it serve the petro-chem market also? Additionally, the FAA released new lighting requirements and additional changes are in the works.   Join us to make sure you are up to date on the current regulations and find the exemptions that may save you time, significant money and headaches.

Session Objectives:

  • Attendee will get up to date on the current regulations 
  • Attendee will learn to find the exemptions that may save time and headaches
  • Attendee will learn to find exemptions that can save significant money

 

Utilizing IIoT and LPWAN to Monitor High Value Assets in the Oil and Gas Industry

David Smith, MultiTech

Room: Pecan

Track: IIoT Communications Technology for Oil & Gas

David Smith will highlight how recently introduced technologies such as LoraWAN are affording new means to monitor high-value assets in the oil and gas industry. Until now, expensive satellite communications or difficult-to-deploy wired infrastructure has been the only means of monitoring. More costly than cellular communications and with troubling latency issues, satellite communications has been the only way to reach these unreachable assets.

Session Objectives:

  • Provide overview of  IIoT and LPWAN.
  • Discuss use case examples (e.g. plant, pump station, aggregation wells and multi-well pump pads, etc.).
  • Provide a deep dive into LoRa highlighting how LoRa impacts existing infrastructure and how it plays in a combined radio environment.

 

4:00 p.m - 5:00 p.m.

Cyber Security for SCADA Networks: Understanding Threats and Enabling Business

David Blanco, AutoSol

Room: Red Oak

Track: Cyber Security/Physical Security

The energy industry has always been on the cutting edge of technology, but sometimes that edge is double-edged. With current strategies failing to protect SCADA networks from increasingly common and powerful attacks, the importance of cyber security to your networks has never been greater. This class will explain how to protect your network by analyzing common vulnerabilities of SCADA networks, explaining who the hackers are, and discussing specific technologies that overcome these threats.

Session Objectives:

  • To Identify how current SCADA-IT processes leave SCADA networks vulnerable to attacks.
  • This is done by first identify security gaps that naturally occur when SCADA and IT both do their jobs. Then the security strategies currently employed by many SCADA networks are broken down by analyzing the flaws in air-gapping, security-by-obscurity, and over-relying on safety logic.
  • To identify the actual threat against SCADA networks by identifying who has the means and motivation to hack SCADA.  This is done by analyzing a few statistics about SCADA hacks and who the hacks are done by. The increasing number of SCADA hacks will be linked to hostile foreign governments. Examples of successful attacks against industrial control systems and SCADA networks will be provided.
  • To identify the technologies that can address the gap between IT and SCADA and overcome the challenges presented by the new face of hackers.  This is done by discussing the technology of encryption, but not in a highly technical fashion.

 

Improving Uptime, Availability and Security of ICS

Chris Duffey, Enterprise Products

Room: Pecan

Track: IIoT Communications Technology for Oil & Gas & Cyber Security/Physical Security

Industrial Control Systems (ICS) are complex systems that are responsible for controlling some of most critical processes and infrastructure on the Earth.  A unified view into these systems is critical to understand what is happening in your operational systems and to identify root causes and quickly diagnose problems.   The use of big data analytics within the ICS environment can provide valuable insight into these systems increasing uptime and security of these systems.

Session Objectives:

  • Provide an introduction into what big analytics entails and its purpose
  • Explain the operational and security value of big data analytics in SCADA environments and how they can be used to increase availability of the system.
  • Chronicle Enterprise's use of a big data analytics platform and what valuable insights and value have been gained. 

2016 Fall Sponsors: