Thursday Sessions

Thursday April 27, 2017

                                                                                   Sponsored by:


8:30 AM - 10:00 AM

Vendor Shoot Out: The State of Wireless Communications in Oil & Gas Today

Moderators:  Jerry Roberts, Enterprise Products and J.L. Betts, 4RF

Room: Exhibit Hall B3

Come join us in the exhibit hall as vendors explore the current state of wireless communications, emerging trends, and how the promises of the past are evolving in the realities of today.  This will be a lively discussion and audience questions and participation is welcome.


11:00 AM - 12:00 PM

 Independently Validated Cyber Security Solutions: Real World Case Studies Show How Critical Infrastructure Can Benefit

Speaker: Matthew Cowell, Director of Industrial Markets, Ultra Electronics, 3eTI

Category: Cyber Security/Physical Security

Room: 310 A

The government facilities require resilient networks that assure availability of critical assets to support armed forces. Many of these industrial control and automation systems include legacy components that cannot be equipped individually with modern or advanced security. This presentation will focus on a case study of the Navy’s Enterprise Industrial Controls System deployment for military-grade cyber protection, as well as analysis, modeling and prediction capabilities for building systems. In this session we will outline how similar approaches and architectures can be directly applied for industrial critical infrastructure applications. It will show that comprehensive and fully validated security systems can improve performance and extend security beyond the firewall without negatively impacting operations, schedules, workflows or budget.

Session Objectives:

Review in detail the Navy's EICS foundational system solution and take always through which the Navy complies with congressional mandates to securely reduce energy consumption.

Outline how similar approaches and architectures can be directly applied for industrial critical infrastructure applications.

Show that comprehensive and fully validated security systems can improve performance and extend security beyond the firewall without negatively impacting operations, schedules, workflows or budget.


Using An Enterprise Approach To Current and Future SCADA Challenges

Speaker: Frank Horden, Global SCADA/MES Business Development & Marketing Manager, Yokogawa Electric Corporation

Category: SCADA and Business Data

Room: 310 B

In today’s energy supply-chain environment, Enterprise SCADA systems must handle larger and larger amounts of data due to new technologies, smart devices and blurring boundaries between OT&IT. Whether through new construction or consolidation after mergers and acquisitions, systems are being pushed to the limit. In the upstream space for instance producers, in some cases, are adding thousands of wells per year to their systems. Complexity is also further increasing with international, grassroots mega projects that often require a single system for production, transmission and plant assets with the need to addressing Safety, Security, Costs and continues Operations. Three case studies will examine how a pipeline company, an upstream producer, and a global operator of mega projects met the requirements for enterprise wide SCADA.

Session Objectives:

How Platform Independence can be used to protect application investments (Life Cycle), overall security and Total Cost of Ownership.

Using Remote Operations as a mean of improving operational efficiency.

How newer technologies support the IT/OT integration without tag replication and vertical integration of Asset Management and Documentation Management systems.


FCC Compliance and Frequency Recommendations/Selection for SCADA and MAS systems

Speaker: Elizabeth Buckley, FCC-FAA Licensing Expert, FCC-FAA Licensing, LLC

Co Speaker: Mona Lee, President, Mona Lee and Associates, FCC-FAA Licensing, LLC

Category: FCC and Regulatory

Room: 310 C

Purchasing radio equipment may seem as easy as buying a new laptop, yet there is more involved.  Just like purchasing a license for a computer operating system, like Windows, a company has a responsibility to apply and secure an authorization from the Federal Communications Commission (FCC).  The license process involves a formal application, frequency recommendation from an FCC recognized Frequency Coordinator and user compliance.  Let us discuss the nuances of this requirement and how to avoid potential hefty fines from the FCC’s Enforcement Bureau for operating a SCADA out of compliance.


It’s All About the Network: Stories From the Onshore Field

Speaker: Renner Vaughn, Global Program Lead, OG&P, ABB Wireless

Category: Networks/Communications Infrastructures

Room: 320 A

This session will focus on the stories of three companies in three different North American shale plays: the Bakken, the Permian, and Eagle Ford.  By optimizing the communications setup at their well pads and employing a modern network architecture throughout their fields, these three producers have found even more ways to maximize ROI while increasing the productivity of their highly skilled but shrinking workforce.

The days of the single purpose field radio system are over, and this is actually great news for upstream companies.  As producers begin to realize the economic advantages of integrated operating models and remote visibility to every asset, they are demanding more from their field networks:  more bandwidth, more reliability and more flexibility.   These demands have driven the emergence of a modern network architecture that combines radio technologies and maximizes the strengths of multiple frequency bands to strike the elusive balance between cost and performance.  A network built according to this architecture allows companies to operate by exception and reduce costs through continuous, data-driven production optimization.  With SCADA, HMI, video, work order processing and other mobile applications available throughout the field, the network infrastructure becomes a vital utility for achieving the company’s daily production targets.  Companies face significant losses when field communications systems fail, and the focus on reliability has never been greater.  Specific communications strategies usually depend on differing factors like field size, asset maturity and existing infrastructure.   Still, despite their differences, producers face the same challenge:  as more equipment comes online and more data is generated by computers at the well pad, the network must deliver robust connectivity for today with ample capacity built-in for tomorrow. 

Session Objectives:

GO SLOW AND LOW AT THE EDGE: In the Eagle Ford, a producer moved narrowband, unlicensed frequencies to the edge of the field and significantly lowered the RF noise floor, clearing the way for broadband while boosting overall network performance.

CATEGORIZE ALL FACILITIES:  Categorize sites based on data needs.  Higher producing, higher risk facilities require highest network availability.  Network architecture should be adaptable to business priorities, drilling plans, location of warehouses, etc

RENT OR OWN: Communications networks perform a basic service, connecting the business to assets local and remote.  One company has shifted its mindset and asked vendors to deliver the field network as a service.   With the right agreements in place, this can be a very reliable, successful model.


2:00 PM - 3:00 PM

Check List of Key IIoT Security Elements

Speaker: Tim Winter, Chief Technology Officer, Machfu

Co Speaker: John Geiger, VP Business Development, Machfu

Category: Cyber Security/Physical Security

Room: 310 A

IIoT solutions require a multi-layer security strategy that uses proven standards built on vetted open source components enabling secure distributed applications and services that fosters best practices across the IIoT ecosystem. In this session we will review a multi-dimensional check list of security elements and policies required for securing emerging IIoT networks, devices and edge applications.

Session Objectives:

Understanding key elements of securing an edge devices and automating security policy

Understand key elements of securing Data in motion

Understand the issues of securing the emerging edge applications


IT/OT Convergence: The Impact from the Industrial Internet of Things

Speaker: Scott Allen, FreeWave Technologies

Category: SCADA and Business Data,

Room: 310 B

The integration of IT & OT promotes process management tools help ensure that every stakeholder in an organization has accurate information. As OT products such as PLCs and RTUs become more aligned with commercial software infrastructures, integrating OT information with IT systems at a process level is difficult. Getting these systems to work together to maximize business efficiency is more challenging. IoT networking technology enables large quantities of information to be readily available – these high-speed data transport technologies are the true enabler in IT/OT convergence. Critical industries like utilities need high-speed connectivity, but also want to maintain security standards and protocols. With high data capacity OT networks, the overhead of Internet and security protocols is no longer critical to network latency and SCADA applications for communications. OT/IT networks now use the same Network and Transport layers, clearing one of the fundamental barriers to convergence.

Session Objectives:

Attendees will gain a greater understanding of how IT/OT convergence is transforming critical data communications

Attendees will learn about application examples of IT/OT convergence in energy, electric power and utility environments

Attendees will be able to gain resources and considerations for implementing convergence practices in their respective industry.


Federal Agency Environmental Compliance Regulations Update

Speaker: Jodi Jacobson, TRC's FCC Tower Environmental Compliance Program Manager and Office Practice Leader/Senior Archeologist in the Planning, Permitting, and Licensing, TRC Environmental Corporation

Co Speaker: Todd Schnakenberg, Staff Biologist, TRC Environmental Corporation

Category: FCC and Regulatory

Room: 310 C

The presentation will provide an update regarding new regulation and proposed changes to the communication industry and discuss potential consequences of the theses changes to projects requiring communication towers and collocated licensed antennas.  Topics covered include an overview of changes to the FCC’s environmental compliance process, Tribal requests and consultation fee trends, changes in the FAA tower marking regulations for non-FCC licensed towers, interagency agreements with the FCC concerning Section 106 of the National Historic Preservation Act compliance, and potential impacts or benefits to industry.

Over the past year, new guidance and potential changes from FAA, Advisory Council on Historic Preservation (ACHP), and USFWS regarding communications tower regulations have developed.  It is crucial that all industries that use communication technologies understand the federal, state, and local regulations related to their projects in order to avoid costly fines or delays.  New FAA marking and lighting regulations changes are in progress and could have repercussions to review by the FCC of adherence to environmental compliance for licensed towers under 200 feet depending on the “database” information that is collected for towers requiring marking.   Program comments by the ACHP on Section 106 for wireless communication facilities would ease some of the Section 106 compliance burdens for facilities associated with projects also under review by the USDA Rural Utility Service, the U.S. Department of Commerce National Telecommunications and Information Administration, and the Federal Emergency Management Agency, as well as, the Department of Homeland Security, Federal Transit Authority, or FirstNet.  Updates to the USFWS migratory bird treaty act and other changes in environmental regulations not just specific to towers could have additional effects on proposed communication projects.  A review of the above and general trends and changes will be presented.

Session Objectives:

Understanding of changes to federal regulations regarding environmental compliance policy (NEPA)

Understanding of potential impacts of new and developing changes to communication projects associated with power and oil and gas industry projects

Understanding of how to be conform with the FAA's regulations compliance policies.


The Enabler of IT/OT Convergence –  A Converged Network

Speaker: Ivan Schonwald, Nokia

Category: Networks/Communications Infrastructures

Room: 320 A

This session will cover the must-have network attributes in a converged network that enables IT/OT convergence.

Traditionally, operational technology (OT) group controls and monitors mission-critical infrastructures while information technology (IT) group maintains business-critical information and communications systems. Due to their different objectives, these two groups usually operate in segregated realms, living separate lives. These silos could hamper effective flow of information and knowledge sharing in the organization, leading to suboptimal business decision, lower efficiency and reliability.  With IT/OT convergence, also known as IT/OT integration,  critical infrastructure operators have the potential to bring many benefits to their organizations, including better long-term business planning, closer monitoring of infrastructure conditions, improved performance and higher reliability. As OT communications networks are transitioning to IP, the fundamental common component between OT and IT is an IP network. Consequently, network convergence is the natural starting point of an IT/OT convergence journey. This session will discuss the challenges of deploying and operating a converged network supporting the IT/OT convergence initiative.

Session Objectives:

To learn the differences in network requirements for an IT and OT networks.

To learn the key role of a converged network in IT/OT convergence.

To learn what are the must-have attributes in the converged network for a smooth IT/OT convergence journey.


Digital Oilfield 2.0 Broadband & Private LTE Infrastructure Globally

Speaker: Louis Lambert, Redline Communications

Category: Networks/Communications Infrastructures

Room: 320 B

The Digital Oilfield has been a hot topic for a few years and Redline has been at the forefront from the start. Now it is time to take this to the next level… Digital Oilfield 2.0!

The once innovative clipboard run, basic SCADA, dial-up access to remote telemetry, still images security camera and other legacy systems have had their day. For many O&G companies, these systems were replaced with the digital oilfield and a new IP infrastructure, yet many companies have still not made the move to the digital oilfield yet. Whether you have started a Digital Oilfield program or not, things continue to evolve. Polling devices once a day, or once an hour, used to be fine, but now real time or sub-minute intervals are expected in order to feed the Big Data and new analytic systems. Individual business unit systems can no longer be operating in parallel, but a much higher performance and secure single infrastructure can deliver higher returns, performances, efficiencies and Security to all business units.

Whether you are looking at modernizing or leapfrogging communications infrastructure for your Oil&Gas field, this session will help you identify a few simple steps to address the multiple challenges with today’s Broadband Wireless and Private LTE solutions in the field. The Broadband Wireless infrastructure remains the foundation of the Digital Oilfield, and now Private LTE infrastructure is also feasible on- and off-shore and in many countries.


2:00 PM - 4:00 PM

Configuring KEPServerEX® to Poll EFM and Real-Time Data using the Scheduler for KEPServerEX

Speaker: Sam Elsner, Senior Applications Engineer, Kepware Technologies

Category: SCADA and Business Data

Room: 330 A

This training class will describe how to configure KEPServerEX drivers that have Electronic Flow Measurement (EFM) support, such as ABB Totalflow, Fisher ROC/ROC+, OMNI Flow Computer, and Enron Modbus. It will show how to use the EFM Exporter to define poll groups, specify their schedules, and export collected data (including CFX or Transaction Queue for FLOWCAL, PGAS, user-defined CSV files, and SQL databases). This class will also demonstrate how to schedule real-time tag reads using the Scheduler advanced plug-in and how to configure the server without the KEPServerEX Configuration Client using the new RESTful-based API.


Understand how to configure KEPServerEX to collect and export EFM data.

Understand how to configure KEPServerEX for optimal communications using the Scheduler advanced plug-in and telemetry settings.

Learn how to configure KEPServerEX using the RESTful API.


3:00 PM - 4:00 PM

Musings of a SCADA Engineer Turned ICS Security Architect:   A How to Guide for the Security Newbie

Speaker: Sanford Rice, SCADA System Developer, Atmos Energy

Category: Cyber Security/Physical Security

Room: 310 A

I've been in your shoes - and I still am. As a control system engineer working for a smaller company or department with limited resources, we have to keep up with the times to continuously find ways to improve safety, reliability and efficiency across countless disciplines.  On top of our “normal” jobs we’re called on to be system admins, network engineers, desktop support and janitorial specialists.  Now add a new one from the top headlines – cybersecurity engineer.  Perhaps the looming specter of cyber regulation brings you here or someone realized it's time to get moving.  Maybe you are the "OT" guy who has been brought in to represent your team as hordes of cybersecurity specialists pick your life’s work apart.  Nonetheless, you're a security newbie in a world of never-ending pitfalls, traps and rabbit trails. In this session I’ll chronicle my development in ICS cybersecurity as I worked to advance our system from a neglected segment of IT’s network to a comprehensive program focused on continuous improvement.  The emphasis of this information sharing session will center mostly on the soft skills required to build the relationships, partnerships and culture needed to develop a successful program.  I will share with you lessons learned from the challenges, successes and failures I’ve endured, and I’ll include advice on training and other resources I found helpful along the way.   I hope this insight will help you on your way from security newbie to cyber superhero.

Session Objectives:

The emphasis of this information sharing session will center mostly on the soft skills required to build the relationships, partnerships and culture needed to develop a successful cybersecurity program.

I will share lessons learned from the challenges, successes and failures of building a cybersecurity program in a SCADA environment.

Share advice on training opportunities I found valuable, technical resources and best practices.


New Technology: Power Generating Combustors

Speaker: Mothusi Pahl, Vice President, Alphabet Energy

Category: System Architecture for Industrial Control Systems

Room: 310 C

Upstream & midstream Oil & Gas field operations are often constrained by the lack of readily available power and production is limited by the emissions released by traditional onsite power generation and waste destruction equipment like flares & incinerators.

A new integrated combustor and solid-state power generator technology can now deliver reliable power and comply with US EPA Quad O. By utilizing waste gases and tank vapors, this "Power Generating Combustor" maximizes stakeholder value by reducing venting and open flaring and eliminating the need for both traditional on-site power generation and electrical grid connections.

A new integrated combustor and solid-state power generator technology can now replace traditional flares, combustors, vapor destruction units, incinerators and traditional power generation while simultaneously complying with US EPA Quad O and delivering electricity for SCADA, sensors, instrument air, and oilfield IoT.

Session Objectives:

Participants will gain an appreciation of value lost to flaring.

Participants will gain an understanding of how tank vapors can be used to power IoT in the oilfield.

Participants will gain an understanding of how a reliable power supply can be brought online for SCADA and IoT with no new emissions permits or electrical utility infrastructure.


Private LTE Networks

Speaker: Christopher Porto, Persistent Telecom

Category: Networks/Communications Infrastructures

Room: 320 A

Session will cover opportunities for petroleum, mineral and precious metal explorations to easily establish on site voice, text and data networks. General description of private communications bubbles.  Technologies that can be employed to create secure communications bubbles.  Back haul options for connectivity to network operations centers.  Use of high speed data transfer for efficient analysis.   Potential for streaming HD video for efficient safety programs, operations and maintenance.  Potential use for closed loop, secure SCADA systems.  Using private LTE networks for remote sites to provide broadband data access and cached media content without having to back haul all signaling and user data to a centralized commercial carrier.  

Session Objectives:

Educate the audience on technology available for creating private networks for remote operations.

Educate the audience on use cases for private remote site networks.

Regulatory issues pertinent to deploying private networks.


ICS Cybersecurity – Are We Doing Enough?

Speaker: Camilo Gomez, Director Consulting Process Control Domain, CGI

Category: SCADA and Business Data, Cyber Security/Physical Security

Room: 310 B

The topic of the session is an examination of the existing state of affairs of Cybersecurity for Industrial Controls Systems (ICS) and the effectiveness of the collective current response. The examination will start with a review of indicators to determine how well industry sectors, automation vendors, service providers and governments are responding today to this cyber threat and manage the risk. It will next proceed to a review of the level of threat, characteristics of the threat, and efficacy of the attacks and current response. The examination will then move to a review of the basics including characteristics of the Operational Technology (OT) environment and what differentiates it from a traditional Information Technology (IT) environment concentrating specifically on technical and more importantly on operational differences and similarities. It will continue with a review of the effectiveness of current approach including an analysis of the efficacy of IT security controls in the OT space and issues to operationalize those including examples. The examination will conclude with an indication of the opportunities of improvement and the building blocks towards true predictable and preventive OT Cybersecurity.

Session Objectives:

Understand the current state of affairs of cyber security for industrial control systems and the effectiveness of current approach.

Despite the commonalities understand that there are key Operational and technical differences  between OT and IT Cybersecurity, and appreciate  the importance of addressing operational differences for the effectiveness of ICS/OT Cybersecurity program.

Understand the benefits of Cybersecurity capability, services and technology built for OT purpose as building blocks to move towards a true predictable and preventive ICS/OT Cybersecurity.


Update on Upper 700 MHz A Block Spectrum

Speaker: John Vislosky, Access Spectrum

Category: Networks/Communications Infrastructures

Room: 320 B

Access Spectrum, will provide an update on the Upper 700 MHz A Block Spectrum available to the Critical Infrastructure Industry. The session will include information on the 700 MHz Pilot Project results, new manufacturers that have or will have equipment operating on 700 MHz, completed sales of the spectrum, applications and use of the spectrum to include Unmanned Aircraft Systems to support Utility operations and security.