[et_pb_section fb_built=”1″ admin_label=”Hero Section” _builder_version=”4.5.1″ use_background_color_gradient=”on” background_color_gradient_start=”#ff6a88″ background_color_gradient_end=”#ff99ac” background_color_gradient_direction=”131deg” background_image=”https://cyberarmstech.com/wp-content/uploads/2022/06/cyber-security.jpg” custom_padding=”100px|0px|100px|0px” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”2%” animation_starting_opacity=”100%”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.5.1″ max_width=”1440px” use_custom_width=”on” custom_width_px=”1440px”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”40px|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”Playfair Display|700|||||||” header_text_color=”#ffffff” header_font_size=”60px” header_line_height=”1.5em” header_2_font=”||||||||” header_3_font=”||||||||” header_4_font=”||||||||” header_5_font=”||||||||” header_6_font=”||||||||” custom_margin=”||20px|” locked=”off”]

Cybersecurity for the Oil and Gas Industry

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”left” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”4.5.1″ text_font=”Poppins||||||||” text_text_color=”rgba(255,255,255,0.8)” text_font_size=”18px” text_line_height=”1.8em” header_font=”||||||||” locked=”off”]

Assess. Protect. Respond. 

[/et_pb_text][et_pb_button button_text=”Contact Us” _builder_version=”4.5.1″ custom_button=”on” button_text_size=”14px” button_text_color=”rgba(0,0,0,0.7)” button_bg_color=”#04a1a0″ button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Poppins|600||on|||||” button_use_icon=”off” custom_margin=”20px|||” custom_padding=”12px|28px|12px|28px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”30px” box_shadow_color=”rgba(0,0,0,0.2)” button_letter_spacing_hover=”2px” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About Us ” _builder_version=”3.22″ custom_padding=”200px|0px|60px|0px”][et_pb_row _builder_version=”3.25″ locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”center” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|” locked=”off”]

Why is Cybersecurity important for Oil and Gas?

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”center” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”4.5.1″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center”]

Like critical industries everywhere, oil and gas operations – upstream, midstream, and downstream – make prime targets for cyber threats of all kinds. Sources of those threats are increasingly criminal enterprises, state actors, and so-called hacktivists with political agendas. That’s in addition to solitary hackers using powerful tools readily available on the Dark Web.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.5.1″ module_alignment=”center” custom_margin=”|||” custom_padding=”|||”][et_pb_column type=”1_2″ _builder_version=”3.25″ background_color_gradient_direction=”35deg” custom_padding=”|60px||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_text_align=”left” header_text_color=”#2b2b2b” header_line_height=”1.3em” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”left” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|”]

Make your offshore operations cyber secure and reliable

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”left” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”4.5.1″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” module_alignment=”center” custom_margin=”||30px|”]

Modern offshore operations are highly complex, generating tens of thousands of data points and transmitting them to onshore control centers across multiple types of networks. Offshore facilities also include technologies from many suppliers that interface with the main process control system, each with their own cybersecurity profile.  Learn how to navigate this complexity in our webcast with World Oil magazine!

Enim sit amet suscipit imperdiet, justo diam semper leo, quis finibus sapien eros et est. In hac habitasse platea dictumst. Etiam non dolor dapibus ligula mollis ornare vulputate eget elit. Maecenas bibendum placerat.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.5.1″ use_background_color_gradient=”on” background_color_gradient_start=”#04a1a0″ background_color_gradient_end=”#000000″ background_color_gradient_direction=”115deg” custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://cyberarmstech.com/wp-content/uploads/2022/06/cyber-security-oil-and-gas.jpg” title_text=”cyber-security oil and gas” align=”center” _builder_version=”4.5.1″ custom_margin=”-40px|40px|40px|-40px” custom_padding=”|||” animation_style=”zoom” animation_direction=”right” animation_intensity_zoom=”6%” animation_starting_opacity=”100%” box_shadow_style=”preset3″ box_shadow_horizontal=”13px” box_shadow_vertical=”42px” box_shadow_blur=”45px” box_shadow_spread=”-3px” box_shadow_color=”rgba(0,0,0,0.1)” always_center_on_mobile=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Collections” _builder_version=”4.5.1″ custom_padding=”60px|0px|120px|0px”][et_pb_row _builder_version=”3.25″ custom_margin=”||40px|”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_text_align=”left” header_text_color=”#2b2b2b” header_line_height=”1.3em” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”left” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|” locked=”off”]

Whitepapers and Articles

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”left” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.5.1″ module_alignment=”center” custom_margin=”||200px|” custom_padding=”0px||0px|” box_shadow_style=”preset3″ box_shadow_vertical=”40px” box_shadow_blur=”50px” box_shadow_color=”rgba(0,0,0,0.1)”][et_pb_column type=”1_2″ _builder_version=”4.5.1″ use_background_color_gradient=”on” background_color_gradient_start=”#000000″ background_color_gradient_end=”#04a1a0″ background_color_gradient_direction=”35deg” custom_padding=”|5%||5%” custom_padding__hover=”|||”][et_pb_image src=”https://cyberarmstech.com/wp-content/uploads/2022/06/No-Rocket-Science.jpg” title_text=”No Rocket Science” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”4.5.1″ custom_margin=”-20px||-20px|” custom_padding=”|||” animation_style=”zoom” animation_direction=”left” animation_intensity_zoom=”10%” animation_starting_opacity=”100%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”40px|40px|40px|40px” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ header_font=”||||||||” header_3_font=”Playfair Display|700|||||||” header_3_text_color=”#2b2b2b” header_3_font_size=”28px” header_3_line_height=”1.5em” custom_margin=”||10px|”]

Not Rocket Science

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”left” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”4.5.1″ text_font=”Poppins||||||||” text_text_color=”rgba(0,0,0,0.4)” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_2_font=”||||||||” module_alignment=”center” custom_margin=”||30px|”]

Cybersecurity challenges can be formidable. However, they are not insurmountable, nor are they rocket science to solve. The good news is that downstream oil and gas companies can adopt the straightforward, four-step approach that Siemens Energy’s cybersecurity experts and managed services team have successfully used to close vulnerability gaps for customers worldwide in recent years.

[/et_pb_text][et_pb_button button_text=”Read Article” _builder_version=”4.5.1″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#04a1a0″ button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Poppins|600||on|||||” button_use_icon=”off” custom_margin=”20px|||” custom_padding=”12px|28px|12px|28px” button_text_shadow_style=”preset2″ box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”30px” box_shadow_color=”#000000″ button_letter_spacing_hover=”2px” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.5.1″ _module_preset=”default” background_color=”#F8F8F8″][et_pb_row _builder_version=”3.25″ locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”center” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|” locked=”off”]

We Provide a Complete Portfolio of Cybersecurity Solutions

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”center” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_column type=”1_3″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.5.1″ _module_preset=”default”]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.5.1″ _module_preset=”default”]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.5.1″ _module_preset=”default”]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Featured Products” _builder_version=”3.22″][et_pb_row _builder_version=”3.25″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”center” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|” locked=”off”]

Learn More About Cybersecurity

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.5.1″ use_background_color_gradient=”on” background_color_gradient_start=”#474747″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”bottom left” locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_text_color=”#ffffff” header_font=”||||||||” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”center” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” header_3_text_color=”#ffffff” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|” locked=”off”]

                                                     World Oil Article

                                  Ensuring robust cyber defense for endpoint energy assets

[/et_pb_text][et_pb_divider color=”#04a1a0″ divider_weight=”3px” disabled_on=”on|on|off” _builder_version=”4.5.1″ max_width=”80px” module_alignment=”center” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” saved_tabs=”all” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”4.5.1″ text_font=”Poppins||||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.9em” header_font=”||||||||” header_text_color=”#ffffff” header_2_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center”]

Companies across the hydrocarbon supply chain recognize the growing threat of sophisticated, malicious cyberattacks. Many companies continue to struggle to defend early-generation and remote operating assets, such as older compressor stations, which were engineered well before the widespread adoption of digital industrial control systems. As a result, these assets are vulnerable to long-term exposure to emerging cyber-risks, without the ability to be patched easily or updated quickly with the latest security defenses.

[/et_pb_text][et_pb_button button_url=”@[email protected][email protected]” button_text=”Download PDF” button_alignment=”right” _builder_version=”4.5.1″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#04a1a0″ button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Poppins|600||on|||||” button_use_icon=”off” custom_margin=”20px|||” custom_padding=”12px|28px|12px|28px” button_text_shadow_style=”preset2″ box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”30px” box_shadow_color=”#000000″ button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Image – Text” _builder_version=”4.5.1″ background_color=”#F8F8F8″ background_color_gradient_direction=”45deg” animation_style=”zoom” animation_intensity_zoom=”10%” animation_starting_opacity=”100%” box_shadow_style=”preset7″ box_shadow_horizontal=”0px” box_shadow_vertical=”-100px” box_shadow_color=”#ffffff” saved_tabs=”all” locked=”off”][et_pb_row _builder_version=”3.25″ locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Playfair Display|700|||||||” header_2_text_align=”center” header_2_text_color=”#2b2b2b” header_2_font_size=”42px” header_2_line_height=”1.5em” text_orientation=”center” module_alignment=”center” custom_margin=”||10px|” locked=”off”]

The State of Cybersecurity in the Oil and Gas Industry

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.5.1″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”80px|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” header_font=”||||||||” header_line_height=”1.5em” header_2_font=”Playfair Display|700|||||||” header_2_text_color=”#ffffff” header_2_font_size=”42px” header_2_line_height=”1.5em” header_3_font=”||||||||” header_4_font=”||||||||” header_5_font=”||||||||” header_6_font=”||||||||” custom_margin=”||10px|” locked=”off”]

Learn how US companies in the oil and gas industry are addressing cybersecurity risks in the operational technology (OT) environment.

[/et_pb_text][et_pb_divider color=”#f7d584″ divider_weight=”3px” _builder_version=”3.2″ max_width=”80px” module_alignment=”left” height=”10px” custom_margin=”||20px|” animation_style=”slide” animation_direction=”bottom” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”4.5.1″ text_font=”Poppins||||||||” text_text_color=”#000000″ text_font_size=”18px” text_line_height=”1.8em” header_font=”||||||||” locked=”off”]

According to the findings, the deployment of cybersecurity measures in the industry isn’t keeping pace with the growth of digitalization in oil and gas operations. In fact, just 35 percent of respondents rate their organization’s OT cyber readiness as high. With most respondents describing their organization as having low to medium cybersecurity readiness, 68 percent of respondents say their operations have had at least one security compromise in the past year, resulting in the loss of confidential information or OT disruption.

[/et_pb_text][et_pb_button button_text=”Read Article” _builder_version=”4.5.1″ custom_button=”on” button_text_size=”14px” button_text_color=”rgba(0,0,0,0.7)” button_bg_color=”#04a1a0″ button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”2px” button_font=”Poppins|600||on|||||” button_use_icon=”off” custom_margin=”20px|||” custom_padding=”12px|28px|12px|28px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”30px” button_letter_spacing_hover=”2px” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://cyberarmstech.com/wp-content/uploads/2022/06/cybersecurity-refinery-oil-gas-cyber-arms.jpg” title_text=”cybersecurity-refinery oil gas cyber arms” show_bottom_space=”off” _builder_version=”4.5.1″ animation_style=”slide” animation_direction=”top” animation_intensity_slide=”6%” animation_starting_opacity=”100%” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”100px” box_shadow_color=”rgba(0,0,0,0.2)” always_center_on_mobile=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]