It is essential that software systems function correctly to ensure that the rig operates safely and performs efficiently. If these systems do not interact with the associated equipment, the rig is exposed to risk associated with safety, financial loss and productivity.
ADC’s cyber control systems specialists have proven to be valuable resource to clients, credited with identifying and resolving a broad range of issues prior to the acceptance of new build and in service rigs and identifying major potential sources of downtime across a broad spectrum of rig types and systems.
ADC specialists are OEM trained, competent and have extensive experience with the control systems and automation systems onboard cyber controlled Jack Ups in addition to the latest generation semi submersible and drillships.
In order to test a control system, the equipment under control must be operated or function tested. ADC witness test activities in accordance with OEM procedures and all control systems items are assessed against rig specific OEM Functional Design Specifications (FDS), Failure Mode Effects Analysis (FMEA) and Operating and Maintenance Manuals. Typical operational scenarios are used in final drilling systems evaluations to prove system integration and power management.
ADC verify the information processes meets the requirements as detailed within company policy documents and standards including:
ADC Cybersecurity inspection teams consist of professionals who combine training in hacking and intrusion with practical experience of system protection, virus detection and hands on inspection of modern networked drilling rig and vessel systems. As such, they apply a unique holistic approach to their inspections; essential when dealing with potential hackers. Our teams identify and categorise the differing levels of risk found and can provide effective management protocols to respond to present and deter future cyber attacks.
It is believed that less than 15% of operational drilling units have had a specific cyber audit to ascertain their vulnerability to attack, with less than 10% undergoing a deeper sweep of systems and software to detect back doors, malware and other nefarious cyber hazards.Joe Goodlad, team lead – Technology