Agenda Conference Day 3: Thursday, 28 January, 2021

DAY 3

08:30 Virtual Event Platform Opens. Login & familiarize yourself with the platform features and introduce yourself to other participants.

08:50 Chair's Opening Remarks

Network & Communication Infrastructures

How Can You Build A Data Infrastructure That Delivers What You Need It To Deliver?

With the implementation of ever-increasing amounts of remote monitoring devices, the pressure on the networks and infrastructures that support the communication of data and information has never been greater. In this opening section of Day 3, we investigate the leading methodologies for delivering a data infrastructure that works.

KEYNOTE OPENING PANEL: EFFICIENT COMMUNICATIONS NETWORKS

09:00 Strategic Perspectives Examining The Possibilities & Trade Offs With IoT & Edge Devices As Regards The Objectives Of Your Communications Network - What are You Asking Your Data Infrastructure To Do?

In this keynote opening panel, we explore the strategic directions operators can take with regards building a data infrastructure that allows for fast, safe & reliable communications. What are the cost- implications and potential advantages of each approach?

1. Evaluating The Demands of IoT & Edge Devices On Communications & Network Infrastructure

  • What are the actual benefits of IoT & Edge devices with regards network infrastructure & how do these translate into cost-savings?
  • What are the implications for bandwidth as you increase the amount of computing that you are performing at the edge?
  • What network infrastructures best support IoT & Edge computing and how can these be implemented cost-effectively?
  • How does programming IoT & Edge devices to carry out more analytics at the edge affect network performance?

Charlie Kettner, Programming Specialist, ARC Resources

2. Building A Network Infrastructure Capable Of Streaming Large Amounts Of Data

  • What is the investment required to create a network infrastructure that allows for the greatest possible transference of real-time data?
  • How is that network monitored and supported? What is the manpower requirement and how is that deployed?
  • How do you go about processing that data in a central location to detect anomalies at remote locations and take action?
  • What devices and technologies place the greatest strain on the network?

09:30 Extended Conference Discussion & Feedback Session

An opportunity for delegates to question speakers and feedback to conference on how they have addressed the challenges raised in the opening panel. What are the results they are seeing?

BANDWIDTH REQUIREMENTS

09:50 What Are The Alternatives Available To 5G In Rural Areas & Remote Locations? - Are There Other Options Available To Get More Bandwidth?

The rollout of 5G has so far focused almost exclusively on urban areas. Unable to take advantage of 5G in so many rural areas, what are the alternative solutions for increasing bandwidth?

  • In what ways is a lack of 5G infrastructure in rural locations leaving operators at a disadvantage going forward?
  • What is the technology currently available to operators to increase their bandwidth in the absence of 5G?
  • What are the cost-benefits of each approach, and how sustainable is that approach as more remote monitoring devices are added in the field?
  • What are the technologies coming down the line that may be able to assist in the near-future, such as satellite deployment?
  • How can you bolster your existing communications network to deliver more bandwidth?

10:15 Virtual Question & Answer Session

DATA STREAMING & NETWORK TRAFFIC

10:25 Applications To Enable The Streaming Of Large Amounts Of Data & Utilizing Applications & Technology To Efficiently Manage Traffic On That Network

The sheer amount of data being processed cannot only slow communications down, but interrupt & disrupt traffic on the network. How can such disruptions be mitigated?

  • What are the risks and challenges posed by inefficient and disruptive communications network infrastructure?
  • How can you effectively manage traffic on the network and ensure that operations traffic is not disrupted?
  • What are the applications and techniques that will allow you to prioritize your operations traffic?
  • What applications are available to help you manage various streams of data, such as video streams from remote monitoring cameras?
  • How can you set up the applications on your network to allow the network to effectively carry large amounts of data?

Evan Rynearson, SCADA Engineer, KODA Resources

10:50 Virtual Question & Answer Session

11:00 Morning Refreshment Break

>> New Technology Showcase & Interview <<

During the refreshment break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.

REMOTE MONITORING WITHOUT INFRASTRUCTURE

11:30 Implement A Cloud-Based SCADA System Without A Pre-Existing Communications Infrastructure To Remotely Monitor & Control Your Assets

In the absence of a pre-existing communications infrastructure, how can you utilize data intensive remote monitoring devices? We investigate the implementation of cloud-based SCADA systems.

  • How can you utilize LPE & data packages to build a more modern SCADA system that is responsive to your strategic requirements?
  • What are the leading devices that can allow you to utilize cloud-computing to store and analyze remote monitoring data?
  • What are the cost-benefits of cloud-computing when set against a more traditional, centralized SCADA system?
  • What are the cost-savings to be made when not having to support and maintain physical servers?
  • What are the implications for bandwidth and network strength of remote monitoring using the cloud?

Brandon Davis, SCADA & Automation Manager, Red Bluff Resources

11:55 Virtual Question & Answer Session

STORING & ANALYZING DATA

12:05 Investigate The Tools & Resources Available For Gathering, Storing & Analyzing Large Amounts Of Data & Turning It Into Valuable Information For Engineers

There are increasing regulatory and operational drivers behind the need to gather, store and analyze the data coming in. How do you ensure the data coming in is both stored and utilized efficiently?

  • What are the resources and historian platforms available to store the information coming in from the field?
  • What are operators using to make sense of the data coming in so that they can deploy it effectively in day to day operations?
  • How can you ensure that the pressure data coming in securely stored away and backlogged correctly?
  • How can the data coming in be integrated across the organization to give insights into how to reduce costs and drive efficiencies?
  • What are technologies available to make data retrieval as efficient as possible?

Fahad Cheema, Honeywell

12:30 Virtual Question & Answer Session

12:40 Lunch Break

>> New Technology Showcase & Interview <<

During the lunch break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.

Interactive Peer Review Roundtables Sessions

Benchmarking Success In The Practical Application Of Well Site Automation

Running parallel to this afternoon's remaining sessions, these Interactive Peer Review Roundtable Sessions will offer delegates the opportunity to benchmark best practice in key areas of well site automation with fellow delegates. A maximum of 15 delegates in each will lead a fluid, dynamic conversation about the chosen topic, sharing actual results and solutions, with viewing delegates being able to put forward questions for discussion and offer up solutions themselves. What's working? What are the results? How do you deliver those results?

Roundtable #1

Adding Cybersecurity Controls To Well-Site Automation

Duration: 13:50 - 15:30

  • Practical experiences on how operators are protecting their data and communications.
  • What are the vulnerabilities & threats you need to be aware of?
  • How can you keep your data secure yet accessible to those that need it?
  • Actual examples of the applications operators are utilizing for cybersecurity.

Cloud Computing & Cyber Security

Build & Maintain A Safe, Reliable & Accessible Data & Communications Infrastructure

Cloud-computing promises to reduce costs & increase data accessibility. But how is that data kept safe and secure? And as more cybersecurity controls are added, how do you ensure that the data remains as accessible as possible to those who need it?

STRATEGIC PANEL: FULFILLING THE PROMISE OF CLOUD COMPUTING

13:40 Developing A Secure Yet Accessible Cloud-Based Infrastructure - How Do You Strike The Balance & Reap The Rewards Of Cloud-Computing?

As the move towards cloud-computing gathers pace, we investigate how to mitigate security concerns and harness the true potential of cloud-computing. In three 10-minute case studies, leading industry experts detail how they are building and developing their cloud-based infrastructures.

1. Balancing The Security & Accessibility Of Data In Cloud Based Systems

  • What applications are operators utilizing on the encryption side to keep their communications safe and secure?
  • What are the router technologies available that offer greater security?
  • How do you ensure that security isn't taken to the point where it begins to impact and disrupt communications?

George Robertson, Cybersecurity Advisor, Chevron

2. Evaluate Capabilities Of Cloud Computing & The Associated Costs

  • How do you get your cloud-based system to deliver what you need it to deliver and what are the associated costs?
  • What are potential cost-savings and how do you design your system to take advantage of these savings?
  • What are the data analytic possibilities inherent in cloud-computing and how can operators utilize these?

Brandon Davis, SCADA & Automation Manager, Red Bluff Resources

3. Where Do You Draw The Line At What You Are Putting In The Cloud & Is There A Logical Stopping Point?

  • What information are operators putting in the cloud and why? What are they keeping off the cloud?
  • Is a fully-cloud based system the ideal, or are their reasons to strike a more balanced approach to where and how you keep your data?
  • How do the data and information demands of field personnel affect decisions on what information is cloud-based?

Latrell Chapman,Field Infrastructure Lead, Denbury Resources

14:10 Extended Virtual Question & Answer Session

CYBERSECURITY CONTROLS

14:30 Practical Strategies For Ensuring Reliable Communications As More Cybersecurity Controls Are Added

What are the security threats confronting both cloud-based and non-cloud-based data infrastructures? How can you add cybersecurity controls in a way that does not compromise accessibility for key personnel?

  • What are the vulnerabilities of both cloud and non-cloud systems that operators need to be aware of?
  • What are the recommended cybersecurity controls and how do you implement them effectively?
  • What are the trade-offs between security & accessibility? How do you strike a balance between them?
  • How have operators successfully mitigated threats against their networks whilst keeping their data available to those who need it?

George Robertson, Cybersecurity Advisor, Chevron

14:50 Virtual Question & Answer Session

15:00 Afternoon Refreshment Break

>> New Technology Showcase & Interview <<

During the refreshment break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.

15:30 Roundtable #1 Feedback Session

>> Adding Cybersecurity Controls To Well-Site Automation <<

The purpose of this session is to feedback to conference the results discussed in our earlier roundtable discussion. What are the challenges? What's working? What are the results? How do you deliver those results?

Roundtable #2

Delivering Cost-Effective & Efficient Well-Site Communications

Duration: 15:20 - 17:20

  • What infrastructure investments are operators making to their communications networks?
  • What are the applications allowing operators to reduce bandwidth demands?
  • How are they overcoming the lack of 5G in rural and remote locations?
  • How can your prioritize operations traffic in network communications?
THE VULNERABILITY OF REMOTE LOCATION DEVICES

15:45 Locating & Addressing Remote Location Security Vulnerabilities And Implementing Robust Safeguards

What are the specific security threats posed to handheld devices? What do you need to be implementing now to keep your devices safe & secure?

  • What are operators implementing in the way of identity-based security to prevent data and information falling into the wrong hands?
  • How can you protect data being accessed on non-company devices? How can you make it as secure as a company device?
  • What are the specific threats posed to handheld, portable devices such as cell phones?
  • What information is being made available on handheld devices and what information is being kept centralised?
  • What systems and protocols do you need to have in place to adequately protect your data from manipulation?

16:05 Virtual Question & Answer Session

DATA ACCESSIBILITY IN REMOTE LOCATIONS

16:15 Practical Applications & Strategies For Increasing The Accessibility Of Data For Field Personnel In Remote Locations

With so much valuable information available, how do we increase the accessibility of that data so that it can be utilized to full effect? We investigate how operators are unleashing the potential of their data.

  • What is the desired end-point of data accessibility and what are the operational drivers behind it?
  • How do you securely move data off company devices to non-company devices for greater accessibility?
  • What are the technologies and applications available for ensuring that your personnel have the data they need, when they need it?
  • How can you ensure data accessibility if you do not have a cloud-based system, but a more centralized system?

16:40 Virtual Question & Answer Session

MANAGING & UPGRADING REMOTE DEVICES

16:50 Cost-Effectively Manage Your Remote Devices From Your Central Office & Remotely Download Controls To Upgrade Firmware & Security For Users

With so many remote devices in the field, upgrading them all quickly and efficiently can prove challenging. How do you cost-effectively maintain and upgrade these devices when necessary?

  • How can you ensure that you are able to upgrade all of your devices from a central location?
  • What devices do you need to upgrade manually and why? What are the alternative solutions to centralised upgrades?
  • How can cloud-computing increase the efficiency of upgrades and to what extent can it remove the need for manual upgrades altogether?
  • What are the cost-benefits associated with centralised upgrades when set against upgrading devices manually?
  • What are the security considerations to take into account when upgrading devices from a central location?

17:15 Virtual Question & Answer Session

17:25 Afternoon Refreshment Break

>> Roundtable #2 Feedback Session <<

The purpose of this session is to feedback to conference the results discussed in our earlier roundtable discussion. What are the challenges? What's working? What are the results? How do you deliver those results?

17:40 Chair's Closing Remarks & End Of Conference

JOIN OUR MAILING LIST

By continuing to use this site you agree to the use of cookies. For more information and to find out how to change this click here