Sponsorship & Exhibition Opportunities Now Available For 2021
Meet The Senior Decisions Makers With Job Titles Including:
VPs, COOs, CTOs, Directors, Managers, Engineers, Leads, Specialists, Coordinators, Analysts, Foremans, Superintendents, Advisors, Scientists in...
- Automation
- SCADA
- Engineering
- Production
- Optimization
- I&E
- Instrumentation
- Controls
- Operations
- Systems
- Measurement
- (Advanced) Analytics
- Data
- Infrastructure & Platforms
- IT
- Facilities
- Reservoir
Plus:
- Reliability Engineers
- Design Engineers
- Asset Managers
- Platform Managers
- Area Managers
- Supply & Procurement Managers
- Chemical Managers
- EHS Managers
- Systems Architects
Meet Leading Technology & Services Providers In:
- IoT & Edge Computing
- Remote Monitoring Without Infrastructure
- Real-Time Machine Learning Model Deployment
- Autonomous Rod Pumping & ESP
- Cybersecurity
- Cloud-Computing
- Smart Cameras
- VR & Augmented Reality
- Drones
- Automating Manual Processes
- Audio Analytics
- Power Consumption Monitoring
- Well Performance Diagnostics
- Cost-Effective Well-Site Communications
- AI Applications
- Data Analytics
- Field Communications
- Data Analytic Dashboards
- Condition Monitoring
- Automating Controls
FOLLOW US...
Agenda Conference Day 3: Thursday, 28 January, 2021
DAY 3
08:30 Virtual Event Platform Opens. Login & familiarize yourself with the platform features and introduce yourself to other participants.
08:50 Chair's Opening Remarks
Network & Communication Infrastructures
How Can You Build A Data Infrastructure That Delivers What You Need It To Deliver?
With the implementation of ever-increasing amounts of remote monitoring devices, the pressure on the networks and infrastructures that support the communication of data and information has never been greater. In this opening section of Day 3, we investigate the leading methodologies for delivering a data infrastructure that works.
KEYNOTE OPENING PANEL: EFFICIENT COMMUNICATIONS NETWORKS
09:00 Strategic Perspectives Examining The Possibilities & Trade Offs With IoT & Edge Devices As Regards The Objectives Of Your Communications Network - What are You Asking Your Data Infrastructure To Do?
In this keynote opening panel, we explore the strategic directions operators can take with regards building a data infrastructure that allows for fast, safe & reliable communications. What are the cost- implications and potential advantages of each approach?
1. Evaluating The Demands of IoT & Edge Devices On Communications & Network Infrastructure
- What are the actual benefits of IoT & Edge devices with regards network infrastructure & how do these translate into cost-savings?
- What are the implications for bandwidth as you increase the amount of computing that you are performing at the edge?
- What network infrastructures best support IoT & Edge computing and how can these be implemented cost-effectively?
- How does programming IoT & Edge devices to carry out more analytics at the edge affect network performance?
Charlie Kettner, Programming Specialist, ARC Resources
2. Building A Network Infrastructure Capable Of Streaming Large Amounts Of Data
- What is the investment required to create a network infrastructure that allows for the greatest possible transference of real-time data?
- How is that network monitored and supported? What is the manpower requirement and how is that deployed?
- How do you go about processing that data in a central location to detect anomalies at remote locations and take action?
- What devices and technologies place the greatest strain on the network?
David Benham, Senior Data Scientist, Laredo Petroleum
09:30 Extended Conference Discussion & Feedback Session
An opportunity for delegates to question speakers and feedback to conference on how they have addressed the challenges raised in the opening panel. What are the results they are seeing?
BANDWIDTH REQUIREMENTS
09:50 What Are The Alternatives Available To 5G In Rural Areas & Remote Locations? - Are There Other Options Available To Get More Bandwidth?
The rollout of 5G has so far focused almost exclusively on urban areas. Unable to take advantage of 5G in so many rural areas, what are the alternative solutions for increasing bandwidth?
- In what ways is a lack of 5G infrastructure in rural locations leaving operators at a disadvantage going forward?
- What is the technology currently available to operators to increase their bandwidth in the absence of 5G?
- What are the cost-benefits of each approach, and how sustainable is that approach as more remote monitoring devices are added in the field?
- What are the technologies coming down the line that may be able to assist in the near-future, such as satellite deployment?
- How can you bolster your existing communications network to deliver more bandwidth?
10:15 Virtual Question & Answer Session
DATA STREAMING & NETWORK TRAFFIC
10:25 Applications To Enable The Streaming Of Large Amounts Of Data & Utilizing Applications & Technology To Efficiently Manage Traffic On That Network
The sheer amount of data being processed cannot only slow communications down, but interrupt & disrupt traffic on the network. How can such disruptions be mitigated?
- What are the risks and challenges posed by inefficient and disruptive communications network infrastructure?
- How can you effectively manage traffic on the network and ensure that operations traffic is not disrupted?
- What are the applications and techniques that will allow you to prioritize your operations traffic?
- What applications are available to help you manage various streams of data, such as video streams from remote monitoring cameras?
- How can you set up the applications on your network to allow the network to effectively carry large amounts of data?
Evan Rynearson, SCADA Engineer, KODA Resources
10:50 Virtual Question & Answer Session
11:00 Morning Refreshment Break
>> New Technology Showcase & Interview <<
During the refreshment break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.
REMOTE MONITORING WITHOUT INFRASTRUCTURE
11:30 Implement A Cloud-Based SCADA System Without A Pre-Existing Communications Infrastructure To Remotely Monitor & Control Your Assets
In the absence of a pre-existing communications infrastructure, how can you utilize data intensive remote monitoring devices? We investigate the implementation of cloud-based SCADA systems.
- How can you utilize LPE & data packages to build a more modern SCADA system that is responsive to your strategic requirements?
- What are the leading devices that can allow you to utilize cloud-computing to store and analyze remote monitoring data?
- What are the cost-benefits of cloud-computing when set against a more traditional, centralized SCADA system?
- What are the cost-savings to be made when not having to support and maintain physical servers?
- What are the implications for bandwidth and network strength of remote monitoring using the cloud?
Brandon Davis, SCADA & Automation Manager, Red Bluff Resources
11:55 Virtual Question & Answer Session
STORING & ANALYZING DATA
12:05 The Minimalist CAPEX Approach - Cloud SCADA & MQTT On Legacy Infrastructure
Digital Transformation can dramatically improve business KPIs such as break-even cost, however costly and radical overhauls of business systems, processes and staffing are typically required. Using real case studies, this session will share how some of the world's most progressive producers have migrated to cloud SCADA, consolidated asset operations, drastically reduced site travel, and leveraged IoT protocols such as MQTT to derive top results - all with minimal business disruption and CAPEX spend.
Fahad Cheema, Product Manager, Honeywell
12:30 Virtual Question & Answer Session
12:40 Lunch Break
>> New Technology Showcase & Interview <<
During the lunch break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.
Breakout Interactive Classrooms
Benchmarking Success In The Practical Application Of Well Site Automation
Running parallel to this afternoon's remaining sessions, these Breakout Interactive Classrooms will offer delegates the opportunity to benchmark best practice in key areas of well site automation with fellow delegates. A maximum of 15 delegates in each will lead a fluid, dynamic conversation about the chosen topic, sharing actual results and solutions, with viewing delegates being able to put forward questions for discussion and offer up solutions themselves. What's working? What are the results? How do you deliver those results?
Classroom #1
Adding Cybersecurity Controls To Well-Site Automation
Duration: 13:50 - 15:30
- Practical experiences on how operators are protecting their data and communications.
- What are the vulnerabilities & threats you need to be aware of?
- How can you keep your data secure yet accessible to those that need it?
- Actual examples of the applications operators are utilizing for cybersecurity.
Cloud Computing & Cyber Security
Build & Maintain A Safe, Reliable & Accessible Data & Communications Infrastructure
Cloud-computing promises to reduce costs & increase data accessibility. But how is that data kept safe and secure? And as more cybersecurity controls are added, how do you ensure that the data remains as accessible as possible to those who need it?
STRATEGIC PANEL: FULFILLING THE PROMISE OF CLOUD COMPUTING
13:40 Developing A Secure Yet Accessible Cloud-Based Infrastructure - How Do You Strike The Balance & Reap The Rewards Of Cloud-Computing?
As the move towards cloud-computing gathers pace, we investigate how to mitigate security concerns and harness the true potential of cloud-computing. In three 10-minute case studies, leading industry experts detail how they are building and developing their cloud-based infrastructures.
1. Balancing The Security & Accessibility Of Data In Cloud Based Systems
- What applications are operators utilizing on the encryption side to keep their communications safe and secure?
- What are the router technologies available that offer greater security?
- How do you ensure that security isn't taken to the point where it begins to impact and disrupt communications?
George Robertson, Cybersecurity Advisor, Chevron
2. Evaluate Capabilities Of Cloud Computing & The Associated Costs
- How do you get your cloud-based system to deliver what you need it to deliver and what are the associated costs?
- What are potential cost-savings and how do you design your system to take advantage of these savings?
- What are the data analytic possibilities inherent in cloud-computing and how can operators utilize these?
Brandon Davis, SCADA & Automation Manager, Red Bluff Resources
3. Where Do You Draw The Line At What You Are Putting In The Cloud & Is There A Logical Stopping Point?
- What information are operators putting in the cloud and why? What are they keeping off the cloud?
- Is a fully-cloud based system the ideal, or are their reasons to strike a more balanced approach to where and how you keep your data?
- How do the data and information demands of field personnel affect decisions on what information is cloud-based?
Latrell Chapman, Field Infrastructure Lead, Denbury Resources
14:10 Extended Virtual Question & Answer Session
CYBERSECURITY CONTROLS
14:30 Practical Strategies For Ensuring Reliable Communications As More Cybersecurity Controls Are Added
What are the security threats confronting both cloud-based and non-cloud-based data infrastructures? How can you add cybersecurity controls in a way that does not compromise accessibility for key personnel?
- What are the vulnerabilities of both cloud and non-cloud systems that operators need to be aware of?
- What are the recommended cybersecurity controls and how do you implement them effectively?
- What are the trade-offs between security & accessibility? How do you strike a balance between them?
- How have operators successfully mitigated threats against their networks whilst keeping their data available to those who need it?
George Robertson, Cybersecurity Advisor, Chevron
14:50 Virtual Question & Answer Session
15:00 Afternoon Refreshment Break
>> New Technology Showcase & Interview <<
During the refreshment break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.
15:30 Classroom #1 Feedback Session
>> Adding Cybersecurity Controls To Well-Site Automation <<
The purpose of this session is to feedback to conference the results discussed in our earlier classroom. What are the challenges? What's working? What are the results? How do you deliver those results?
Classroom #2
Delivering Cost-Effective & Efficient Well-Site Automation That Can Stream, Store & Analyze Large Amounts Of Data for All Size Companies
Duration: 15:20 - 17:20
- Can smaller and mid sized companies go digital, or is the latest technology only for big players?
- What infrastructure investments must operators make to leverage Cloud infrastructure
- How do new Cloud-Computing technologies practically save you money and also scale up?
- How secure and stable is Cloud based technology compared to traditional technologies?
Led By:
Obren Lekic, Managing Director, Oilfield-Monitor LLC
Milan Plavsic, CEO, INIT Technologies LLC
THE VULNERABILITY OF REMOTE LOCATION DEVICES
15:45 Locating & Addressing Remote Location Security Vulnerabilities And Implementing Robust Safeguards
What are the specific security threats posed to handheld devices? What do you need to be implementing now to keep your devices safe & secure?
- What are operators implementing in the way of identity-based security to prevent data and information falling into the wrong hands?
- How can you protect data being accessed on non-company devices? How can you make it as secure as a company device?
- What are the specific threats posed to handheld, portable devices such as cell phones?
- What information is being made available on handheld devices and what information is being kept centralised?
- What systems and protocols do you need to have in place to adequately protect your data from manipulation?
George Robertson, Cybersecurity Advisor, Chevron
16:05 Virtual Question & Answer Session
DATA ACCESSIBILITY IN REMOTE LOCATIONS
16:15 Practical Applications & Strategies For Increasing The Accessibility Of Data For Field Personnel In Remote Locations
With so much valuable information available, how do we increase the accessibility of that data so that it can be utilized to full effect? We investigate how operators are unleashing the potential of their data.
- What is the desired end-point of data accessibility and what are the operational drivers behind it?
- How do you securely move data off company devices to non-company devices for greater accessibility?
- What are the technologies and applications available for ensuring that your personnel have the data they need, when they need it?
- How can you ensure data accessibility if you do not have a cloud-based system, but a more centralized system?
Latrell Chapman, Field Infrastructure Lead, Denbury Resources
16:40 Virtual Question & Answer Session
MANAGING & UPGRADING REMOTE DEVICES
16:50 Cost-Effectively Manage Your Remote Devices From Your Central Office & Remotely Download Controls To Upgrade Firmware & Security For Users
With so many remote devices in the field, upgrading them all quickly and efficiently can prove challenging. How do you cost-effectively maintain and upgrade these devices when necessary?
- How can you ensure that you are able to upgrade all of your devices from a central location?
- What devices do you need to upgrade manually and why? What are the alternative solutions to centralised upgrades?
- How can cloud-computing increase the efficiency of upgrades and to what extent can it remove the need for manual upgrades altogether?
- What are the cost-benefits associated with centralised upgrades when set against upgrading devices manually?
- What are the security considerations to take into account when upgrading devices from a central location?
Charlie Kettner, Programming Specialist, ARC Resources
17:15 Virtual Question & Answer Session
17:25 Afternoon Refreshment Break
>> Classroom #2 Feedback Session <<
The purpose of this session is to feedback to conference the results discussed in our earlier classroom. What are the challenges? What's working? What are the results? How do you deliver those results?
17:40 Chair's Closing Remarks & End Of Conference
AGENDA AT A GLANCE
Discover Real-World Automation Implementation Success Stories
DAY ONE
- IoT & Edge Devices To Cost-Effectively Monitor Wells
- Automation Applications To Run A Facility Unmanned
- Strategies For Ensuring Secure & Reliable Communications
- IoT & Edge Computing For Real-Time Diagnostics
- IoT & Edge Applications For Pumps & Compressors
- Dashboards That Utilize Truly Automated Analytics
- New Technologies For Automating Field Devices
- Cost-Effective Equipment Sensors To Predict Failures
- Automation Solutions For Pigging, Sense Separators, H2S
- Automation Solutions For Rod Pump, Gas Lift & ESP
DAY TWO
- Remote Monitoring To Detect & Reduce Fugitive Emissions
- Remote Monitoring Technologies Without Infrastructure
- Smart Camera Technologies That Accurately Detect Leaks
- VR & Drones For Emission Reduction
- Audio Analytics To Prevent Mechanical Failure
- Real-Time Application Of Machine Learning
- AI & Machine Learning For Workover Programs
- IoT & Edge Technologies To Run Real-Time Data Analytics
- The Latest IoT & Edge Devices For Pump-Off Controllers
- Power Consumption Monitoring Applications
DAY THREE
- Evaluating IoT & Edge Demands On Infrastructure
- Network Infrastructures To Stream Large Amounts Of Data
- 5G Alternatives In Rural Areas & Cloud-Based SCADA Systems
- Applications For Streaming Large Amounts Of Data
- Security & Accessibility Of Data In Cloud Based Systems
- Reliable & Safe Field Communications
- Addressing Remote Location Security Vulnerabilities
- Increasing The Accessibility Of Data For Field Personnel
- Managing Remote Device & Field Upgrades