Sponsorship & Exhibition Opportunities Now Available For 2021

Meet The Senior Decisions Makers With Job Titles Including:


VPs, COOs, CTOs, Directors, Managers, Engineers, Leads, Specialists, Coordinators, Analysts, Foremans, Superintendents, Advisors, Scientists in...

  • Automation 
  • SCADA
  • Engineering
  • Production
  • Optimization
  • I&E
  • Instrumentation
  • Controls
  • Operations
  • Systems
  • Measurement
  • (Advanced) Analytics
  • Data
  • Infrastructure & Platforms
  • IT
  • Facilities
  • Reservoir

Plus:

  • Reliability Engineers
  • Design Engineers
  • Asset Managers
  • Platform Managers
  • Area Managers
  • Supply & Procurement Managers
  • Chemical Managers
  • EHS Managers
  • Systems Architects

Meet Leading Technology & Services Providers In:

  • IoT & Edge Computing
  • Remote Monitoring Without Infrastructure
  • Real-Time Machine Learning Model Deployment
  • Autonomous Rod Pumping & ESP
  • Cybersecurity
  • Cloud-Computing
  • Smart Cameras
  • VR & Augmented Reality
  • Drones
  • Automating Manual Processes
  • Audio Analytics
  • Power Consumption Monitoring
  • Well Performance Diagnostics
  • Cost-Effective Well-Site Communications
  • AI Applications
  • Data Analytics
  • Field Communications
  • Data Analytic Dashboards
  • Condition Monitoring
  • Automating Controls

Agenda Conference Day 3: Thursday, 28 January, 2021

DAY 3

08:30 Virtual Event Platform Opens. Login & familiarize yourself with the platform features and introduce yourself to other participants.

08:50 Chair's Opening Remarks

Network & Communication Infrastructures

How Can You Build A Data Infrastructure That Delivers What You Need It To Deliver?

With the implementation of ever-increasing amounts of remote monitoring devices, the pressure on the networks and infrastructures that support the communication of data and information has never been greater. In this opening section of Day 3, we investigate the leading methodologies for delivering a data infrastructure that works.

KEYNOTE OPENING PANEL: EFFICIENT COMMUNICATIONS NETWORKS

09:00 Strategic Perspectives Examining The Possibilities & Trade Offs With IoT & Edge Devices As Regards The Objectives Of Your Communications Network - What are You Asking Your Data Infrastructure To Do?

In this keynote opening panel, we explore the strategic directions operators can take with regards building a data infrastructure that allows for fast, safe & reliable communications. What are the cost- implications and potential advantages of each approach?

1. Evaluating The Demands of IoT & Edge Devices On Communications & Network Infrastructure

  • What are the actual benefits of IoT & Edge devices with regards network infrastructure & how do these translate into cost-savings?
  • What are the implications for bandwidth as you increase the amount of computing that you are performing at the edge?
  • What network infrastructures best support IoT & Edge computing and how can these be implemented cost-effectively?
  • How does programming IoT & Edge devices to carry out more analytics at the edge affect network performance?

Charlie Kettner, Programming Specialist, ARC Resources

2. Building A Network Infrastructure Capable Of Streaming Large Amounts Of Data

  • What is the investment required to create a network infrastructure that allows for the greatest possible transference of real-time data?
  • How is that network monitored and supported? What is the manpower requirement and how is that deployed?
  • How do you go about processing that data in a central location to detect anomalies at remote locations and take action?
  • What devices and technologies place the greatest strain on the network?

David Benham, Senior Data Scientist, Laredo Petroleum

09:30 Extended Conference Discussion & Feedback Session

An opportunity for delegates to question speakers and feedback to conference on how they have addressed the challenges raised in the opening panel. What are the results they are seeing?

BANDWIDTH REQUIREMENTS

09:50 What Are The Alternatives Available To 5G In Rural Areas & Remote Locations? - Are There Other Options Available To Get More Bandwidth?

The rollout of 5G has so far focused almost exclusively on urban areas. Unable to take advantage of 5G in so many rural areas, what are the alternative solutions for increasing bandwidth?

  • In what ways is a lack of 5G infrastructure in rural locations leaving operators at a disadvantage going forward?
  • What is the technology currently available to operators to increase their bandwidth in the absence of 5G?
  • What are the cost-benefits of each approach, and how sustainable is that approach as more remote monitoring devices are added in the field?
  • What are the technologies coming down the line that may be able to assist in the near-future, such as satellite deployment?
  • How can you bolster your existing communications network to deliver more bandwidth?

10:15 Virtual Question & Answer Session

DATA STREAMING & NETWORK TRAFFIC

10:25 Applications To Enable The Streaming Of Large Amounts Of Data & Utilizing Applications & Technology To Efficiently Manage Traffic On That Network

The sheer amount of data being processed cannot only slow communications down, but interrupt & disrupt traffic on the network. How can such disruptions be mitigated?

  • What are the risks and challenges posed by inefficient and disruptive communications network infrastructure?
  • How can you effectively manage traffic on the network and ensure that operations traffic is not disrupted?
  • What are the applications and techniques that will allow you to prioritize your operations traffic?
  • What applications are available to help you manage various streams of data, such as video streams from remote monitoring cameras?
  • How can you set up the applications on your network to allow the network to effectively carry large amounts of data?

Evan Rynearson, SCADA Engineer, KODA Resources

10:50 Virtual Question & Answer Session

11:00 Morning Refreshment Break

>> New Technology Showcase & Interview <<

During the refreshment break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.

REMOTE MONITORING WITHOUT INFRASTRUCTURE

11:30 Implement A Cloud-Based SCADA System Without A Pre-Existing Communications Infrastructure To Remotely Monitor & Control Your Assets

In the absence of a pre-existing communications infrastructure, how can you utilize data intensive remote monitoring devices? We investigate the implementation of cloud-based SCADA systems.

  • How can you utilize LPE & data packages to build a more modern SCADA system that is responsive to your strategic requirements?
  • What are the leading devices that can allow you to utilize cloud-computing to store and analyze remote monitoring data?
  • What are the cost-benefits of cloud-computing when set against a more traditional, centralized SCADA system?
  • What are the cost-savings to be made when not having to support and maintain physical servers?
  • What are the implications for bandwidth and network strength of remote monitoring using the cloud?

Brandon Davis, SCADA & Automation Manager, Red Bluff Resources

11:55 Virtual Question & Answer Session

STORING & ANALYZING DATA

12:05 The Minimalist CAPEX Approach - Cloud SCADA & MQTT On Legacy Infrastructure

Digital Transformation can dramatically improve business KPIs such as break-even cost, however costly and radical overhauls of business systems, processes and staffing are typically required. Using real case studies, this session will share how some of the world's most progressive producers have migrated to cloud SCADA, consolidated asset operations, drastically reduced site travel, and leveraged IoT protocols such as MQTT to derive top results - all with minimal business disruption and CAPEX spend.

Fahad Cheema, Product ManagerHoneywell

12:30 Virtual Question & Answer Session

12:40 Lunch Break

>> New Technology Showcase & Interview <<

During the lunch break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.

Breakout Interactive Classrooms

Benchmarking Success In The Practical Application Of Well Site Automation

Running parallel to this afternoon's remaining sessions, these Breakout Interactive Classrooms  will offer delegates the opportunity to benchmark best practice in key areas of well site automation with fellow delegates. A maximum of 15 delegates in each will lead a fluid, dynamic conversation about the chosen topic, sharing actual results and solutions, with viewing delegates being able to put forward questions for discussion and offer up solutions themselves. What's working? What are the results? How do you deliver those results?

Classroom #1

Adding Cybersecurity Controls To Well-Site Automation

Duration: 13:50 - 15:30

  • Practical experiences on how operators are protecting their data and communications.
  • What are the vulnerabilities & threats you need to be aware of?
  • How can you keep your data secure yet accessible to those that need it?
  • Actual examples of the applications operators are utilizing for cybersecurity.

Cloud Computing & Cyber Security

Build & Maintain A Safe, Reliable & Accessible Data & Communications Infrastructure

Cloud-computing promises to reduce costs & increase data accessibility. But how is that data kept safe and secure? And as more cybersecurity controls are added, how do you ensure that the data remains as accessible as possible to those who need it?

STRATEGIC PANEL: FULFILLING THE PROMISE OF CLOUD COMPUTING

13:40 Developing A Secure Yet Accessible Cloud-Based Infrastructure - How Do You Strike The Balance & Reap The Rewards Of Cloud-Computing?

As the move towards cloud-computing gathers pace, we investigate how to mitigate security concerns and harness the true potential of cloud-computing. In three 10-minute case studies, leading industry experts detail how they are building and developing their cloud-based infrastructures.

1. Balancing The Security & Accessibility Of Data In Cloud Based Systems

  • What applications are operators utilizing on the encryption side to keep their communications safe and secure?
  • What are the router technologies available that offer greater security?
  • How do you ensure that security isn't taken to the point where it begins to impact and disrupt communications?

George Robertson, Cybersecurity Advisor, Chevron

2. Evaluate Capabilities Of Cloud Computing & The Associated Costs

  • How do you get your cloud-based system to deliver what you need it to deliver and what are the associated costs?
  • What are potential cost-savings and how do you design your system to take advantage of these savings?
  • What are the data analytic possibilities inherent in cloud-computing and how can operators utilize these?

Brandon Davis, SCADA & Automation Manager, Red Bluff Resources

3. Where Do You Draw The Line At What You Are Putting In The Cloud & Is There A Logical Stopping Point?

  • What information are operators putting in the cloud and why? What are they keeping off the cloud?
  • Is a fully-cloud based system the ideal, or are their reasons to strike a more balanced approach to where and how you keep your data?
  • How do the data and information demands of field personnel affect decisions on what information is cloud-based?

Latrell ChapmanField Infrastructure Lead, Denbury Resources

14:10 Extended Virtual Question & Answer Session

CYBERSECURITY CONTROLS

14:30 Practical Strategies For Ensuring Reliable Communications As More Cybersecurity Controls Are Added

What are the security threats confronting both cloud-based and non-cloud-based data infrastructures? How can you add cybersecurity controls in a way that does not compromise accessibility for key personnel?

  • What are the vulnerabilities of both cloud and non-cloud systems that operators need to be aware of?
  • What are the recommended cybersecurity controls and how do you implement them effectively?
  • What are the trade-offs between security & accessibility? How do you strike a balance between them?
  • How have operators successfully mitigated threats against their networks whilst keeping their data available to those who need it?

George Robertson, Cybersecurity Advisor, Chevron

14:50 Virtual Question & Answer Session

15:00 Afternoon Refreshment Break

>> New Technology Showcase & Interview <<

During the refreshment break, we give delegates the opportunity to hear from and question some of the leading vendors and services providers on some of the new technologies and applications being developed to solve some of the industry's most pressing automation challenges.

15:30 Classroom #1 Feedback Session

>> Adding Cybersecurity Controls To Well-Site Automation <<

The purpose of this session is to feedback to conference the results discussed in our earlier classroom. What are the challenges? What's working? What are the results? How do you deliver those results?

Classroom #2

Delivering Cost-Effective & Efficient Well-Site Automation That Can Stream, Store & Analyze Large Amounts Of Data for All Size Companies

Duration: 15:20 - 17:20

  • Can smaller and mid sized companies go digital, or is the latest technology only for big players?
  • What infrastructure investments must operators make to leverage Cloud infrastructure
  • How do new Cloud-Computing technologies practically save you money and also scale up?
  • How secure and stable is Cloud based technology compared to traditional technologies?

Led By:

Obren Lekic, Managing Director, Oilfield-Monitor LLC

Milan Plavsic, CEO, INIT Technologies LLC

THE VULNERABILITY OF REMOTE LOCATION DEVICES

15:45 Locating & Addressing Remote Location Security Vulnerabilities And Implementing Robust Safeguards

What are the specific security threats posed to handheld devices? What do you need to be implementing now to keep your devices safe & secure?

  • What are operators implementing in the way of identity-based security to prevent data and information falling into the wrong hands?
  • How can you protect data being accessed on non-company devices? How can you make it as secure as a company device?
  • What are the specific threats posed to handheld, portable devices such as cell phones?
  • What information is being made available on handheld devices and what information is being kept centralised?
  • What systems and protocols do you need to have in place to adequately protect your data from manipulation?

George RobertsonCybersecurity AdvisorChevron

16:05 Virtual Question & Answer Session

DATA ACCESSIBILITY IN REMOTE LOCATIONS

16:15 Practical Applications & Strategies For Increasing The Accessibility Of Data For Field Personnel In Remote Locations

With so much valuable information available, how do we increase the accessibility of that data so that it can be utilized to full effect? We investigate how operators are unleashing the potential of their data.

  • What is the desired end-point of data accessibility and what are the operational drivers behind it?
  • How do you securely move data off company devices to non-company devices for greater accessibility?
  • What are the technologies and applications available for ensuring that your personnel have the data they need, when they need it?
  • How can you ensure data accessibility if you do not have a cloud-based system, but a more centralized system?

Latrell Chapman, Field Infrastructure Lead, Denbury Resources

16:40 Virtual Question & Answer Session

MANAGING & UPGRADING REMOTE DEVICES

16:50 Cost-Effectively Manage Your Remote Devices From Your Central Office & Remotely Download Controls To Upgrade Firmware & Security For Users

With so many remote devices in the field, upgrading them all quickly and efficiently can prove challenging. How do you cost-effectively maintain and upgrade these devices when necessary?

  • How can you ensure that you are able to upgrade all of your devices from a central location?
  • What devices do you need to upgrade manually and why? What are the alternative solutions to centralised upgrades?
  • How can cloud-computing increase the efficiency of upgrades and to what extent can it remove the need for manual upgrades altogether?
  • What are the cost-benefits associated with centralised upgrades when set against upgrading devices manually?
  • What are the security considerations to take into account when upgrading devices from a central location?

Charlie Kettner, Programming Specialist, ARC Resources

17:15 Virtual Question & Answer Session

17:25 Afternoon Refreshment Break

>> Classroom #2 Feedback Session <<

The purpose of this session is to feedback to conference the results discussed in our earlier classroom. What are the challenges? What's working? What are the results? How do you deliver those results?

17:40 Chair's Closing Remarks & End Of Conference

AGENDA AT A GLANCE

Discover Real-World Automation Implementation Success Stories

DAY ONE

  • IoT & Edge Devices To Cost-Effectively Monitor Wells
  • Automation Applications To Run A Facility Unmanned
  • Strategies For Ensuring Secure & Reliable Communications
  • IoT & Edge Computing For Real-Time Diagnostics
  • IoT & Edge Applications For Pumps & Compressors
  • Dashboards That Utilize Truly Automated Analytics 
  • New Technologies For Automating Field Devices
  • Cost-Effective Equipment Sensors To Predict Failures
  • Automation Solutions For Pigging, Sense Separators, H2S
  • Automation Solutions For Rod Pump, Gas Lift & ESP

DAY TWO

  • Remote Monitoring To Detect & Reduce Fugitive Emissions
  • Remote Monitoring Technologies Without Infrastructure
  • Smart Camera Technologies That Accurately Detect Leaks
  • VR & Drones For Emission Reduction
  • Audio Analytics To Prevent Mechanical Failure
  • Real-Time Application Of Machine Learning
  • AI & Machine Learning For Workover Programs
  • IoT & Edge Technologies To Run Real-Time Data Analytics
  • The Latest IoT & Edge Devices For Pump-Off Controllers
  • Power Consumption Monitoring Applications

DAY THREE

  • Evaluating IoT & Edge Demands On Infrastructure
  • Network Infrastructures To Stream Large Amounts Of Data
  • 5G Alternatives In Rural Areas & Cloud-Based SCADA Systems
  • Applications  For Streaming Large Amounts Of Data
  • Security & Accessibility Of Data In Cloud Based Systems
  • Reliable & Safe Field Communications
  • Addressing Remote Location Security Vulnerabilities
  • Increasing The Accessibility Of Data For Field Personnel
  • Managing Remote Device & Field Upgrades

JOIN OUR MAILING LIST

By continuing to use this site you agree to the use of cookies. For more information and to find out how to change this click here