Find relevant whitepapers, collaterals, guide books and various documents and files for a vast range of topics and necessities. Some of the files are openly available to download, while some are gated and requires name and email to view.


SNOK™ Network Intrusion Detection System
SNOK™ Endpoint Monitoring
SNOK™ PLC Threat Detection
SNOK™ PLC Threat Detection
SNOK™ Enterprise Solution
Cybersecurity specific for Operational Technology (OT)
New early-warning cybersecurity system

SNOK cybersecurity Monitoring for PCS7

Norwegian versions:

SNOK™ Endpoint Monitoring (Norwegian)
SNOK™ PLC Threat Detection (Norwegian)
SNOK™ Enterprise Solution (Norwegian)
SNOK™ Network Intrusion Detection System (Norwegian)

Interview and Media

Oil Sand Tech Podcast
Secure-NOK´s Siv Houmb talks about cybersecurity threats in the oil and gas industry
Guest editorial
IADC, Advanced Rig Technology Committee serve as leading voice on cybersecurity
Drilling Contractor Interview
Drilling Contractor Interviews Secure-NOKs Nina Hesby Tvedt about cyberecurity
The Advocate
Cybersecurity attacks could sink a largely unprepared energy industry

Female Entrepreneur Norway 2017 (Norwegian)

Protecting industrial control systems
Drilling contractor article
Taylored, layered defence-in-depth strategy can help build cyber resilience into rig OT systems
Drilling contractor article
Perspectives: Siv Hilde Houmb, Secure- NOK: Fortify cybersecurity to avoid downtime
Upstream Pumping
Protecting Drilling Rigs and Production Platforms from Cybersecurity Attacks
Upstream pumping
New Early-Warning Cybersecurity System Adds Extra Hardening Safeguards to Oil & Gas Industrial Control Networks


Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna.

IADC Guidelines for Assessing and managing Cybersecurity Risks to Drilling Assets

Cyber attacks on drilling control systems can cause enormous harm to people, the environment and equipment. The drilling process cannot simply stop if such an event is detected. Further, it’s possible that the response to a cyber attack can even worsen the situation. These guidelines, the only guidance specifically for drilling operations, draws from international standards to provide a means to assess the risk to drilling rigs from cyber attacks. Developed under the auspices of the IADC Cybersecurity Subcommittee. 25 pages. ©IADC. All Rights reserved.

Guidebook to the Current Standards for Cybersecurity for Drilling Control Systems

The Guidebook to the Current Standards for Cybersecurity for Drilling Control Systems is a detailed assessment of the classification, description, analysis, and comparison of the standards for cybersecurity systems applicable to industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems pervasive through modern drilling systems. The Guidebook is intended to be a living document – updated as necessary to reflect the current state of cybersecurity standards.

Cybersecurity Requirements for Drilling Assets

The rate of cybersecurity attacks and the attacks’ level of sophistication and organization are increasing. In 2014 – according to the US Department of Homeland Security (DHS) – 53% of all cyber attacks on critical infrastructure targeted the energy industry, and 30% of the attacks succeeded in breaching the security systems that were in place. In 2015, DHS recorded more than 9 cyber attacks per day that targeted the energy industry.

Asset Discovery

In the initial phase of securing your asset, or if you are wondering where to start, SNOK™ can be deployed in SNOK™ Asset Discovery mode on relevant network segments and endpoints of concern. Let it run for a while, then extract the collected information. You will get a report showing:

Topology and details of communication on the network that can be used to determine current vulnerability and plan how a SNOK™ Cybersecurity Monitoring system deployment should look like as well as other security measures such as network segmentation. SNOK™ Asset Discovery will also help you determine if your infrastructure is compliant with current security policies.

Trial Program

Secure-NOK™ offers a SNOK™ Trial Program. The SNOK™ solution is deployed, either as an Appliance or Virtual Machine on selected parts of the control system, for example a selected production line, subsystem or small site. The trial SNOK™ runs for a period of for example 30 days and includes an Analysis Report.