Advanced IT internal audit planning for 2025
A focus on the energy, natural resources, and chemicals sector

As the Energy, Natural Resources, and Chemicals (ENRC) sectors face rapid technological advancements and evolving regulatory landscapes, this thought leadership piece focuses on the unique challenges and opportunities. Here, we offer targeted audit considerations designed to align with the strategic goals and specific needs of this dynamic sector, helping organizations navigate the future with confidence.
Download our article here.
Industry-Specific Audit Considerations
In our published paper, we explore the "Top Risks" areas of focus for 2025 and here we expand to drill down on how they manifest for each sector. This industry-specific lens underscores the importance of tailoring audit strategies to address the nuanced needs and challenges of the industry.
Power and utilities
1
Physical security and cybersecurity convergence:
As physical and cybersecurity risks converge, particularly at critical infrastructure sites, audits must evaluate the integration of physical security measures with cybersecurity practices to prevent both physical and cyber intrusions.
2
Supply Chain cybersecurity:
The security of a utility’s supply chain is crucial, especially with increased reliance on third-party vendors for critical software and hardware. Audits need to ensure comprehensive risk assessments are performed on all suppliers and that continuous monitoring systems/processes are in place.
3
Business continuity and disaster recovery:
Ensuring continuity of operations during and after major disruptions is essential. Audits should test the effectiveness of disaster recovery plans and business continuity procedures, focusing on IT systems and operational technology.
4
Legacy technology and system obsolescence:
Legacy systems used by utilities pose significant risks due to potential incompatibilities and outdated security measures. Audits should assess the risks associated with maintaining these systems and should evaluate the strategic plans for technology upgrades or transitioned.
5
Endpoint security management:
The increase in remote work, the variety of endpoint types existing in technology environments, and mobile device usage extends the utility's attack surface. Risks also exist around configuration drift as similar technologies may be deployed with different levels of protection / software. Audits must evaluate endpoint security strategies, including device management, encryption practices, monitoring capabilities, and access controls.
Services & equipment
- Remote operations and field technician security: The use of remote monitoring, control systems, and connectivity for field operations and engineering services introduces unique cybersecurity challenges. Audits should assess security measures around remote access, communication protocols, and device management.
- Data governance and privacy in service operations: Managing sensitive project and operation data requires stringent governance and privacy practices. Audits should evaluate data governance frameworks, ensuring that privacy practices comply with industry regulations and standards.
- Cybersecurity implications of emerging technologies used by service providers: The adoption of emerging technologies like AI, IoT, and blockchain introduces new cyber risks. Audits should evaluate the cybersecurity measures in place for these technologies, ensuring vulnerabilities are adequately addressed.
- Control system segmentation and isolation: Segregating control systems from corporate networks reduces risks of breach propagation. Audits should assess the segmentation and isolation practices in place to protect sensitive control systems from broader network threats.
- Cloud and data center security: As energy service providers increasingly leverage cloud technologies and data centers for operational efficiencies, audits must examine the security of these environments, focusing on data encryption, access controls, and compliance with industry standards.
Upstream oil & gas
The reliance on legacy systems and aging physical assets in utilities' upstream infrastructure presents risks due to potential incompatibilities and outdated maintenance. Comprehensive audits are necessary to assess these risks and evaluate strategic plans for upgrades or transitions to more efficient solutions. This proactive approach ensures the continued reliability, efficiency, and safety of utility services amidst evolving operational demands.
In the ever-evolving landscape of the upstream energy sector, a robust IT operating model is essential for driving operational efficiency, streamlining processes, and enhancing data management. With ongoing digital transformations, it is critical to have a coherent IT strategy that aligns with business goals.
Audits are crucial for assessing the integrity and security of IT systems managing supplier relationships, data exchange, and procurement processes. By identifying vulnerabilities and ensuring robust cybersecurity measures, these audits help mitigate risks related to data breaches, compliance issues, and operational disruptions. This proactive approach ensures a secure and resilient supply chain, supporting the efficiency and reliability of upstream services.
AI technologies are being used in upstream operations to improve efficiency and decision-making in areas like predictive maintenance and reservoir management. This integration requires robust ethical, regulatory, governance, security, and data management practices. Audits should assess the development, deployment, and impact of AI systems to ensure responsible use and establish strong governance and security measures.
Dive into our thinking:
Advanced IT internal audit planning for 2025
Download PDFMidstream oil & gas
- Cybersecurity: Cyber-attacks (including ransomware, phishing, and other malicious activities) pose a substantial risk to midstream companies. These attacks can target critical infrastructure, resulting in operational disruptions, data breaches, financial losses, and damage to reputation.
- Legacy systems and integration: Many midstream companies still rely on legacy IT systems that may not integrate well with newer technologies. This can lead to inefficiencies, data silos, and an increased risk of system failures.
- Data management and integrity: Midstream operations generate vast amounts of data, from sensor data to transactional information. Ensuring the accuracy, security, and integrity of this data is critical. Poor data management can lead to operational inefficiencies, regulatory compliance issues, and decision-making based on inaccurate information.
- Supply chain and third-party risks: Increasing reliance on third-party vendors and service providers, including cloud service providers and other IT partners, introduces risks related to the security and reliability of those third parties. A security breach or failure in a third-party system can propagate and affect midstream operations.
- Regulatory compliance and legal risks: As regulations concerning data privacy, cybersecurity, and digital operations evolve, midstream companies must ensure ongoing compliance with a complex and changing regulatory landscape. Non-compliance can result in financial penalties, legal action, and reputational harm.
Oil & gas refining, chemicals
1
2
3
4
5
Next Steps
Explore more
Popular category topics
Meet our team

