medium match confidence
Sentence-level differences:
- Reworded sentence: "Our business is faced with growing cybersecurity threats as we increasingly rely on digital technologies across our business."
- Reworded sentence: "Further, our ability to insure against cybersecurity risks may be limited by the availability and increasing expense of sufficient coverage."
Current (2024):
Our business is faced with growing cybersecurity threats as we increasingly rely on digital technologies across our business. Cybersecurity risks to our business, including our suppliers, third-party service providers, contractors, joint venture partners and external business…
Read full text
Our business is faced with growing cybersecurity threats as we increasingly rely on digital technologies across our business. Cybersecurity risks to our business, including our suppliers, third-party service providers, contractors, joint venture partners and external business partners, include but are not limited to: •Unauthorized access to, or control of or disclosure of sensitive information about our business and our employees; •Compromise of our data or systems, including corruption, sabotage, encryption or acts that otherwise render our data or systems unusable (or those of third-parties with whom we do business, including third-party cloud and information technology (IT) service providers); •Theft or manipulation of our proprietary information; •Ransom; •Extortion; •Threats to the security of our facilities and infrastructure; and •Cyber terrorism. In addition, we have exposure to cybersecurity risks where our data and proprietary information are collected, hosted, and/or processed by third-party cloud and service providers. Our risks may be exacerbated by a delay or failure to detect a cybersecurity incident or understand the full extent of such incident notwithstanding our risk management processes and controls. We face risks associated with new and ever-increasing phishing techniques, hidden malware, as well as risks associated with electronic data proliferation and technology digitization. We also face increased risk with the increased sophistication of Generative Artificial Intelligence capabilities, which may improve or expand the existing capabilities of cybercriminals described above in a manner we cannot predict at this time. Our increasing reliance on IT in our production, distribution and marketing systems may allow cybersecurity threats to disrupt our oil and gas operations, both domestically and abroad. If our data, IT, operational technology (OT), including industrial control and supervisory control and data acquisition (SCADA) systems were to be breached, damaged or disrupted due to a cybersecurity incident or cyber-attack (directly, indirectly through third-parties or through the IT networks, servers, software, or infrastructure on which they rely), we could be subject to serious negative consequences. These consequences could include physical damage to production, distribution or storage assets; delay or prevention of delivery to markets; disruption or prevention of accurate accounting for production and settlement of transactions; negative impacts on public health, safety, the environment, economic security, or national security; financial impacts; business interruption; reputational damage; loss of employee, supplier, contractor, partner and/or public trust; reimbursement or other costs; increased compliance costs; regulatory investigations; litigation exposure and legal liability or regulatory fines; penalties or other external intervention. Although we have business continuity plans in place, our operations may be adversely affected by significant and widespread disruption to our systems and infrastructure that support our business. Further, our ability to insure against cybersecurity risks may be limited by the availability and increasing expense of sufficient coverage. For additional information regarding our cybersecurity risk management, strategy and governance, see Item 1C. Cybersecurity. 27ConocoPhillips 2023 10-K 27ConocoPhillips 2023 10-K 27ConocoPhillips 2023 10-K 27 ConocoPhillips 2023 10-K Table of Contents Table of Contents Table of Contents
View prior text (2023)
Our business, like others within the oil and gas industry, is faced with growing cybersecurity threats as we increasingly rely on digital technologies across our business, some of which are managed by third-party service providers on whom we rely to help us collect, host or process information. As a result, we face various cybersecurity threats, both internal and external, such as attempts to gain unauthorized access to, or control of, sensitive information about our operations and our employees, attempts to render our data or systems (or those of third-parties with whom we do business, including third-party cloud and IT service providers) corrupted or unusable, threats to the security of our facilities and infrastructure as well as those of third-parties with whom we do business, including third-party cloud and IT service providers, and attempted cyber terrorism. Cybersecurity threats could affect the security of our data and proprietary information housed internally and on third-party IT systems, including the cloud. A successful attack may result in gaining unauthorized access to, or control of, and disclosure of sensitive information about our operations and our employees and/or partners; attempts to corrupt, sabotage, or render our data or systems (or those of third parties with whom we do business, including third-party cloud and IT service providers) unusable; theft or manipulation of our proprietary business information, whether from insiders or external threat actors; and cyberextortion for the return of data. The impact to our data could subject our company to potential reputational damage, legal liability, regulatory fines and penalties, and increased compliance costs. In addition, cybersecurity threats could also disrupt our oil and gas operations both domestically and abroad given that computers aid to control production, our equipment and monitor our distribution systems globally and are necessary to deliver our production to market. A disruption, failure, or a cyberattack of these operating systems, or of the networks, software and infrastructure on which they rely, many of which are not owned or operated by us, could damage production, distribution or storage assets, delay or prevent delivery to markets, make it difficult or impossible to accurately account for production and settle transactions, or negatively impact public health or safety, economic security, or national security. Although we have experienced occasional cybersecurity threats, none have currently had a material effect on our business, operations or reputation. We will comply with government-imposed security requirements to implement specific mitigation measures to protect against cybersecurity threats to our information and operational technology. In addition, we must continually expend additional resources to continue to modify or enhance our protective measures or to investigate and remediate any vulnerabilities detected. We maintain an extensive network of technical security procedures and controls, training, and policy enforcement mechanisms to monitor and mitigate security threats and to increase security for our information, facilities and infrastructure. Despite our ongoing investments in security resources, talent and business practices, we are unable to assure that any security measures, or measures implemented by third parties, will be completely effective. If our systems and infrastructure were to be breached, damaged or disrupted, we could be subject to serious negative consequences, including disruption of our operations, damage to our reputation, a loss of employee and/or third party trust, reimbursement or other costs, increased compliance costs, litigation exposure and legal liability or regulatory fines, penalties or intervention. In addition, we have exposure to cybersecurity incidents and the negative impacts of such incidents related to our data and proprietary information housed on third-party IT systems, including the cloud. Any of these could materially and adversely affect our business, results of operations or financial condition, and any of the foregoing can be exacerbated by a delay or failure to detect a cybersecurity incident or the full extent of such incident notwithstanding reasonable security procedures and controls. The prevalence of remote work has introduced additional 27ConocoPhillips 2022 10-K 27ConocoPhillips 2022 10-K 27ConocoPhillips 2022 10-K 27 ConocoPhillips 2022 10-K Risk FactorsTable of Contents Risk FactorsTable of Contents Table of Contents cybersecurity risk. Although we have business continuity plans in place, our operations may be adversely affected by significant and widespread disruption to our systems and infrastructure that support our business. While we continue to evolve and modify our business continuity plans, there can be no assurance that they will be completely effective in avoiding disruption and business impacts. Further, our insurance may not be adequate to compensate us for all resulting losses, and the cost to obtain adequate coverage may increase for us in the future.