{"id":1381,"date":"2022-05-27T14:54:10","date_gmt":"2022-05-27T14:54:10","guid":{"rendered":"https:\/\/www.trccompanies.com\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/"},"modified":"2024-12-12T13:37:33","modified_gmt":"2024-12-12T13:37:33","slug":"tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets","status":"publish","type":"news-and-insights","link":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/","title":{"rendered":"TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets"},"content":{"rendered":"<!-- Start Block: acf\/wysiwyg -->\n\n<section class=\"wysiwyg section-padding bg-white\">\n    <div class=\"container-fluid\">\n                    <div class=\"wysiwyg__wrapper\">\n        \n        <div class=\"row\">\n                        <div class=\"col-lg-12\">\n                                                                                    <div class=\"option-links\">\n                            <ul>\n                                                                                                        <li>\n                                        <a href=\"https:\/\/www.trccompanies.com\/services\/specialized-consulting\/physical-cyber-security\/\" \n                                        target=\"_self\">\n                                        Cybersecurity                                        <\/a>\n                                    <\/li>\n                                                                                                <\/ul>\n                        <\/div>\n                                            \n                                                <\/div>\n\n                            <div class=\"col-lg-12 js-animated-content animated-content\">\n                    <p>American pipeline operators are at the forefront of efforts to protect domestic oil and gas infrastructure under the Transportation Security Administration\u2019s (TSA) ever-evolving pipeline security initiatives. Since September 11, 2001 the Department of Transportation (DOT) and other federal agencies have also worked to develop and communicate security- related best practices and guidance to pipeline owners and operators. The TSA\u2019s Office of Security Policy and Industry Engagement\u2019s Surface Division has repeatedly published updated iterations of the \u00a0<a href=\"https:\/\/www.tsa.gov\/sites\/default\/files\/pipeline_security_guidelines.pdf\" target=\"_blank\" rel=\"noopener\"><em>Pipeline Security Guidelines<\/em><\/a>\u00a0as the agency works with operators to address known and emerging threats (both cyber and physical) against millions of miles of pipeline infrastructure and proprietary operations. Protecting against new threats and staying on top of constantly changing security guidance requires agility. Pipeline operators must adopt a continuous improvement ethos that supports infrastructure, efficiency and human capital improvements across their organizations and the industry.<\/p>\n                <\/div>\n                                <\/div>\n\n                    <\/div>\n            <\/div>\n<\/section>\n<!-- End Block: acf\/wysiwyg -->\n\n<!-- Start Block: acf\/wysiwyg -->\n\n<section class=\"wysiwyg section-padding bg-white-fog\">\n    <div class=\"container-fluid\">\n                    <div class=\"wysiwyg__wrapper\">\n        \n        <div class=\"row\">\n                        <div class=\"col-lg-12\">\n                                                                                \n                                                <\/div>\n\n                            <div class=\"col-lg-12 js-animated-content animated-content\">\n                    <h2>A New Frontier, Many New Guidelines<\/h2>\n<p>The\u00a0<em>Guidelines<\/em>\u00a0\u2013 previously known as the \u201cPipeline Security Information Circular\u201d and \u201cPipeline Security Contingency Planning Guidance\u201d \u2013 were first released by DOT in 2002. In 2010, TSA issued its initial version of the\u00a0<em>Pipeline Security Guidelines.<\/em>\u00a0Since that time, TSA has published many other resources for operators:<\/p>\n<ul>\n<li>2011\u00a0<em>Guidelines<\/em>, second iteration<\/li>\n<li>2011, \u201cPipelines Security Smart Practice Observations\u201d<\/li>\n<li>2018,\u00a0<em>Guidelines<\/em>, third iteration<\/li>\n<li>2021, Security Directives 1 &amp; 2<\/li>\n<li>2021,\u00a0<em>Guidelines<\/em>, fourth and current iteration<\/li>\n<\/ul>\n<p>Through these efforts, the Department of Homeland Security \u00a0(DHS) and TSA \u2013 with the buy-in of operators and industry groups- have worked to secure America\u2019s millions of miles of pipelines and related infrastructure from attacks by actors who attempt to disrupt the flow of energy through vulnerabilities on the ground or by using sophisticated cyber-attacks.<\/p>\n<p>Ultimately, the use of the\u00a0<em>Guidelines<\/em>\u00a0is intended to help operators adopt a stronger and more resilient security posture through identifying and closing gaps, improving internal communication, and strengthening relationships with external partners across industry and emergency management to maintain the safe and dependable flow of energy.<\/p>\n                <\/div>\n                                <\/div>\n\n                    <\/div>\n            <\/div>\n<\/section>\n<!-- End Block: acf\/wysiwyg -->\n\n<!-- Start Block: acf\/innerpage-half-text-half-image -->\n\n<section class=\"half-and-half flex-row section-padding image-block-left bg-white text-column-one image-size-cover\">\n    <div class=\"half-and-half-image\">\n        <div class=\"half-and-half-image__wrap\">\n                                                <img decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a-1024x682.jpg\" class=\"object-fit\" alt=\"GettyImages-651190906-a\" srcset=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a-1024x682.jpg 1024w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a-300x200.jpg 300w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a-768x512.jpg 768w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a-1536x1024.jpg 1536w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a-900x600.jpg 900w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-651190906-a.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>                                    <\/div>\n    <\/div>\n    \n    <div class=\"half-and-half-text\">\n        <div class=\"half-and-half-text__wrapper js-animated-content animated-content\">\n                                        <h2>Hitting a Moving Target<\/h2>\n<p>In addition to uniting the entire pipeline industry around a single set of goals, an evolving threat environment requires stakeholders to adapt, be creative and demonstrate agility to counter potential attacks. Due to the speed of changing technologies across the industry, threat actors have attempted to exploit (in some cases successfully) gaps in operators\u2019 cyber and physical security programs to gain access to this critical infrastructure. While keeping up with continuous changes to regulatory guidance may seem onerous, frequent updates are necessary to meet evolving and sophisticated threats. Optimal management of internal processes, coordination of efforts across departments and stakeholders,\u00a0<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;project timelines&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:4737,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:1,&quot;12&quot;:0,&quot;15&quot;:&quot;Arial&quot;}\"><a href=\"https:\/\/www.trccompanies.com\/services\/specialized-consulting\/sustainability-advisory-services\/\">project timelines<\/a>,\u00a0<\/span>planning for a comprehensive security program and relying on support for interpretation and implementation of TSA guidelines can help protect critical assets.<\/p>\n                    <\/div>\n    <\/div>\n<\/section>\n<!-- End Block: acf\/innerpage-half-text-half-image -->\n\n<!-- Start Block: acf\/wysiwyg -->\n\n<section class=\"wysiwyg section-padding bg-light-gradient\">\n    <div class=\"container-fluid\">\n                    <div class=\"wysiwyg__wrapper\">\n        \n        <div class=\"row\">\n                        <div class=\"col-lg-12\">\n                                                                                \n                                                <\/div>\n\n                            <div class=\"col-lg-12 js-animated-content animated-content\">\n                    <h2>Breaking Down Silos, Building Up Security<\/h2>\n<p>Across a pipeline operation, multiple departments are often responsible for the health and maintenance of the various systems involved. These may include groups such as Information Technology, Cyber Security, Enterprise Security, Legal Counsel, Integrity Management, Emergency Management, Asset Class Managers, Government Affairs, Public Relations, Customer Accounts, Metering and Regulation, Geographic Information Systems, Risk Management, Ethics and Compliance, and the executive team. Each is engaged and responsible for myriad tasks each day and has their own operational goals. Security, though, needs to be a priority goal for every department and individual in each organization. With each group focused on its established priorities, it can be difficult to assign additional tasks and goals, especially if they are in a state of flux. Prioritizing security across departments and developing a coordinated planning and security and emergency management program that engages each group in a collaborative manner is crucial to protecting pipeline operations.<\/p>\n                <\/div>\n                                <\/div>\n\n                    <\/div>\n            <\/div>\n<\/section>\n<!-- End Block: acf\/wysiwyg -->\n\n<!-- Start Block: acf\/innerpage-half-text-half-image -->\n\n<section class=\"half-and-half flex-row section-padding image-block-right flex-opposite bg-white text-column-one image-size-cover\">\n    <div class=\"half-and-half-image\">\n        <div class=\"half-and-half-image__wrap\">\n                                                <img decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a-1024x682.jpg\" class=\"object-fit\" alt=\"GettyImages-2167502157-a\" srcset=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a-1024x682.jpg 1024w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a-300x200.jpg 300w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a-768x512.jpg 768w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a-1536x1024.jpg 1536w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a-900x600.jpg 900w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-2167502157-a.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>                                    <\/div>\n    <\/div>\n    \n    <div class=\"half-and-half-text\">\n        <div class=\"half-and-half-text__wrapper js-animated-content animated-content\">\n                                        <h2>Left Hand, Meet Right Hand<\/h2>\n<p>Pipeline Operators must interpret and apply the TSA\u2019s most recent version of the\u00a0<em>Guidelines<\/em>\u00a0to include:<\/p>\n<ul>\n<li>System reviews for facility and system criticality determination<\/li>\n<li>Gap analyses between current operations and baseline or enhanced measures as required by the\u00a0<em>Guidelines<\/em><\/li>\n<li>Identification and assessment of operational impacts<\/li>\n<li>Assistance in responding to TSA\u2019s most recent request for information<\/li>\n<li>Development of high-level planning and budgetary estimates for reaching full compliance<\/li>\n<li>Interpreting the requirements to support compliance while minimizing disruptions and costs<\/li>\n<\/ul>\n<p>Operators must also work to develop an approach within their risk tolerance and culture, to build consensus across internal and external silos, to achieve meaningful enhancements to the cyber and physical security of their sites and systems, and to enhance their operational resilience.<\/p>\n                    <\/div>\n    <\/div>\n<\/section>\n<!-- End Block: acf\/innerpage-half-text-half-image -->\n\n<!-- Start Block: acf\/innerpage-promotion-blocks -->\n\n<section class=\"cta-right-image-text\">\n    <div class=\"cta-right-image-text__wrap\">\n        <div class=\"cta-right-image-text__text\">\n            <div class=\"cta-right-image-text__text__wrap js-animated-content animated-content\">\n                <h2>Pipeline Industry Leaders with an Eye to the Future<\/h2>\n<p>As the pipeline industry deals with myriad challenges in the energy, environment, and security realms, TRC can be a trusted partner to guide your organization into a more resilient, sustainable, and secure future. Navigating a changing regulatory landscape, enhancing the security and safety culture throughout an organization, and giving staff, customers, and stakeholders peace of mind all contribute to ongoing success.<\/p>\n<p>For more information, please contact\u00a0<a href=\"mailto:bhawk@trccompanies.com\">Bill Hawk (Cybersecurity)<\/a>\u00a0at 512-694-0426 or\u00a0<a href=\"mailto:lfitzgerald@trccompanies.com\">Larry Fitzgerald (Physical Security)<\/a>\u00a0at 207-620-4452.<\/p>\n            <\/div>\n        <\/div>\n        <div class=\"cta-right-image-text__image\">\n            <img decoding=\"async\" width=\"2000\" height=\"1335\" src=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a.jpg\" class=\"object-fit\" alt=\"GettyImages-1366558965-a\" srcset=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a.jpg 2000w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a-300x200.jpg 300w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a-1024x684.jpg 1024w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a-768x513.jpg 768w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a-1536x1025.jpg 1536w, https:\/\/www.trccompanies.com\/wp-content\/uploads\/2022\/05\/GettyImages-1366558965-a-899x600.jpg 899w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>            <span class=\"top\"><\/span>\n            <span class=\"bottom\"><\/span>\n            <span class=\"left\"><\/span>\n            <span class=\"right\"><\/span>\n        <\/div>\n    <\/div>\n<\/section>\n\n<!-- End Block: acf\/innerpage-promotion-blocks -->\n\n<!-- Start Block: acf\/innerpage-cta-bar -->\n<section class=\"global-cta innerpage-cta default\">\n    <div class=\"container-fluid\">\n        <div class=\"global-cta-wrapper  \">\n                                            <h2>S&rsquo;adapter au <br>changement<\/h2>\n                                <div class=\"global-cta-image\">\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"316.566\" height=\"369\" viewBox=\"0 0 316.566 369\">\n                        <defs>\n                            <pattern id=\"pattern\" width=\"1\" height=\"1\" viewBox=\"117.006 0 316.566 369\">\n                                <image preserveAspectRatio=\"xMidYMid slice\" width=\"655.35\" height=\"369\" href=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp\"><\/image>\n                            <\/pattern>\n                        <\/defs>\n                        <path id=\"Union_8\" data-name=\"Union 8\" d=\"M72.087,369,206.869,190.294h109.7L182.891,369ZM0,195.818H68.4l28.66,44.507L68.4,286.43Zm0-10.747L68.4,94.466l28.66,46.1L68.4,185.071Zm205.769-6.365L72.087,0h109.7L316.566,178.706Z\" fill=\"url(#pattern)\"\/>\n                    <\/svg>\n                <\/div>\n                <div class=\"global-cta-content\">\n                    <p>Collaborez avec les praticiens test\u00e9s de TRC<\/p>\n                    <p>\n                        <a href=\"https:\/\/www.trccompanies.com\/contact-us\/\" title=\"Contact Us\" class=\"btn btn-primary\" >Contact Us<\/a>                    <\/p>\n                <\/div>\n                        \n        <\/div>\n    <\/div>\n<\/section>\n\n<!-- End Block: acf\/innerpage-cta-bar -->\n\n<!-- Start Block: acf\/innerpage-news-and-insights -->\n<section class=\"image-cards image-cards--news-and-insights section-margins image-cards--with-slider image-cards--innerpage\">\n    <div class=\"container-fluid\">\n        <div class=\"image-cards__wrap\">\n            <div class=\"image-cards__left\">\n                <div>\n                    <h2>Partager nos perspectives<\/h2>\n<p>Nos praticiens partagent leurs id\u00e9es et leurs points de vue sur les tendances et les d\u00e9fis qui fa\u00e7onnent le march\u00e9.<\/p>\n                <\/div>\n                                <div class=\"image-cards__btn\">\n                    <a href=\"https:\/\/www.trccompanies.com\/insights\/\" title=\"View More\" class=\"btn btn-tertiary\" >View More<\/a>                <\/div>\n                            <\/div>\n                            <div class=\"image-cards__right\">\n                    <div class=\"js-image-cards-slider fx-slider\">\n                        No posts found.                    <\/div>\n                <\/div>\n                    <\/div>\n    <\/div>\n<\/section>\n<!-- End Block: acf\/innerpage-news-and-insights -->","protected":false},"excerpt":{"rendered":"<p>Protecting against new threats and staying on top of constantly changing security guidance requires agility. <\/p>\n","protected":false},"featured_media":11860,"template":"","tags":[212,256,270,274,280],"news-and-insights-category":[363],"services-category":[1005,997],"custom_category":[1010],"class_list":["post-1381","news-and-insights","type-news-and-insights","status-publish","has-post-thumbnail","hentry","tag-gas-utilities","tag-oil-and-gas","tag-physical-and-cyber-security","tag-pipelines-and-facilities","tag-power-and-utilities","news-and-insights-category-insights","services-category-electrical-and-power","services-category-pipeline","custom_category-power-utilities-markets"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets - TRC Companies<\/title>\n<meta name=\"description\" content=\"Protecting against new threats and staying on top of constantly changing security guidance requires agility.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets - TRC Companies\" \/>\n<meta property=\"og:description\" content=\"Protecting against new threats and staying on top of constantly changing security guidance requires agility.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/\" \/>\n<meta property=\"og:site_name\" content=\"TRC Companies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-12T13:37:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1190\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/\",\"url\":\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/\",\"name\":\"TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets - TRC Companies\",\"isPartOf\":{\"@id\":\"https:\/\/www.trccompanies.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp\",\"datePublished\":\"2022-05-27T14:54:10+00:00\",\"dateModified\":\"2024-12-12T13:37:33+00:00\",\"description\":\"Protecting against new threats and staying on top of constantly changing security guidance requires agility.\",\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/#primaryimage\",\"url\":\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp\",\"contentUrl\":\"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp\",\"width\":1792,\"height\":1190},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trccompanies.com\/fr\/#website\",\"url\":\"https:\/\/www.trccompanies.com\/fr\/\",\"name\":\"TRC Companies\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trccompanies.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets - TRC Companies","description":"Protecting against new threats and staying on top of constantly changing security guidance requires agility.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/","og_locale":"fr_CA","og_type":"article","og_title":"TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets - TRC Companies","og_description":"Protecting against new threats and staying on top of constantly changing security guidance requires agility.","og_url":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/","og_site_name":"TRC Companies","article_modified_time":"2024-12-12T13:37:33+00:00","og_image":[{"width":1792,"height":1190,"url":"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/","url":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/","name":"TSA Pipeline Security Guidelines \u2013 Navigating Change to Protect Critical Assets - TRC Companies","isPartOf":{"@id":"https:\/\/www.trccompanies.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/#primaryimage"},"image":{"@id":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp","datePublished":"2022-05-27T14:54:10+00:00","dateModified":"2024-12-12T13:37:33+00:00","description":"Protecting against new threats and staying on top of constantly changing security guidance requires agility.","inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.trccompanies.com\/fr\/insights\/tsa-pipeline-security-guidelines-navigating-change-to-protect-critical-assets\/#primaryimage","url":"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp","contentUrl":"https:\/\/www.trccompanies.com\/wp-content\/uploads\/2024\/08\/6d00753b-pipelines.webp","width":1792,"height":1190},{"@type":"WebSite","@id":"https:\/\/www.trccompanies.com\/fr\/#website","url":"https:\/\/www.trccompanies.com\/fr\/","name":"TRC Companies","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trccompanies.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"}]}},"_links":{"self":[{"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/news-and-insights\/1381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/news-and-insights"}],"about":[{"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/types\/news-and-insights"}],"version-history":[{"count":0,"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/news-and-insights\/1381\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/media\/11860"}],"wp:attachment":[{"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/media?parent=1381"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/tags?post=1381"},{"taxonomy":"news-and-insights-category","embeddable":true,"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/news-and-insights-category?post=1381"},{"taxonomy":"services-category","embeddable":true,"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/services-category?post=1381"},{"taxonomy":"custom_category","embeddable":true,"href":"https:\/\/www.trccompanies.com\/fr\/wp-json\/wp\/v2\/custom_category?post=1381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}