Skip to content

Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena

Of all damage that interferes with pipeline operations, only 7.2 percent include instances of purposeful outside interference such as physical attacks, which can be carried out by any number of actors—from domestic extremists to protesters and more.

“A lot of that has shifted to much more of the environmental NGOs and the activists,” says Don Greenwood, manager of corporate security for TC Energy, a major North American energy infrastructure company. “That’s probably our greatest risk, and it’s our greatest risk to our projects and the ability for the industry, as well as TC Energy, to be able to develop more pipelines and larger pipelines.”

Read More

Featured Articles

5 Keys to Effective Change Management

Organizational change management tends to emphasize process; however, it is people who most affect change and are affected by that change, meaning any successful effort must center on engagement and authenticity.

Focus on Pipeline Security

Pipelines’ Digital Defense is on the Line

Pipeline networks “are vulnerable to cyber-attacks due to legacy (industrial control systems) that lack updated security controls and the dispersed nature of pipeline…networks spanning urban and outlying areas,” according to the U.S. Transportation Security Administration (TSA). As aspects of operational and information technology become further integrated, those industrial control systems (ICSs) become a bigger target for cyber attackers.

More On This Topic
Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena
Energy Geopolitics: How the War in Ukraine Hit Pipelines
Infographic: Who Owns Gas Pipeline Development? 
Fast Facts: 3 Key Threat Areas for Pipelines

Security Technology: Rising Resilience

Natural disasters, climate change, supply chain challenges, and war are all pushing organizations to become more resilient. The December 2022 issue of Security Technology looks at how the security industry is addressing the need for more resilient—and energy efficient—technology to enable protection of physical and digital infrastructure.

Security Management Podcast

Bonus: Understanding the Diversity Dividend

Diversity, equity, and inclusion isn’t just the right thing to do, it’s the smart thing to do, says Rachel Briggs, OBE, one of the researchers behind a new report from the ASIS Foundation. And she’s not the only one saying it—scientific research has backed this view for years, especially for private organizations and enterprises. But what is the benefit for security professionals, and how can they take the next step to build a more diverse, resilient, and exemplary security team?

This podcast is brought to you by the ASIS Foundation. If you enjoyed today’s podcast, please visit to download a copy of the executive summary and full report. This research is made possible by your generous donations to the ASIS Foundation. Please consider giving today via PayPal, or online at to support future ASIS Foundation research.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The Psychology of Extremism

The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.


Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.