Walking into work last week and seeing this article reassured me why I work at exida. Incidents, like this recent one at a pesticide plant in eastern China , are why we push every day to help educate people about the importance of functional safety. Have you heard about a…
IEC 62443 in the Security Automation Equipment List
The 2nd edition of ISO 26262 was approved during the end of 2018. This edition has many changes sprinkled throughout the 12 parts of the standard. This course will provide an in-depth overview of the changes along with guidance on the impact of the changes on the product development lifecycle.…
The exida Seminar on improving your Functional Safety Lifecycle with exSILentia was success! The seminar was held on March 21st at the Hilton in Warwick, UK. The seminar was presented by Iwan van Beurden and Kate Hildenbrandt of exida. It was a great opportunity to learn more about important topics…
When doing FMEDAs and analyzing designs, we theorized a portion of failure rates are because of failures in design themselves. If really good engineering process and procedures are created (and actually used!), a portion of field failures can be eliminated. The same goes for final element assemblies. Perfect integration is not assumed. So if your final elements are integrated, there are failures that will be eliminated! This webinar will look at what we investigate when do an integrated valve assembly assessment and how it directly impacts failure rates.
In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety. We'll start with some more general terms and descriptions and make our way to more advanced material. 1. Functional Safety Functional safety means the automatic…
Information Technology and Operational Technology are the two groups responsible for managing industrial cybersecurity, but often they work separately with little communication or common understanding of how each groups’ objectives play a role in the overall cybersecurity of the IACS. Developing clear communication and common understanding between IT and OT groups is essential for securing the IACS from the business network to the BPCS and SIS zones.
Co-presented by exida Senior Cybersecurity Engineer Robert Michalsky.
exida founder and Head of Certification William Goble will give a presentation at the 2019 DLC Stakeholder Meeting on how to apply IEC 62443 to protect against cyber threats. Applying the Global Automation Standard IEC 62443 to protect against cyber threats It is appropriate that Automation OEMs in many different…
exida will be presenting and exhibiting at the AIChE’s 2019 Spring Meeting & 15th GCPS to be held March 31 - April 4, 2019 in New Orleans. Stop by Booth #809 during exhibit hours. This year we will be showcasing some of our newest functional safety, alarm management, and cybersecurity…
This Course is Also Offered Online Effective alarm management is a pre-requisite for process plants that want to be successful in today’s global marketplace. It impacts the bottom line by minimizing unplanned downtime, reducing insurance premiums, preventing process safety incidents, and enabling operational excellence. To deliver these benefits to the…
Event Date: March 14, 2019 The ISA/IEC 62443 standards are an industry-driven set of requirements for automation system cybersecurity best practices. Many automation system manufacturers have successfully achieved ISA/IEC 62443 certification, and others are currently working hard to get there. This is because automation systems have become a hacker target.…
A good product development process should ensure a good understanding of what is to be developed, how it is to be developed and that it was developed correctly. IEC 61508 and IEC 62443‑4‑1 both have development process requirements. These requirements overlap and separate efforts when assessing compliance to both standards…
There are several time parameters that are used in functional safety. Some of these parameters seem counterintuitive, e.g. a device with an average failure rate of 100 years but it fails after 10 years. How do these numbers align? Terms like useful life and Mean Time To Failure seem to contradict each other. In SIL verification calculations Mission Time is used, how does this fit in? This webinar will talk about the different time parameters and how they are used in functional safety. It will provide a basic understanding of the time parameters.
The period after an equipment trip or shutdown is one of the most stressful and challenging times for operators. Part of the challenge stems from alarm floods; when the operator gets more alarms than they can respond to. If unabated, alarm floods can lead to a loss of situation awareness, the missing of alarms, operator error, or an incident. Alarm floods are one of the hardest alarm management issues to solve.
This presentation will discuss how you can eliminate alarm floods by designing and implementing alarm flood suppression logic in the control system. It will cover the best practices for design and implementation from ISA-18.2 / IEC 62682. It will show how to implement alarm flood suppression automatically in a DeltaV system using SILAlarm and pre-defined control modules. It will also show examples of how suppression can be implemented in Siemens PCS 7, Rockwell PlantPAx, and Yokogawa Centum systems.
An owner-operator engineer compared the failure rates for two similar products from an exida certificate with those from a TÜV Italia certificate. exida numbers were an order of magnitude higher. Who is right? There are some relevant fundamental facts in the field of Reliability Engineering: Failure rate prediction methods depend…
In this 4 part series, exida's founder and head of certification services Bill Goble gives an educational seminar about failure rate data. Part 1: Safety Design Optimization - Failure Rate Part 2: Failure Rate Estimation Part 3: Failure Rate Prediction Part 4: Comparison - Combination Methods
IEC 62443-2-4 documents “a comprehensive set of requirements for security capabilities for IACS service providers.” These requirements can be applied to integration or maintenance service providers and documents a framework for negotiations between asset owners and IACS service providers for cybersecurity requirements. This webinar will cover the structure and key concepts from the standard, as well as introduce the process of IEC 62443-2-4 certification, and the benefits that certification can provide to integration and maintenance service providers.
A good product development process should ensure a good understanding of what is to be developed, how it is to be developed and that it was developed correctly. IEC 61508 and IEC 62443‑4‑1 both have development process requirements. These requirements overlap and separate efforts when assessing compliance to both standards…
Layer of Protection Analysis (LOPA) is a risk reduction evaluation methodology well suited to consider hazard scenarios with multiple initiating events. The presence of multiple initiators increases the likelihood that a hazard scenario could occur placing additional demands on the Independent Protection Layers (IPLs) that prevent and mitigate the hazard.…
Layer of Protection Analysis (LOPA) is a risk reduction evaluation methodology well suited to consider hazard scenarios with multiple initiating events. The presence of multiple initiators increases the likelihood that a hazard scenario could occur placing additional demands on the Independent Protection Layers (IPLs) that prevent and mitigate the hazard.…