exida - Functional Safety Services, IACS Cybersecurity, Alarm Management, IEC 61508 Certification

Search

20 results for the keyword search: ""

Recorded Webinars: Cyber Risk Assessments and Security Level Verification: Security Level Verification (Part 3 of 3)

This three webinar series will walk through the fundamental methodology behind High-Level Risk Assessments, Detailed Risk Assessments, and Security Level Verification. The series will also discuss the relationships between the lifecycle steps, and the flow of information from one analysis to the next. The final webinar in this series will provide a detailed review of the steps and objectives for performing a semi-quantitative Security Level (SL) Verification as well as the benefits of completing SL Verification, and the information that feeds future lifecycle steps.


News Item: U.K. Chemical Plant Slashes Nuisance Alarms With Help From exida

Identifying, rationalizing and disabling unhelpful alarms buried deep in many process applications can be tricky and potentially hazardous if not handled properly. Here's how Baker Hughes, a GE company, and its specialty chemicals plant did it with assistance from exida's Alarm Management program. Read the Success Story


Blog Entry: Cyber Risk Assessments and Security Level Verification: Security Level Verification (Part 3 of 3)

The exposure of industrial facilities to cybersecurity threats has never been higher. An analysis performed by IBM security found that the number of attacks on SCADA systems increased 636% from 2012 to 2014, with 675,816 cybersecurity incidents in January 2014 [1]. Finding an effective method for evaluating the current level…


Recorded Webinars: How Safe Are You? The Importance of Functional Safety and Realistic Failure Rates

This webinar will discuss the importance of data integrity, especially when it comes to functional safety and failure rates.

We will cover:

  • What a failure rate is
  • What failure rates are used for and the different techniques used to attain failure rates
  • Estimation vs Prediction techniques
  • What if you don’t have failure rates and how can you get them, with an example.
  • Generic vs Specific failure rates

This webinar will conclude with time for queries in the end to answer any failure rate questions you may have!


Blog Entry: Who needs sliced bread?  We’ve got ARCHx!

I’ve heard this phrase so many times in my life… “<Something> is the best thing since sliced bread.” I personally can’t remember a time when sliced bread was not available, but I certainly remember going to the deli and having them use the slicing machine before handing me a bag…


Blog Entry: Comparing the IEC 62443 Software Engineering Process to IEC 61508: Where Do They Overlap?

With the appearance of malware and nation state attacks on Industrial Control Systems (ICS), such as the Stuxnet (2010), Industroyer (2016) and TRITON (2017) attacks, the IEC 62433 standards are gaining wider attention. While the potential targets to attack in an ICS system are many-fold, one plant asset that could…


Recorded Webinars: Cyber Risk Assessments and Security Level Verification: Detailed Risk Assessments (Part 2 of 3)

This three webinar series will walk through the fundamental methodology behind High-Level Risk Assessments, Detailed Risk Assessments, and Security Level Verification. The series will also discuss the relationships between the lifecycle steps, and the flow of information from one analysis to the next. The second webinar will provide a detailed review of the steps and objectives for a Detailed Risk Assessment as well as the benefits of completing a Detailed Risk Assessment, and the information that feeds the Security Level verification.

Part 1: https://www.youtube.com/watch?v=61JFiAtViUY


News Item: Free Seminar in Brussels

exida is excited to announce a free seminar in Brussels: Improving Safety, Increasing Availability, and Gaining an Operational Advantage through a Holistic approach to Alarm Management, Cybersecurity, and Functional Safety IEC 61508, IEC 61511, IEC 62443, EEMUA 191, and ISA 18.2 This seminar will be presented by: Chris O'Brien: Partner,…


Blog Entry: Functional Safety Certification Started with Logic Solvers

IEC 61508 functional safety certification began in the 1990s. As I recall, the only organizations doing this work in those days were TÜV Rheinland and TÜV Product Services (now TÜV Sud). These two companies remain competitors. Functional safety certification started with logic solvers. Some engineers and regulators at the time…


News Item: exida Publishes IACS Cybersecurity Book Based on IEC 62443 Best Practices

Sellersville, PA: The global leader in functional safety, cybersecurity, and alarm management for the process industries, exida, has published a book on how to successfully implement the IEC 62443 cybersecurity standard for industrial control systems. Cybersecurity is a hot topic in today’s internet-connected world, as hackers get more sophisticated and…


Blog Entry: Cyber Risk Assessments and Security Level Verification: Detailed Risk Assessments (Part 2 of 3)

The exposure of industrial facilities to cybersecurity threats has never been higher. An analysis performed by IBM security found that the number of attacks on SCADA systems increased 636% from 2012 to 2014, with 675,816 cybersecurity incidents in January 20141. Finding an effective method for evaluating the current level of…


News Item: 2018 exida User Conference in Singapore a Success

The 2018 exida User Conference in Singapore was a success! This conference was a great opportunity to learn about the new features of our powerful, integrated Safety Lifecycle Tool exSILentia version 4 as well as meet and engage in detailed discussions with our team of experts! The conference took place…


News Item: Video: Industrial Automation Control Systems (IACS) IEC 62443 Cybersecurity Lifecycle

Here is an introduction to exida's CS 102: Industrial Automation Control Systems (IACS) IEC 62443 Cybersecurity Lifecycle course. This course addresses integration of cyber security into the functional safety lifecycle per the IEC 62443 standards. While cybersecurity introduced many unique activities that are specific to its technology, with respect to…


Blog Entry: Are You Undertaking Periodic Personnel Performance Assessments?

One of the changes that was made in 2016 to the IEC 61511 standard was the inclusion of periodic personnel assessments (clause 5.2.2.3), whereby a procedure is required to manage the competence of all those involved in the SIS lifecycle; “periodic” assessments are to be carried out to document the…


Blog Entry: Preventing Cyberattacks by Following Practical Guidance in IEC 62443

Isn’t it frustrating when you experience an event that disrupts operations and then discover it could have been prevented? Very often a detailed analysis will reveal that a combination of (preventable) mistakes and unknown factors caused the incident. Training can help the mistakes, but dealing with the unknowns is a…


Autronica Fire and Security - AutroVu Model AV30 with Model CGS

IEC 61508 in the Safety Automation Equipment List


Detector Electronics, LLC - FlexVu Model UD30 with Model CGS

IEC 61508 in the Safety Automation Equipment List


Autronica Fire and Security - AutroVu Model AV30 Universal Display

IEC 61508 in the Safety Automation Equipment List


Detector Electronics, LLC - FlexVu Model UD30 Universal Display

IEC 61508 in the Safety Automation Equipment List


Recorded Webinars: IEC62443: Attention all Software Development Experts!

Proactive cybersecurity efforts have been on the rise. Some even call it “Trending.” ISA and the global IEC 62443 committee have taken the baton and created a set of standards to help protect manufacturers, end users, and people. The IEC 62443 document series is an international standard intended to provide a flexible framework to enhance Industrial Automation Control System (IACS) cybersecurity. IEC62443-4-1 and IEC62443-4-2 were created with the Software Developer’s roles and responsibilities in mind.

Software Development Experts have started taking the initiative and are taking this exam to become a Certified Automation Cybersecurity Expert (CACE).

If you are someone that has ever wanted to become a leader, a mentor, or someone that just wants to stay ahead of the curve, then this webinar will be extremely valuable.


Page 60 of 146 pages. ‹ First  < 58 59 60 61 62 >  Last ›