The exposure of industrial facilities to cybersecurity threats has never been higher. An analysis performed by IBM security found that the number of attacks on SCADA systems increased 636% from 2012 to 2014, with 675,816 cybersecurity incidents in January 20141. Finding an effective method for evaluating the current level of…
The 2018 exida User Conference in Singapore was a success! This conference was a great opportunity to learn about the new features of our powerful, integrated Safety Lifecycle Tool exSILentia version 4 as well as meet and engage in detailed discussions with our team of experts! The conference took place…
Here is an introduction to exida's CS 102: Industrial Automation Control Systems (IACS) IEC 62443 Cybersecurity Lifecycle course. This course addresses integration of cyber security into the functional safety lifecycle per the IEC 62443 standards. While cybersecurity introduced many unique activities that are specific to its technology, with respect to…
One of the changes that was made in 2016 to the IEC 61511 standard was the inclusion of periodic personnel assessments (clause 5.2.2.3), whereby a procedure is required to manage the competence of all those involved in the SIS lifecycle; “periodic” assessments are to be carried out to document the…
Isn’t it frustrating when you experience an event that disrupts operations and then discover it could have been prevented? Very often a detailed analysis will reveal that a combination of (preventable) mistakes and unknown factors caused the incident. Training can help the mistakes, but dealing with the unknowns is a…
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
Proactive cybersecurity efforts have been on the rise. Some even call it “Trending.” ISA and the global IEC 62443 committee have taken the baton and created a set of standards to help protect manufacturers, end users, and people. The IEC 62443 document series is an international standard intended to provide a flexible framework to enhance Industrial Automation Control System (IACS) cybersecurity. IEC62443-4-1 and IEC62443-4-2 were created with the Software Developer’s roles and responsibilities in mind.
Software Development Experts have started taking the initiative and are taking this exam to become a Certified Automation Cybersecurity Expert (CACE).
If you are someone that has ever wanted to become a leader, a mentor, or someone that just wants to stay ahead of the curve, then this webinar will be extremely valuable.
Industrial Automation Control Systems (IACS) Cybersecurity based on IEC 62443 was created to be compatible with agile development methodology. The standard deliberately talks about processes and not phases, such as those in the waterfall model. The processes defined can be met simultaneously and are, most likely, already being followed as…
The proper specification, design and integration of final elements, and doing these steps correctly is necessary to ensure a SIL capable system is deployed. Actual performance of integrated final assemblies reveals that too many are not performing reliably throughout their mission time. Failure causes can be grouped into several key categories including; specification, design, and maintenance. These failures modes are evidence that the current processes need to be enhanced. To address these shortcomings exida has introduced its Integrated Final Element Certification Program. This webinar will review the steps required to complete a final element assessment and the benefits to users who selected certified assemblies.
Sellersville, PA: The global leader in functional safety, industrial cybersecurity, and alarm management for the process industries, exida, has certified Tokyo Keiso’s Torque Tube Type Level Transmitter FST4000 Series for Safety Integrity Level (SIL) 2 capability per IEC 61508: 2010. FST4000 is a torque tube displacement type level indicating transmitter…
exida will be presenting and exhibiting at the 2018 ROCKWELL AUTOMATION FAIR. The fair will be held at the Pennsylvania Convention Center in Philadelphia, Pennsylvania from November 14–15, 2018. Stop by Booth 1817 and say hello. Automation Fair® is the premier industrial automation event offering unmeasurable knowledge and skill-building opportunities…
IEC61511 defines that a Functional Safety Management System be put in place to manage the Safety Lifecycle activities, but what really does that all entail?
The IEC61511 Standard is built around a safety lifecycle (SLC™) to provide a consistent approach to risk identification and risk reduction, in accordance with a company’s tolerable risk. This webinar will introduce the SLC™ along with what is risk and how to manage it. We will then discover at how Managers need to be competent when it comes to managing SLC™ tasks; along with being responsible for personnel who are performing SLC™ tasks. We will wrap up the webinar considering the importance of performing preventative maintenance and how arbitrarily cutting expenditure on maintenance could lead to serious incidents and litigation.
exida Senior Cybersecurity Engineer Robert Michalsky will be presenting at the 13th Annual API Cybersecurity Conference for the Oil and Gas Industry on November 6th at the Woodlands Waterway Marriot Hotel in Woodlands, TX. Michalsky will be a part of SESSION A1: Cyberattacks Metrics / Measures located in room Waterway…
www.SILSafeData.com is a complimentary resource that contains the upper and lower bounds failure rates for many categories of automation equipment, as well as the methodology used by exida to derive the numbers. Many of you have asked how to use this data. As an example, let’s look at a control…
An article titled Jumpstart Cyberthreat with High-Level Risk Assessments authored by exida Cyber engineer Patrick O'Brien has been published in Valve Magazine . Cybersecurity is a major concern for industrial control systems, but the continually evolving nature of the field and the sheer amount of existing threats and vulnerabilities make…
How to Implement an Effective Alarm Management Program for your DeltaV System” (Emex 2016)
Has the alarm horn become the nemesis of your operators? This presentation from the 2016 Emersob Exchange describes how to create (build) an effective and sustainable program using ISA-18.2’s alarm management lifecycle (the blueprint) and DeltaV’s alarm management capabilities (the tools). It shows how following the program will allow you to address common alarm management issues (alarm overload, nuisance alarms, alarm floods, incorrectly prioritized alarms) and create a control room environment that maximizes operator performance, improves process safety, and drives operational discipline.
As discussed in What do Nuisance Alarms, the 80-20 Rule, and Mental Models Have in Common? , there are typically a handful of alarm points (10 to 20) that create the majority of notifications (50-80%) to the operator (referencing the 80-20 rule). These nuisance alarms are affectionately called “bad actors”…