I am often asked whether extending proof test intervals will be a problem. This is a tricky question. The design and engineering SIL calculations for the Safety Instrumented Functions (SIFs) are taking credit for a specific proof test interval with a defined level of coverage, as defined within the Safety…
Sellersville, PA: The global leader in functional safety, cybersecurity, and alarm management for the process industries, exida, has certified Profire Energy’s PF3100 Burner Control System for Safety Integrity Level (SIL) 2 capability per IEC 61508: 2010. The PF3100 Burner Control System is a modular, state-of-the-art solution for oilfield professionals. The…
In Part 1 , we covered the emerging trends in the valve assembly market, how these trends relate to IEC 61511 requirements, and the anatomy of final elements. In Part 2 , we discussed the need to show requirements traceability down through the design of the safety instrumented function and…
This webinar will provide a brief overview of the IEC62443 family of standards, and then look at recent security breaches to see if they could have been avoided by following the best practices described in these standards. Completely avoiding cyber-attacks is likely not possible, but significantly decreasing the probability of a successful attack is feasible by following these guidelines.
Sellersville, PA: The global leader in functional safety, cybersecurity, and alarm management for the process industries, exida, has added a new course to its Cybersecurity Practitioner program . CS 201 - IEC 62443 Cybersecurity Software Development focuses on techniques for creating and updating software that adds cybersecurity resilience to a…
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
During an IACS cybersecurity risk analysis, each zone of a network is given a target security level. The levels are one to four, with one being the least amount of protection and four giving the most protection. For each zone we ask, “How much cybersecurity protection do we need?” “Is…
exida will be hosting a meeting of the International Electrotechnical Commission (IEC) Subcommittee 61J Electrical motor-operated cleaning appliances for commercial use on September 18 and 19 at their headquarters in Sellersville, PA (one hour north of Philadelphia, 2 hours west of New York City). On September 17, members of Working…
An article on ICS cybersecurity written by Dr. William Goble is featured in the July 2018 issue of Hydrocarbon Processing. Unfortunately, nation states appear to be launching cybersecurity attacks on other nation states. In this “arms war,” some attacks have been focused on industrial control systems (ICS). Three of these…
The FMEDA method was invented to predict failure rates for each failure mode of a device, subsystem, or component. The ”Practical Mechanical FMEDA with FMEDAx” course explains the FMEDA method, objectives, and output. In this course an example device FMEDA will be done showing the fundamental concepts including environmental profile…
The FMEDA method was invented to predict realistic failure rates for each failure mode of a device, subsystem, or component. The ”Practical Electronic FMEDA with FMEDAx” course explains the FMEDA method, objectives, and output. In this course an example device FMEDA will be done showing the fundamental concepts including environmental…
This is part two of our Autonomous & Robotic Functional Safety & Cybersecurity for Managers and Practitioners Seminar that was held in the UK in July of 2018. exida Head of Business Development Steve Gandy explains functional safety and how it relates to industrial control system cybersecurity. He also explains…
Operations and facility managers have a level of responsibility that requires a great deal of judgment, technical understanding, and the ability to make the right call when managing risk. Safe, secure, and profitable plant operations are the cornerstones of how a plant manager is judged. The plant manager relies on…
ISASecure in the Security Automation Equipment List
The Industrial Internet of Things (IIoT) offers companies many potential benefits such as decreased operational costs and further optimized processes; however, the increased use of wireless control networks also introduces the potential for additional cybersecurity risks. This webinar will briefly review the trends in IIoT and discuss important factors to consider when mitigating the additional risk of wireless control networks.
exida is featured in the August 2018 issue of Control Engineering magazine. The issue features an educating engineers article submitted by exida as well as features on the advantages of augmented reality, cybersecurity, robotics, and more. Click here to view the issue.
For decades manufacturers have been using their customer return data to estimate failure rates for their products. exida also uses this data but only for comparison and validation purposes. This webinar will show the result of several of our recent warranty failure calculations and the comparison to the corresponding FMEDA prediction for the same product. We will show how the data is useful for calibrating a component database. We will show why warranty data is not a useful method for realistic failure rates used for safety verification calculations.
ISASecure in the Security Automation Equipment List
Last week I attended the ISA Water/Wastewater and Automatic Controls Symposium in Bethesda, Maryland. The conference was attended by equipment manufacturers and municipalities, but system integrators composed the largest group. The technical sessions mainly discussed new opportunities for implementing the industrial internet of things (IoT) and cybersecurity concerns. Both topics…