exida's Patrick O'Brien will be presenting a webinar for Food Engineering on May 6th. Below are the details: Fortifying Food Production: Automation and the Critical Role of Cybersecurity Food manufacturers face many challenges, including maintaining quality, managing labor shortages and sustaining the safety of their products, workforce and facilities. How…
ISASecure in the Security Automation Equipment List
ISO 26262 in the Safety Automation Equipment List
IEC 61508, ISO 13849 in the Safety Automation Equipment List
IEC 61508, ISO 26262 in the Safety Automation Equipment List
This is a question I have often been asked in the past. Most people I have spoken with don’t have a good appreciation of what this means and the purpose. From the IEC61511 perspective, designers of Safety Instrumented Systems (SIS) are required to justify the selection and use of the…
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
ISO 26262 in the Safety Automation Equipment List
When exida conducts an FMEDA for a mechanical final element, such as an actuator, valve, or solenoid, the two most frequent questions when interpreting the tables are: Why is the partial valve stroke test (PVST) converting DUs to DDs while the full stroke test has a defined proof test coverage?…
ISASecure in the Security Automation Equipment List
ISASecure in the Security Automation Equipment List
ISASecure in the Security Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
Recent advances in Machine Learning (ML) and Artificial Intelligence (AI) are leading to increased ML and AI deployment in commercial and personal applications. ML and AI deployment in safety critical applications carries increased risk of adverse events. In this course we will review important topics for ML and AI being…
ISASecure in the Security Automation Equipment List
ISASecure in the Security Automation Equipment List
ISASecure in the Security Automation Equipment List
In process safety the hierarchy of controls has been used for years to prioritize the most effective risk reduction measures to bring process safety risk to tolerable levels. A similar approach should be applied to cybersecurity risks as well to ensure that organizations design cyber-resiliency into the process control network as opposed to adding cybersecurity as an afterthought. Today cybersecurity considerations are often added after the fact with a heavy reliance on ineffective administrative measures. This webinar will provide practical examples for applying the hierarchy of controls to cybersecurity using techniques from Cyber-Informed Engineering (CIE) and inherently secure design, which can be applied at the site, system, and device level.
ISASecure in the Security Automation Equipment List