exida - Functional Safety Services, IACS Cybersecurity, Alarm Management, IEC 61508 Certification

Search

20 results for the keyword search: ""

Blog Entry: IEC 61508 – Two Key Fundamental Concepts

We want our system to work. We're going to do everything we can to make it work properly. If it doesn't work, we want it to fail in a predictable and hopefully safe manner. If the failure modes are predictable, we can design the equipment to be fail safe. That's…


Lear European Holding, S.L. - Thermal Comfort Systems - ISO/SAE 21434 CSMS

ISO/SAE 21434 in the Security Automation Equipment List


News Item: RG Group Receives 61508 Functional Safety Certification for HPU and Cylinder Systems

Congrats to RG Group. exida recently issued an IEC 61508 functional safety certification for their HPU and Cylinder Systems. The certificate and assessment report can be found on the exida SAEL here .


Blog Entry: Creating a Cyber Hygiene Plan

One of the things that automation companies are beginning to do is to plan for cyber hygiene. More and more companies are implementing automation specific awareness training for their employees. They conduct periodic exercises which like sending phishing emails to see who if you respond. They might leave USB devices…


Recorded Webinars: Using exSILentia Cyber for Cybersecurity Risk Assessments

A risk-based approach is key for effectively managing cybersecurity for Industrial Control Systems (ICS). It helps to identify critical areas requiring mitigation and focus limited resources on the most critical issues. The ISA/IEC 62443-3-2 standard provides the formal process for conducting these risk assessments in a two-staged approach (initial and detailed). Over the years as exida completed many cybersecurity risk assessments, it became clear that a tool which could efficiently record and export the results of the study was critical to the successful completion of the assessments. To meet this need, the exSILentia Cyber tool was developed as a new set of modules on the exSILentia v4 platform. In this webinar we will demonstrate how the exSILentia cyber tool can be used to improve the effectiveness of the cybersecurity risk assessment process and streamline the reporting process.


Blog Entry: Automation Cybersecurity - Myths vs. Reality

In today’s automation systems environment, certain myths continue to persist. For example, “cyber attacks are only a concern for big companies”. Although it may be less likely to be targeted by, say, a nation state attack, we’ve seen that malware can cause a shutdown of a system or trigger a…


News Item: exida Authored Article Appears in AiCHE Process Safety Progress Publication

How extreme failure-data filtering leads to poor process safety This paper describes both appropriate and inappropriate practices of filtering field failure data (FFD) prior to using the resulting failure count from the failure data to estimate failure rates. The underlying causes of inappropriate (extreme) filtering of FFD are examined, and…


Ghatge Patil Inds. - Expanding Gate Valve

IEC 61508 in the Safety Automation Equipment List


Ghatge Patil Inds. - Slab Gate Valve

IEC 61508 in the Safety Automation Equipment List


Blog Entry: Why is Cybersecurity Hygiene Important for Automation Systems?

Cybersecurity incidents have shown that there can be major consequences for automation systems. There have been incidences where attackers have been able to manipulate the human resource interface console directly. It was only by chance that an operator in one particular instance happened to notice that his mouse pointer was…


Blog Entry: Automation Cybersecurity: IT vs OT - Differing Priorities

Before you can dive in and look at the core concept of automation cybersecurity , it's helpful to first define it. Automation cybersecurity is the prevention of intentional or unintentional interference with proper operation of automation systems including industrial controls, smart manufacturing, and IIOT systems through the use of computers,…


News Item: exida Launches Self-Paced Introduction to Automation Cybersecurity Course

Sellersville, PA: The global leader in industrial automation cybersecurity services, exida, has launched the self-paced training course CS 002 - Introduction to Automation Cybersecurity for Asset Owners This short course (2 hours) provides an overview of industrial control system 〈ICS〉 cybersecurity for asset owners/operators and system integrators including an overview…


Banma Network Technology - AliOS CP OS

ISO 26262 in the Safety Automation Equipment List


News Item: exida Engineer Appears on Industrial Cyber Podcast

exida's Senior Safety and Cybersecurity Engineer , Patrick O'Brien, appears on an episode of the “Lessons from the School of Security Hard Knocks” podcast. Patrick discusses the safety and cybersecurity issues facing industrial systems, the similarities and differences between threat models facing organizations, working on ISA/IEC 62443 and other standards,…


News Item: exida Exhibiting at Valve World Americas Expo 2023

exida will be exhibiting at Valve World Americas Expo on June 7-8, 2023 in Houston,TX, USA. Stop by booth 1706 and say hello. The Valve World Americas event aims to create an interesting and informative conference program as we welcome attendees from around the globe. By bringing the Valve World…


Recorded Webinars: Should my Initial Cybersecurity Risk Assessment Consider Non-hackable Protections?

The initial cybersecurity risk assessment (or high-level risk assessment as it was previously called) is an important step in the cybersecurity lifecycle. It is at this point that the basis for network segmentation and creating zones and conduits for an industrial control system (ICS) starts. At this stage the “worst case unmitigated cyber security risk” for any scenario is documented to allow assets to be grouped into areas of similar risks. Several methodologies have been adopted to complete this task, and two of the most common are asset-based and PHA-based, each with a slightly different focus and approach. One common question that we receive when conducting initial risk assessments, is if any protections can be credited. At this stage no cybersecurity protections can be credited, but what about non-hackable safety protections? In this webinar we will review similarities and differences between these two approaches to initial risk assessment and answer the question of whether or not we can look at non-hackable protections during the initial risk assessment.


White Paper: Improving Mechanical Component Reliability with Partial Valve Stroke Testing

This paper describes how failure rates of mechanical devices will change depending on how frequently they move in operation. The phenomenon involved has been defined as Static Friction (Stiction). Stiction is described along with its impact and the primary method of prevention, Partial Valve Stroke Testing (PVST).


Blog Entry: FMEDA Webinar Series Playlist Now Available

As the inventor of the FMEDA process, our experts planned a series of eight webinars introducing FMEDA concepts and methods available in the Youtube playlist below. The series starts with an introduction for the beginner, quickly moves to medium level topics, and finally, at the end, covers the more complicated…


News Item: exida Opens New Office in Houston, TX

exida, the global leader in functional safety & cybersecurity for the process industries, is pleased to announce the opening of their new office in the Energy Corridor district of Houston. “As part of our commitment to improve our service to the existing customer base in the Gulf Coast region, exida…


Recorded Webinars: Using an FMEDA Tool - FMEDAx

As the inventor of the FMEDA process, exida created FMEDA Tools from our early years in order to improve the accuracy of the FMEDA work we do as well as reducing the time required. FMEDAx is the latest generation of our family of FMEDA tools. In this webinar we provide an introduction to the tool, explain key features, and demonstrate the most important of any FMEDA, the Component Reliability Database (CRD). This webinar is important for anyone performing FMEDA analysis and those contracting FMEDA analysis.


Page 22 of 146 pages. ‹ First  < 20 21 22 23 24 >  Last ›