IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
As the number of major cybersecurity incidents in 2021 continue to rise many organizations are looking at assessing their cybersecurity risks with an increased focus. There are several methodologies outlined for conducting cybersecurity risk assessments including the IEC 62443-3-2 standard (for more information on the IEC 62443-3-2 methodology for risk assessment see: https://gca.isa.org/blog/cybersecurity-risk-assessment-according-to-isa-iec-62443-3-2) and Consequence-driven Cyber-informed Engineering (CCE) outlined by the Idaho National Laboratory (https://inl.gov/cce/ ). While the IEC 62443-3-2 provides options for considering or not considering likelihood, CCE is a fully consequence driven approach. This raises the question of whether or not cybersecurity risk assessments should consider likelihood? In this webinar we will compare the two different approaches to cybersecurity risk assessment looking at the advantages and disadvantages of each approach to provide practical guidance on cyber risk assessment best practices.
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here , part 2 here , and part 3 here . Certification provides you with the opportunity to work with an experienced cyber team here at exida, and…
ISASecure in the Security Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
ISASecure SDLA in the Security Automation Equipment List
An article co-authored by exida's Todd Stauffer titled Delve Deeper Into Level Overflow Incidents is featured in the latest Chemical Processing. Tank level overflow incidents are one of the most common scenarios for a loss of primary containment at a process plant. Effective alarms, as a first layer of protection,…
In the book “ The Checklist Manifesto: How to Get Things Right ” , Atul Gawande, surgeon and best-selling author, tackles the problem of how to prevent human error in an age where professionals grapple with the increasing complexity of their responsibilities. Errors, he postulates, can be caused by ignorance…
Many integrators and service providers are realizing the benefits of cybersecurity certification both as a business differentiator and way to reach new clients, and even as a prerequisite for consideration in some applications. The IEC 62443-2-4 and IEC 62443-3-3 standards provide detailed requirements for the integration and maintenance practices and security system requirements, respectively. At first the process for achieving compliance and certification may seem daunting, but in this webinar, we will cover all of the information needed to begin making progress towards the goal of process or system certification based on lessons learned from many certification projects.
exida is excited to announce this complimentary event for its customers. When: Wednesday July 28th Time: 10:00 – 12:00 EDT/16:00 – 18:00 CET Join industry experts and colleagues for a virtual cybersecurity symposium hosted by exida. During this event cybersecurity will be examined from several important viewpoints including asset owner,…
IEC 61508 in the Safety Automation Equipment List
Want to improve your safety lifecycle and be more compliant with IEC 61508? Focus on the things that have the most benefit. Like what? What are some of these valuable things? One of the major deficiencies I see while doing certification assessments is the lack of good architecture design procedures…
IEC 61508 in the Safety Automation Equipment List
This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here and part 2 here . Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber…