exida - Functional Safety Services, IACS Cybersecurity, Alarm Management, IEC 61508 Certification

Search

20 results for the keyword search: ""

News Item: New Case Study: Cybersecurity Gap Analysis and High-Level Risk Assessment

Customer; NIST Cybersecurity Framework and IEC 62443 (Parts 2-1, 3-2) A water plant approached exida to conduct a cybersecurity gap analysis and high-level risk assessment with the aim of abiding by the AWIA cybersecurity requirements. America's Water Infrastructure Act (AWIA) of 2018 requires community water systems serving 3,300 or more…


Recorded Webinars: Learning from the Florida Water Hack

In early February of this year a water treatment facility was compromised in Florida. The attackers successfully increased the concentration of sodium hydroxide (also known as lye) by a factor of 100 risking potential illness for the public as well as significant erosion and pipe damage. Fortunately, operators of the Oldsmar water treatment facility saw the attackers increase the concentration and were able to return the concentration to normal levels before there was any risk for harm to the public. This near-miss highlights several important trends for industrial cybersecurity: Industrial cybersecurity incidents can have major health and safety implications, Critical infrastructure makes an attractive target to a variety of hackers, Critical infrastructure is highly susceptible to cybersecurity attack. In this webinar we will review what is known so far about the attack on the Florida water system and identify practical steps that can be taken to improve the cybersecurity of critical infrastructure systems.


Blog Entry: Attack on Florida Water System Highlights Weak Security Protections for Critical Infrastructure

The Oldsmar Water Treatment Facility in Pinellas County Florida was compromised by hackers on February 5th. Hackers took advantage of the TeamViewer application that was still installed on the water facilities network to gain remote access1. The TeamViewer was originally installed to allow for status checks and troubleshooting of alarms…


Blog Entry: IEC 62443 - The Evolution of IACS Cybersecurity

When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to our I/O and our controllers. Fault-finding was always a challenge . What we ended up doing…


Recorded Webinars: Impact of Improper Maintenance Practices

The webinar addresses the problems relating to the impact of improper Safety Instrumented Systems (SIS) maintenance practices and what this means, as well as looking at the competency requirements. Most companies believe they follow good SIS maintenance practices but do they really? Are they really measuring and tracking this? How do they measure and track?

Recent major accidents have been traced back to poor site safety practices, culture and competencies. The webinar addresses some of these issues and suggests a means for tracking and measuring how well maintenance and mechanical integrity is being performed. 

What you will learn?

  • How poor site safety will affect the SIS and SIF performance
  • What constitutes the right approach
  • What metrics can be used for tracking
  • How to assess where a company is currently situated

Who should attend?

  • Operations and maintenance personnel
  • Plant Managers and Supervisors


Blog Entry: Alarm Rationalization: An Art or a Science? – Common Rationalization Mistakes

Successful alarm rationalization combines both art and science. From the scientific point of view, rationalization follows a systematic process that applies alarm management principles to determine whether an alarm is justified (needed) and to document its basis (cause, consequence, corrective action, time to respond) and settings (priority, setpoint) in a…


News Item: exida Offers Remote Lifecycle Services for Alarm Management

If your alarm management program has suffered during the COVID-19 pandemic, exida can get back on track. exida can help you improve your skills and knowledge (initial & refresher training), update / introduce new processes (alarm system remediation), add new functionality (alarm flood suppression, Alarm Help), and make progress with…


Reuter-Stokes, LLC - Flame Tracker – RS-9009 and RS-9010

IEC 61508 in the Safety Automation Equipment List


Reuter-Stokes, LLC - Flame Tracker - RS-9001, RS-9004, RS-9006

IEC 61508 in the Safety Automation Equipment List


Bell-O-Seal Valves Pvt. Ltd. - Bellow Seal Globe Valve

IEC 61508 in the Safety Automation Equipment List


News Item: exida Announces Updated Version of IEC 61511 Functional Safety (FSE 100) Online Course

exida is excited to announce that an updated version of our FSE 100 - IEC 61511: Functional Safety Analysis, Design, and Operation is available for self-paced and open enrollment options. An example clip can be found below. This is a great course for those wishing to become an exida FSP…


News Item: Emerson Wins 2020 exida Safety Award

Sellersville, PA: exida, the global leader in functional safety, cybersecurity, and alarm management for the process industries, has presented Emerson with the 2020 exida Safety Award for their Fisher Digital Isolation TOV SIS Solution. The Fisher Digital Isolation Final Element is a triple offset valve (TOV) solution which was developed…


Recorded Webinars: Defining Industrial Cybersecurity Incidents

Cybersecurity for industrial control systems has changed significantly in the past two decades as the question has changed from “who would want to target an industrial automation and control system?” to “which industrial facility will be affected next?” This webinar will review major industrial cybersecurity incidents including: Stuxnet, the attack on the Sadara Petrochemical Facility, NotPetya, and the German Steel Mill. These events and others will be used as case studies to outline how industrial cybersecurity has been shaped over the years, and introduce key lessons learned that will help IACS be better prepared to defend against and respond to cybersecurity incidents.


Blog Entry: Rationalize Your Alarm Management Problems Away

The increasing global adoption of alarm management standards (ISA-18.2 and IEC 62682) is bringing the importance of alarm rationalization to the forefront. Rationalization is defined as the “process to review potential alarms using the principles of the alarm philosophy, to select alarms for design, and to document the rationale for…


News Item: exSILentia - Better Risk Management

In a blog, posted today on the ISA Interchange, Iwan van Beurden and William M. Goble describe how the two fundamental concepts of the ANSI/ISA S84.01-1996, the Safety Lifecycle and Probabilistic Performance Metrics, have shaped the functional safety landscape. “These two fundamental concepts are to this day what is driving…


ABB - SPC 600/700/800 Controller

ISASecure in the Security Automation Equipment List


Siemens, Inc. - PSAIM RBI Module

API 581 in the Safety Automation Equipment List


Recorded Webinars: Better Safety – Adding automatic diagnostics to Embedded Systems

This webinar will teach you some simple and easy to implement diagnostics you can specify today to enhance your designs and increase the risk reduction.


Blog Entry: Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here. Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in the…


Recorded Webinars: Rationalize Your Alarm Management Problems Away

Modern control systems make it easy (maybe too easy) to add alarms without significant effort, cost, or consideration for whether they are truly needed. This has led to alarm systems that often hinder, rather than help, operators by subjecting them to nuisance alarms, alarm floods, incorrectly prioritized alarms, and general alarm overload. Alarm rationalization, a proven alarm management technique and one of the stages of the ISA-18.2 / IEC 62682 alarm management lifecycle, can help address these issues and create an optimal, effective alarm system. 

The presentation will touch on best practices for rationalization as well as the most common pitfalls. It will also demonstrate how effective alarm rationalization can lead to reduced downtime, reduced operational risk (insurance premiums), and reduced cost of operations, while improving operational discipline and operator effectiveness.


Page 40 of 146 pages. ‹ First  < 38 39 40 41 42 >  Last ›