Customer; NIST Cybersecurity Framework and IEC 62443 (Parts 2-1, 3-2) A water plant approached exida to conduct a cybersecurity gap analysis and high-level risk assessment with the aim of abiding by the AWIA cybersecurity requirements. America's Water Infrastructure Act (AWIA) of 2018 requires community water systems serving 3,300 or more…
In early February of this year a water treatment facility was compromised in Florida. The attackers successfully increased the concentration of sodium hydroxide (also known as lye) by a factor of 100 risking potential illness for the public as well as significant erosion and pipe damage. Fortunately, operators of the Oldsmar water treatment facility saw the attackers increase the concentration and were able to return the concentration to normal levels before there was any risk for harm to the public. This near-miss highlights several important trends for industrial cybersecurity: Industrial cybersecurity incidents can have major health and safety implications, Critical infrastructure makes an attractive target to a variety of hackers, Critical infrastructure is highly susceptible to cybersecurity attack. In this webinar we will review what is known so far about the attack on the Florida water system and identify practical steps that can be taken to improve the cybersecurity of critical infrastructure systems.
The Oldsmar Water Treatment Facility in Pinellas County Florida was compromised by hackers on February 5th. Hackers took advantage of the TeamViewer application that was still installed on the water facilities network to gain remote access1. The TeamViewer was originally installed to allow for status checks and troubleshooting of alarms…
When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to our I/O and our controllers. Fault-finding was always a challenge . What we ended up doing…
The webinar addresses the problems relating to the impact of improper Safety Instrumented Systems (SIS) maintenance practices and what this means, as well as looking at the competency requirements. Most companies believe they follow good SIS maintenance practices but do they really? Are they really measuring and tracking this? How do they measure and track?
Recent major accidents have been traced back to poor site safety practices, culture and competencies. The webinar addresses some of these issues and suggests a means for tracking and measuring how well maintenance and mechanical integrity is being performed.
What you will learn?
Who should attend?
Successful alarm rationalization combines both art and science. From the scientific point of view, rationalization follows a systematic process that applies alarm management principles to determine whether an alarm is justified (needed) and to document its basis (cause, consequence, corrective action, time to respond) and settings (priority, setpoint) in a…
If your alarm management program has suffered during the COVID-19 pandemic, exida can get back on track. exida can help you improve your skills and knowledge (initial & refresher training), update / introduce new processes (alarm system remediation), add new functionality (alarm flood suppression, Alarm Help), and make progress with…
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
IEC 61508 in the Safety Automation Equipment List
exida is excited to announce that an updated version of our FSE 100 - IEC 61511: Functional Safety Analysis, Design, and Operation is available for self-paced and open enrollment options. An example clip can be found below. This is a great course for those wishing to become an exida FSP…
Sellersville, PA: exida, the global leader in functional safety, cybersecurity, and alarm management for the process industries, has presented Emerson with the 2020 exida Safety Award for their Fisher Digital Isolation TOV SIS Solution. The Fisher Digital Isolation Final Element is a triple offset valve (TOV) solution which was developed…
Cybersecurity for industrial control systems has changed significantly in the past two decades as the question has changed from “who would want to target an industrial automation and control system?” to “which industrial facility will be affected next?” This webinar will review major industrial cybersecurity incidents including: Stuxnet, the attack on the Sadara Petrochemical Facility, NotPetya, and the German Steel Mill. These events and others will be used as case studies to outline how industrial cybersecurity has been shaped over the years, and introduce key lessons learned that will help IACS be better prepared to defend against and respond to cybersecurity incidents.
The increasing global adoption of alarm management standards (ISA-18.2 and IEC 62682) is bringing the importance of alarm rationalization to the forefront. Rationalization is defined as the “process to review potential alarms using the principles of the alarm philosophy, to select alarms for design, and to document the rationale for…
In a blog, posted today on the ISA Interchange, Iwan van Beurden and William M. Goble describe how the two fundamental concepts of the ANSI/ISA S84.01-1996, the Safety Lifecycle and Probabilistic Performance Metrics, have shaped the functional safety landscape. “These two fundamental concepts are to this day what is driving…
ISASecure in the Security Automation Equipment List
API 581 in the Safety Automation Equipment List
This webinar will teach you some simple and easy to implement diagnostics you can specify today to enhance your designs and increase the risk reduction.
This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here. Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in the…
Modern control systems make it easy (maybe too easy) to add alarms without significant effort, cost, or consideration for whether they are truly needed. This has led to alarm systems that often hinder, rather than help, operators by subjecting them to nuisance alarms, alarm floods, incorrectly prioritized alarms, and general alarm overload. Alarm rationalization, a proven alarm management technique and one of the stages of the ISA-18.2 / IEC 62682 alarm management lifecycle, can help address these issues and create an optimal, effective alarm system.
The presentation will touch on best practices for rationalization as well as the most common pitfalls. It will also demonstrate how effective alarm rationalization can lead to reduced downtime, reduced operational risk (insurance premiums), and reduced cost of operations, while improving operational discipline and operator effectiveness.