exida - Functional Safety Services, IACS Cybersecurity, Alarm Management, IEC 61508 Certification

Search

20 results for the keyword search: ""

Recorded Webinars: How Do I “Manage” my Cybersecurity Management System?

Cybersecurity management has become a business imperative for organizations across many industries. The first attempt can result in mounds of unruly and often unhelpful paperwork. This problem can be emphasized by identifying the correct location of cybersecurity requirements: Is the correct file for documenting the firewall rules, the firewall policy overview, firewall installation procedure, the access control philosophy, the system zone & conduit diagram, or some combination of all the above? 

With a Cybersecurity Management System (CSMS), one central document outlines the “what” an organization aims to achieve for cybersecurity and provides clear direction on where to find the procedures that outline the “how” for a given security task, leading to effective cybersecurity management and fewer headaches.


Blog Entry: Back to Basics 23 – Stiction

What is Stiction? Stiction is the resistance to the start of motion usually measured as the difference between the external force being applied in order to overcome the static friction and the force to maintain movement between the two contacting or working surfaces. It can result from: corrosion, cold welding,…


News Item: exida Certifies Gimpel Static Analyser Tool to SIL 4 & ASIL D

Gimpel Software LLC , the leading pioneer of static analysis solutions, has just received an ASIL D and SIL 4 certificate for PC-lint Plus from exida. With its vast capabilities as a comprehensive static analyzer, PC-lint Plus has achieved certification in both the ISO 26262 and the IEC 61508 standards.…


Blog Entry: Why Bother With Systematic Issues?

You may be wondering why this question is being asked? Isn’t it obvious that systematic issues are important and need to be considered? It may be that some of you reading this blog may not even understand what is meant by systematic issues. In which case, it may surprise you…


News Item: Valmet Automation Receives SDLA Certification Through exida

Sellersville, PA: The global leader in industrial automation cybersecurity certification, exida, has presented Valmet Automation with their Security Development Lifecycle Assurance Certification (SDLA) for their DNA Automation System. The Valmet DNA is a distributed control system for demanding process automation applications. Valmet now introduces a new web-based Valmet DNA User…


Blog Entry: Back to Basics 22 – Cycle Testing

A cycle test is done on a set of products (>20) until 10% of the units under test fail. The number of cycles is converted to a time period by knowing the cycles per hour in any particular application. A failure rate is calculated by dividing the 10% failure count…


Blog Entry: ISO 26262 Independence and Related Terms

The “ ISO 26262 Road vehicles – Functional safety ” specification defines the concepts of “Independence”, “Interference” and other terms which can be a little confusing. This discussion will try to make the concepts clearer. Independence Let’s talk about “Independence” and associated concepts first. “Independence” is a concept used within…


News Item: exida Joins ISA Global Cybersecurity Alliance

Sellersville, PA: The global leader in industrial automation cybersecurity consulting and certification services , exida, has joined the ISA Global Cybersecurity Alliance alongside founding members such as Schneider Electric, Rockwell Automation, and Honeywell. ISA created the Global Cybersecurity Alliance to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure…


Blog Entry: Back to Basics 21 – The B10 Method

The B10 method uses cycle test data to predict failure rates. A cycle test is done on a set of products (>20) until 10% of the units under test fail. The number of cycles until failure is called the B10 point. The B10 number of cycles is converted to a…


Training Course: Automotive Cybersecurity

This 1.5 day course is designed to give an overview of automotive cybersecurity providing an introduction to the relationship between cybersecurity & functional safety, automotive cybersecurity standards, management, process and planning aspects, TARA (Threat Analysis and Risk Assessment), as well as understanding cybersecurity goals and threats. Cybersecurity principles and the…


Blog Entry: Alarm Response Procedures: More than Just a Good Idea

From an operations point of view, one of the significant parts of the ISA-18.2 and IEC 62682 alarm management standards is the endorsement of alarm response procedures. An alarm response procedure, otherwise known as “Alarm Help” or “Alarm Response Manual”, is defined as guidance for response to an alarm (e.g.,…


News Item: Control Instruments Wins 2019 Safety Award

Sellersville, PA: Control Instruments Corporation , the experts in gas detection and solvent vapor monitoring was awarded the exida 2019 Safety Award for their PrevEx Series 670 Flammability Analyzer. The exida Safety and Cyber Awards were designed to identify and acknowledge exida certified products which best display an innovative and…


Recorded Webinars: The Cybersecurity Lifecycle (IEC 62443) and exSILentia Cyber

The cybersecurity lifecycle was developed to define the key steps in analyzing security risks, designing secure systems, and maintaining security throughout the life of industrial control systems. Learn how to use exSILentia Cyber to complete key steps of the Cybersecurity Lifecycle Outlined in IEC 62443 including high-level risk assessment, detailed risk assessment, security level verification. This webinar will demonstrate how a tool-based approach allows for consistent lifecycle implementation across an organization and can provide significant benefits including knowledge capture, built-in industry best practice, consistent template usage, and report generation for easy result sharing.


Blog Entry: Back to Basics 20 – Safe Failure Fraction, SFF

Safe Failure Fraction (SFF) is defined as the ratio of the average rate of safe failures plus dangerous detected failures of the subsystem to the total average failure rate of the subsystem. It is defined for a single channel (no redundancy, 1oo1). It is a measurement of the likelihood of…


Schneider Electric - Field Device Controller 280 (FDC280) – Firmware Version 0901004000

ISASecure in the Security Automation Equipment List


Honeywell Process Solutions - Experion PKS R510.1

ISASecure in the Security Automation Equipment List


Blog Entry: Getting the Best IEC 62443 Cybersecurity Certification?

After careful planning and development of your system, the last thing you want to worry about is the credibility of your certification. Although it may seem like a given for your certification to be well accepted by your customers, it is never a bad idea to dig a little deeper…


News Item: exida Launches Self-Paced IACS IEC 62443 Cybersecurity Lifecycle Course

Sellersville, PA: The global leader in industrial cybersecurity services for the process industries, exida, has launched the self-paced training course CS 102: Industrial Automation Control Systems (IACS) IEC 62443 Cybersecurity Lifecycle . CS 102 addresses integration of cybersecurity into the functional safety lifecycle per the IEC 62443 standards. While cybersecurity…


News Item: Cisco Catalyst Wins 2019 exida Cyber Award

Sellersville, PA: The global leader in automation cybersecurity certification, exida, has presented Cisco with the 2019 exida Cyber Award in the Network Device category for their Catalyst IE3x00 Rugged Series switch . The Cisco Catalyst IE3x00 Rugged Series switches feature advanced, full Gigabit Ethernet speed for rich real-time data -…


Blog Entry: Back to Basics 19 – Route 2H

Route 2 H is one of two Architectural constraints options made available in the standards IEC 61508-2 and IEC 61511. Route 1 H . Both Route 1 H and Route 2 H are limitations that impose the hardware selected to implement a safety-instrumented function, regardless of the performance calculated for…


Page 49 of 146 pages. ‹ First  < 47 48 49 50 51 >  Last ›