Contractor Cybersecurity Training - Why Do You Need It?
Today, we are going to talk a little bit about Contractor Cyber Training. What's in a good contractor cyber training course? Why do you need one? Why aren't policies, practices, and contract language enough?
Today's operators of industrial production facilities frequently utilize contract…
Why Proof Test Coverage Is So Important For A SIF to Achieve Its Target SIL?
This is a question I often get asked when I’m teaching our FSE100 course on Functional Safety, when we discuss the purpose of Proof Testing and coverage. It’s amazing how many end users assume perfect proof testing (i.e. 100% coverage), that is capable of finding, all the…
Alarm Management and the Great American Solar Eclipse
Throughout history, total solar eclipses have been a significant event. In primitive societies, eclipses were viewed with fear or as important omens. In the US, the upcoming “Great American Solar Eclipse” is creating much excitement. From buying “official” eclipse-viewing glasses, to paying $1500 or more…
IEC 61508 Functional Safety Certificates - To Accept or not to Accept?
I get an email that includes a “certificate” of some sort most every week. The sender asks “Can I accept this certificate?” Or the sender might ask “Are these failure rates valid for the process industries?”
At exida we have some specific criteria we use when performing third party…
Outer Banks: How Could This Massive Power Outage Happen?
I, like many others, was stunned to hear that there was a major power outage covering the Outer Banks. Being an engineer, my instincts were to immediately investigate what happened and what steps occurred to lead to that point. Even before I did research, my mind was already asking…
Your organization gets information, feedback, and requests from customers all the time. It’s up to you to do some preliminary analysis and determine what the customer really wants. Do they want to buy something? Do they want to complain about something? Do they have a need for which no…
exida Cyber Blog Series 04 - Cybersecurity Metrics, Diagnostics, and Alarms: What’s What?
Co-written by Todd Stauffer, Director of Alarm Management Services at exida
A wise man once said, “You can’t manage what you don’t measure.” Let's apply this to the world of cybersecurity to discuss the importance of cybersecurity metrics and how they are different from a cyber diagnostic and a…
Why Run-to-Fail Is Not A Good Maintenance Strategy For SIS
One of the fundamentals of the Probability of Failure on Demand (PFDavg) calculations in SIL verification analysis, is the concept of a constant failure-rate during useful life of the equipment. Probabilistic calculations assume that the failure rate of the devices used in a Safety Instrumented System (SIS)…
exida Cyber Blog Series 03 - Process Safety and Cybersecurity, Related or Still Distant Cousins?
To be clear, the above title is meant to capture your attention. We all understand and know that it is unusual for a Process Safety engineer and the IT architect to possess detailed knowledge of both safety and security. In today’s world, the operators, engineers, design and support personnel of…
Making Use of Leading and Lagging Indicators – Are You Using These for Functional Safety?
Some of you reading this may not be aware or familiar with the terms “leading” and “lagging” indicators, when applied to Functional Safety. The concept isn’t new but does provide significant benefit when applying this to Functional Safety because, if used correctly, these indicators can help significantly improve performance. …
exida Cyber Blog Series: 02 - Does your position qualify as a Cyber Sensitive position?
That’s a great question.
What is a Cyber sensitive position?
A cyber sensitive position is a subset of a job position description that can be graded as Ultra, High, Medium or Low sensitivity with respect to cybersecurity assets and associated potential consequences that may impact an operating company.
Why Is Functional Safety An Important Piece of Process Safety Management?
It’s interesting to note that with the release of the 2016 edition of IEC61511, there’s more emphasis being placed on the need for better functional safety management. Having taught many courses on Functional Safety over the past few years, I find that most of the…
exida Cyber Blog Series: 01 - What is Cyber Hygiene?
exida would like to welcome our new director of cybersecurity services Dave Gunter. Dave will be taking us through a multi part blog series based on general cybersecurity evolving into how it pertains to your industrial work environment and what you should do to protect your company…
There was a joke I heard many years ago that went like this…
3 workers were hired to run telephone lines. The first part of their job was to install the poles on which the wires would run. Each day, the foreman would ask the workers how many poles…
The exida explains blog has been around for over five years and gives expert and sometimes candid insight into the world functional safety, alarm management, and industrial cybersecurity.