By now we’ve all become familiar with safety integrity levels (SIL), as they have become part of our everyday lives. However, with the recent release of several cybersecurity standards in the IEC 62443 series, things are getting more complicated. This series of standards introduces two more levels…
Last Saturday, I read an article about hackers who were behind at least two potentially fatal intrusions on oil and gas industrial facilities (Yes I read cyber articles on the weekend ). Besides the fact that I enjoy learning about cybersecurity on my…
Managing Risk: How Cybersecurity Differs for Facility Managers
Operations and facility managers have a level of responsibility that requires a great deal of judgment, technical understanding, and the ability to make the right call when managing risk.
Safe, secure, and profitable plant operations are the cornerstones of how a plant manager is judged. The plant manager relies…
Many Different Forces are Influencing ICS Cybersecurity Adoption
When we look at some of the challenges that are facing control systems, we also have to think about what forces are influencing how asset owners adopt cybersecurity. We'll talk about four of those main drivers that play a role in cybersecurity implementation.
The New Year is a great time to make resolutions, but often as the weeks pass, these resolutions fall to the back burner. A study completed in 2016 showed that less than 25% of those who set a resolution successfully followed that resolution for a year.1 When we think about…
Information Technology (IT) is the personnel, hardware, and software that controls non-physical devices and/or processes such as websites, financial data, personal information, etc.
Operation Technology (OT) is the personnel, hardware, and software that controls physical devices and/or processes such as manufacturing, oil & gas, power, etc. Today, OT has many…
The Perfect Match of Lockpicking and Cybersecurity
First off, an introduction is in order. My name is Greg Houser, and I’m one of the new fish here at exida (no, that’s not a typo – the ‘e’ is lowercase in “exida”). And…
Training in 2020 and Beyond. Adapting to COVID-19 with Online Solutions.
Hey everybody. I hope this blog finds you, your family, and your colleagues well. At exida, we appreciate the trust you place in our solutions and services to support you in achieving your functional safety,cybersecurity, and alarm management needs. We are committed…
All data breaches expose some type of IT (Information Technology) or OT (Operating Technology) system vulnerability. Cybersecurity professionals then need to evaluate and determine appropriate responses for themselves and their clients. It might be patching software, revising work processes or altering incident response techniques.