Industry Voices

Keys to Finding, Retaining Cybersecurity Talent

With cyberattacks on the rise, cybersecurity is more important than ever. Yet manufacturers and organizations of all kinds are struggling to retain top-notch cybersecurity experts. If your enterprise is staring down the cybersecurity skills gap, here are the steps you can take to fill it.

Functional Safety Assessment: More Than a Checked Box

A Functional Safety Assessment (FSA) is defined by the IEC 61511 standard as an “investigation, based on evidence, to judge the functional safety achieved by one or more SIS and/or other protection layers.”

Periodic Stage 4 Functional Safety Assessment: A Good Practice

In 2016, the International Electrotechnical Commission (IEC) published Edition 2 of the IEC 61511 standard, “Functional Safety – Safety Instrumented Systems for the Process Industry Sector,” which the International Society of Automation (ISA) 84 committee also adopted in 2018 as a U.S. national standard (ANSI/ISA 61511.2-2018).

Cybersecurity: Getting Ahead of Regulations, Threats

Manufacturing is under attack. Manufacturing was the most targeted sector by ransomware gangs in the last 12 months with 528 total victims, according to new research. This accounted for a 19.5 percent of all ransomware victims. Without a new defense strategy, manufacturers are at high risk – especially with new groups such as Chernovite and Bentonite focusing on the industry.

Effective use of Machinery Safety Standards

The high-level goal of the numerous machinery safety standards is to reduce injuries associated with machinery interaction. An additional advantage of applying these standards is the effective identification of hazards and analysis of risk, which can have far-reaching impacts and extensive benefits.

As Robot Usage Grows, So Does Risk

South Korea, Singapore, Japan, Germany, and Sweden are the most automated countries in the world, according to the World Robotics 2021 reports, published by the International Federation of Robotics (IFR). While the U.S. lags behind, it is rapidly picking up pace as technology advances and organizations search for solutions to labor shortages.

Proactive Protection from Nitrogen, the Silent Killer

After the Chemical Safety Board (CSB) filed an update on the January 28, 2021 tragedy at the Foundation Food Group (FFG) poultry facility in Gainesville, Georgia, that left six workers dead and at least 12 others injured, it just pointed out the stark reminder of the danger that nitrogen poses when leaked into a confined space, causing a drop in oxygen concentration that can lead to dire consequences.

AI for Secure Manufacturing

Artificial intelligence (AI) will end up used in the daily operations of a majority of organizations in the next three years and will be deploying it via cloud-based infrastructure to reduce issues of integration, scaling and security, according to the Gartner research group.

Learn the Basics of Dust Hazards

By Judith LesslieThose who work in high hazard industries are familiar with the OSHA Process Safety Management (PSM) and EPA Risk Management Plan (RMP) requirements for routine process hazard analyses. Potentially less well known is the variety of addi …

Know Your PSM, RMP System Deficiencies

Those who work in high hazard industries are familiar with the OSHA Process Safety Management (PSM) and EPA Risk Management Plan (RMP) requirements for routine audits to assess and verify compliance with these regulations.

PSM, RMP Audits: Areas of Concern

Those who work in high hazard industries are familiar with the OSHA Process Safety Management (PSM) and EPA Risk Management Plan (RMP) requirements for routine audits to assess and verify compliance with these regulations.

Multiple Benefits to Standardize Combustion Safety of Fired Equipment

Fired equipment such as industrial boilers, incinerators, process furnaces, and fluid heaters are used everywhere. They are a crucial, complex, and integral part of industrial operations and therefore require a meticulous approach to the design, operation, and maintenance of their associated safety systems.

Safe Water Means Smart Solutions

We have experienced a long history of cyberattacks in industries ranging from large pipelines to public safety organizations, and critical infrastructures like water treatment and supply systems are now coming under frequent attack.

Evergreen PHA: An Effective Alternative

Those who work in high hazard industries are familiar with the OSHA Process Safety Management (PSM) standard requirements for Process Hazard Analyses (PHA) for their covered processes. These studies are required to be completed initially, then revalidated, typically on a five-year schedule.

Questions to Ask Third-Party Suppliers

Supply chain attacks are inevitable. History has shown that at some point in time an adversary will compromise a supplier. In fact, there have been numerous examples of this in the last 12-18 months — a prime example being the SolarWinds incident.

Silver Bullet Works on Werewolves, Not ICS

An average human being during the day, but at night, under a full moon … a transformation. But that’s not as interesting as the ICS Werewolf’s weakness: The silver bullet.

Facility Siting: Understand Hazardous Release Implications

Process industry history is sprinkled with catastrophic incidents that acted as drivers of regulatory change, such as the 1974 Flixborough explosion, the 1984 Bhopal toxic release disaster, and the 2005 Texas City Refinery flammable material release and explosion.

ICS Basilisk: Fighting Against Fear

The feared basilisk is a serpent-like beast capable of destroying other creatures through its deadly stare; it is a monstrous creature, and “all who behold its eyes fall dead upon the spot.” This scary creature rears its ugly head more and more within the ICS security community and presents a formidable challenge.

STAMP-Based Approach to ID Hazards

STAMP (Systems Theoretic Accident Model and Processes) is a relatively new accident causality model based on systems theory.

Need to Slay the ICS Security Unicorn

An impossibly unique and special creature, the unicorn, through its rarity, is thought to have magical powers. In the not-so-distant history of cybersecurity within ICS, it seemed every person, organization, attack, or process was a unicorn: Rare and full of magic.

ISSSource

Pin It on Pinterest