[vc_row][vc_column][vc_column_text]To be clear, the above title is meant to capture your attention. We all understand and know that it is unusual for a Process Safety engineer and the IT architect to possess detailed knowledge of both safety and security. In today’s world, the operators, engineers, design and support personnel of an operating asset are required to […]
[:en][vc_row][vc_column][vc_column_text]Some of you reading this may not be aware or familiar with the terms “leading” and “lagging” indicators, when applied to Functional Safety. The concept isn’t new but does provide significant benefit when applying this to Functional Safety because, if used correctly, these indicators can help significantly improve performance. Let’s not forget that the IEC61511 standard is […]
[vc_row][vc_column][vc_column_text]That’s a great question. What is a Cyber sensitive position? A cyber sensitive position is a subset of a job position description that can be graded as Ultra, High, Medium or Low sensitivity with respect to cybersecurity assets and associated potential consequences that may impact an operating company. What this means is that more and more companies are qualifying their operating […]
[:en][vc_row][vc_column][vc_column_text]It’s interesting to note that with the release of the 2016 edition of IEC61511, there’s more emphasis being placed on the need for better functional safety management. Having taught many courses on Functional Safety over the past few years, I find that most of the people attending the courses have very little understanding of the importance (and […]
[vc_row][vc_column][vc_column_text]exida would like to welcome our new director of cybersecurity services Dave Gunter. Dave will be taking us through a multi part blog series based on general cybersecurity evolving into how it pertains to your industrial work environment and what you should do to protect your company and its assets from cyber criminals. Let’s Get Started […]
[:en][vc_row][vc_column][vc_column_text] Today, we are going to talk a little bit about Contractor Cyber Training. What’s in a good contractor cyber training course? Why do you need one? Why aren’t policies, practices, and contract language enough? Today’s operators of industrial production facilities frequently utilize contract labor. This means a number of contractors have physical access to […]