ISA Interchange

Welcome to the official blog of the International Society of Automation (ISA).

All Posts

Best ISA Webinars of 2017

This 2017 webinar roundup was edited by Joel Don, ISA's community manager.

 

As 2017 comes to a close, we surveyed the year's lineup of educational webinars to select five of the most popular presentations co-hosted with ISA's partners. Scroll down and enjoy this roundup of "best of the best" webinars.

Large Project Execution – A Better Way

There are many challenges to effectively executing automation scope as overall project size grows to $100 million and beyond. Interfaces between various stakeholders and proper distribution of work become critical to define and manage properly. The traditional model of sole-sourcing an EPC to handle everything, including the automation scope, has inherent weaknesses that can be mitigated by an alternate approach. Join us as we review common problems with executing automation scope in large projects and present solutions proven to be effective.

https://www.youtube.com/watch?v=jmHAt0d1NsA

Cybersecurity for Control Systems in Process Automation

Attacks to your production system may happen at any time and at any level – from outside as well as from inside. Which concepts and measures exist to protect your assets efficiently from software attacks? The ISA99 standards development committee brings together industrial cybersecurity experts from across the globe to develop the ISA-62443 (IEC 62443) standards on industrial automation and control systems security. German-based Siemens AG is a leading provider of automation equipment, global manufacturing company with close to 300 factories and provider of Industrial Security Services. In this webinar, ISA99 Committee Co-Chair Eric Cosman and Siemens Plant Security Services PSSO Robert Thompson will present the current threat landscape and key steps you can take to protect your critical assets in the production environment.

https://www.youtube.com/watch?v=V7gVX7pbVjk

How to Avoid the Most Common Mistakes in Field Calibration

Field process calibration isn’t just about getting the job done, it’s about getting the job done right. It’s cliché, but true. Instrument calibration requires the proper process, tools and parameters for each instrument application to ensure valid results. If one of the three are lacking, your results could have little validity. In this webinar, experts will expose the most easy-to-make mistakes and how to avoid them, so you can be confident in your calibration results.

https://www.youtube.com/watch?v=CrgWZPN0iSI

Unlocking the Truth Behind Alarm Management Metrics

Alarm Management is a well understood process, supported by global standards and operating best practices. But ultimately, the process of Alarm Management goes beyond Alarm Benchmarking and KPI Reporting. To drive alarm system improvement, action is required. So, what action should you take? What are the metrics really telling you about how your plant is operating? In this joint presentation, Honeywell's Global Alarm Management Product Director Tyron Vardy and Manufacturing Technology Fellow Nicholas Sands unlock the truth behind your plant's alarm management metrics.

https://www.youtube.com/watch?v=afP31Z3Z0zI&feature=youtu.be

Protecting Cyber Assets and Manifest Destiny from the Industrial Internet of Threats

During the 1800s, settlers saw it as their “Manifest Destiny” to settle the American West; but, found their lands under attack by the cattlemen surrounding them. The Manifest Destiny of industrial process and power generation companies is under similar assault. Bands of outlaws, or hackers, are cutting down perimeter-based defenses and successfully infiltrating process control networks (PCN). They are aided by growing attack surfaces created by the Industrial Internet of Things (IIoT) adoption; it is why IIoT is often referred to as the Industrial Internet of Threats. These and other factors put the highly complex, proprietary, and heterogeneous cyber assets in the plant at risk. Watch this webinar to listen to a discussion on the current landscape of ICS cybersecurity solutions. We will share how ISA advises companies to proceed and discuss “gotchas” that can derail an ICS cybersecurity initiative.

https://www.youtube.com/watch?v=JS9conaOR7U

Joel Don
Joel Don
Joel Don is the community manager for ISA and is an independent content marketing, social media and public relations consultant. Prior to his work in marketing and PR, Joel served as an editor for regional newspapers and national magazines throughout the U.S. He earned a master's degree from the Medill School at Northwestern University with a focus on science, engineering and biomedical marketing communications, and a bachelor of science degree from UC San Diego.

Related Posts

What Is Functional Safety?

Functional safety focuses on the detection of a potentially dangerous condition and depends on automatic ...
Jennifer Infantino Halsey Apr 7, 2020 5:15:00 AM

Companies Ramp Up Production of N95 Masks in Response to COVID-19

COVID-19 has exponentially increased the need for N95 disposable masks in hospitals and medical facilitie...
Kara Phelps Apr 3, 2020 5:15:00 AM

Newsweek Vantage Report on Cyber Risks to Critical Infrastructure: ISA's the Expert Partner

Newsweek Vantage recently published an independent report on cyber risks to critical infrastructure—and t...
Kara Phelps Mar 24, 2020 3:11:27 PM