ISA Interchange

Best ISA Webinars of 2017

Written by Joel Don | Dec 27, 2017 3:42:23 PM

This 2017 webinar roundup was edited by Joel Don, ISA's community manager.

 

As 2017 comes to a close, we surveyed the year's lineup of educational webinars to select five of the most popular presentations co-hosted with ISA's partners. Scroll down and enjoy this roundup of "best of the best" webinars.

Large Project Execution – A Better Way

There are many challenges to effectively executing automation scope as overall project size grows to $100 million and beyond. Interfaces between various stakeholders and proper distribution of work become critical to define and manage properly. The traditional model of sole-sourcing an EPC to handle everything, including the automation scope, has inherent weaknesses that can be mitigated by an alternate approach. Join us as we review common problems with executing automation scope in large projects and present solutions proven to be effective.

https://www.youtube.com/watch?v=jmHAt0d1NsA

Cybersecurity for Control Systems in Process Automation

Attacks to your production system may happen at any time and at any level – from outside as well as from inside. Which concepts and measures exist to protect your assets efficiently from software attacks? The ISA99 standards development committee brings together industrial cybersecurity experts from across the globe to develop the ISA-62443 (IEC 62443) standards on industrial automation and control systems security. German-based Siemens AG is a leading provider of automation equipment, global manufacturing company with close to 300 factories and provider of Industrial Security Services. In this webinar, ISA99 Committee Co-Chair Eric Cosman and Siemens Plant Security Services PSSO Robert Thompson will present the current threat landscape and key steps you can take to protect your critical assets in the production environment.

https://www.youtube.com/watch?v=V7gVX7pbVjk

How to Avoid the Most Common Mistakes in Field Calibration

Field process calibration isn’t just about getting the job done, it’s about getting the job done right. It’s cliché, but true. Instrument calibration requires the proper process, tools and parameters for each instrument application to ensure valid results. If one of the three are lacking, your results could have little validity. In this webinar, experts will expose the most easy-to-make mistakes and how to avoid them, so you can be confident in your calibration results.

https://www.youtube.com/watch?v=CrgWZPN0iSI

Unlocking the Truth Behind Alarm Management Metrics

Alarm Management is a well understood process, supported by global standards and operating best practices. But ultimately, the process of Alarm Management goes beyond Alarm Benchmarking and KPI Reporting. To drive alarm system improvement, action is required. So, what action should you take? What are the metrics really telling you about how your plant is operating? In this joint presentation, Honeywell's Global Alarm Management Product Director Tyron Vardy and Manufacturing Technology Fellow Nicholas Sands unlock the truth behind your plant's alarm management metrics.

https://www.youtube.com/watch?v=afP31Z3Z0zI&feature=youtu.be

Protecting Cyber Assets and Manifest Destiny from the Industrial Internet of Threats

During the 1800s, settlers saw it as their “Manifest Destiny” to settle the American West; but, found their lands under attack by the cattlemen surrounding them. The Manifest Destiny of industrial process and power generation companies is under similar assault. Bands of outlaws, or hackers, are cutting down perimeter-based defenses and successfully infiltrating process control networks (PCN). They are aided by growing attack surfaces created by the Industrial Internet of Things (IIoT) adoption; it is why IIoT is often referred to as the Industrial Internet of Threats. These and other factors put the highly complex, proprietary, and heterogeneous cyber assets in the plant at risk. Watch this webinar to listen to a discussion on the current landscape of ICS cybersecurity solutions. We will share how ISA advises companies to proceed and discuss “gotchas” that can derail an ICS cybersecurity initiative.

https://www.youtube.com/watch?v=JS9conaOR7U