I recently taught the International Society of Automation IC39C class “ANSI/ISA 18.00.02 Management of Alarm Systems” in Anchorage, Alaska. The focus of the class is the ANSI/ISA-18.00.02 standard “Management of Alarm Systems for the Process Industries”.
The class covers all of the key activities of the alarm management lifecycle provided within the standard. These activities include: the alarm philosophy, alarm rationalization, basic alarm design, advanced alarm techniques, Human Machine Interface (HMI) design for alarms, monitoring, assessment, management of change, and audit.
The goal of the class is to have participants be able to perform the main activities discussed such as: develop and Alarm Management Philosophy, identify types of alarms, discuss rationalization, classification, and prioritization of alarms, design basic alarms, determine when advanced alarming techniques should be used, document alarms for operations, design reports for monitoring and assessment of alarm system performance, manage changes to alarm systems, and test and audit the alarm systems.
Parts of the class are an open discussion so classmates can describe the alarm problems that they most commonly run into and discuss ways that they have addressed them. This definitely helps in getting a “real life” perspective of the issues while being able to also then identify the problem and discuss possible solutions. The team was very engaged in the discussion and it created a wonderful forum to discuss what alarm management looks like and means to a variety of different companies. Some of which have been using the lifecycle for many years and some who were just starting the journey. If you have a desire to take part in one of these class please contact us at email@example.com.
Our next Industrial Cybersecurity class: IC33 – Assessing the Cybersecurity of New or Existing IACS Systems (August 2018 – DE)
The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1 these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system, identifying security level targets, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS).
This course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements the project.
Click here to learn more: https://events.r20.constantcontact.com/register/event?oeidk=a07efi0hecqd4b4a380