The key aspects of good vessel temperature and pH control are often not recognized. Here we provide some simple guidance and overview of the benefits of a particular strategy and implementation guidelines that should be commonly used.
Cyber incidents can be malicious or unintentional and still cause significant impacts and deaths. The lack of requiring a cyber incident to be malicious may have significant implications to cyber insurance policies particularly in being able to identify what is or isn’t a control system cyber incident.
Here we provide the key points for the final Part 3 of the recordings of my recent AIChE course sponsored by MYNAH Technologies. The focus here is on improving the performance of reactors, fermenters, crystallizers, evaporators, distillation columns, dryers and neutralizers.
The implications of the cyber vulnerabilities of digital protective relays have great importance for Smart Grid, grid modernization, NERC CIP, large plant electric equipment protection, and even nuclear plant safety. There will be a discussion of the ease of hacking relays and potential mitigation at the October ICS Cyber Security...
This is a reminder that the official Call for Abstracts (presentations) for SecurityWeek’s 2016 Industrial Control Systems (ICS) Cyber Security Conference, being held October 24 – 27, 2016 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA is open.
June 29th, 2016 the AntiPhishing Working Group (AWPG) and FTI Consulting held a 1-day cyber security conference in Brussels on the European Commission’s (EC’s) Networking and Information Security (NIS) Initiative. I felt the the Conference was a success as we were able to get the conference participants to appreciate the...
Here we provide the key points for Part 2 of my recent AIChE St. Louis Section course sponsored by MYNAH Technologies. The focus here is on improving the performance of compressors, jackets, heat exchangers and batch operations and the key role of valve position control (VPC).
It is mid-2016. “SCADA security” or “ICS security” are now being used in many cyber security conversations. However, in most instances, ICS cyber security is still not being adequately understood or addressed.