Webinars

  • OT  Experts Share Survival Stories

    OT Experts Share Survival Stories from Their Cybersecurity Journey


    December 12, 2018


    [Live Webinar: Part 4 of 4] To manage risk in the age of digitalization and Industrie 4.0, ICS security teams must find a balance between digitalization and cybersecurity. Join us as we analyze strategies that OT cybersecurity practicioners in the field recommend.  Register >

  • Operations Risk Management

    Operations Risk Management: A Comprehensive Approach to Safe and Reliable Production


    Industrial facilities focus on at least three primary areas of risks and concern: process safety, environmental performance, and cost of operations.The success and reputation of a company depends on how well they effectively and comprehensively manage operational risk in each of these areas. Learn why Operations Risk Management requires robust systems to detect, monitor, analyze and correct performance issues before they become a problem.
      Register >

  • IT/OT Convergence Video

    Recorded: Reducing Industrial Risk in a Converging IT/OT World


    [Part 2 of 4] We asked industry experts on the frontlines of OT cybersecurity risk mitigation to share practical advice for making control systems more secure. Join us for the second of a four-part webinar series as Mark Carrigan, COO at PAS Global, delves into their real-world insights and lessons learned on how to leverage IT/OT convergence and develop an effective OT cybersecurity program. View now >

  • PAS Webinar

    Recorded: From the OT Trenches – Three Cybersecurity Recommendations You Should Heed


    [Part 1 of 4] We asked 20 security professionals to share their top three recommendations for securing the industrial control systems that enable safe production in critical infrastructure globally. Join Jason Haward-Grau, CISO at PAS, as he shares those insights and his expertise to inform effective OT risk management strategies. View now >

  • Effective ICS Vulnerability Management

    Recorded: Effective ICS Vulnerability Management


    Sid Snitkin, vice president and general manager of cybersecurity services at ARC Advisory Group, and Scott Hollis, director of product management at PAS Global, square off on what’s truly required for effective ICS vulnerability management. Listen to Scott and Sid exchange views on the current state of industrial vulnerability management maturity. Hear them critique the relative effectiveness of existing approaches. Learn how your organization’s current approach to ICS vulnerability management stacks up by listening to Sid and Scott share what others in the industry are doing. View now >

  • Avoid the camouflage effect for HP HMI

    Recorded Webinar: Avoid the Camouflage Effect for High Performance HMI


    In this session, Bill Hollifield, co-author of The High Performance HMI Handbook, will discuss the “camouflage effect” of these poor practices, the reasons for their deficiencies, and significantly better ways to accomplish various process depictions. He offers practical guidance based on the principles in The High Performance HMI Handbook and the subsequent publications of related white papers and case studies.
      View now >

  • Making a Big Dent in Nuisance Alarms

    Recorded Webinar: Making a Big Dent in Nuisance Alarms


    In this webinar, Bill Hollifield, co-author of The Alarm Management Handbook, discusses how you can jumpstart your alarm management project and immediately show a major improvement by reducing nuisance alarms. He will cover the various types of nuisance alarms (chattering, fleeting, stale, duplicate, diagnostic, etc.) and the methods for fixing them. This includes a significant improvement in the method to precisely calculate alarm on-delay and off-delay times to reduce chattering and fleeting alarms – the worst contributors to high alarm rates. View now >

  • Operations Risk Management

    Recorded Webinar: Operations Risk Management


    Industrial facilities focus on at least three primary areas of risks and concern: process safety, environmental performance, and cost of operations. In the first of a webinar series , our experts, Mark Carrigan and Bill Hollifield, discuss the requirements of a robust system to detect, monitor, analyze and correct performance issues before they become a problem.
      View now >

  • Recorded Webinar: The Power of Regulation Versus Well-Oiled Industry Standards

    Recorded Webinar: The Power of Regulation Versus Well-Oiled Industry Standards


    It has become an ongoing debate – does government or self-regulation work better to secure an industry?  Which of these two different drivers for industrial control system (ICS) cybersecurity is better? Who is more prepared for the ever-evolving threat landscape facing today’s critical infrastructure? Hear two industry veterans – one from Power and one from O&G – debate the merits of both approaches and learn from their experience working within their respective areas and what companies must do to secure process control networks. View now >

  • Learn more about the 18.2 Technical Reports Starting with TR1

    Recorded Webinar: What You Need to Know About the 18.2 Technical Reports Starting with TR1


    What are the seven ISA 18.2 Technical Reports, and what do they mean to you? In this session, we’ll begin with a quick summary of ISA 18.2-2009, IEC 62682-2014, and ISA-18.2 standards and their differences followed by an introduction to the ISA Technical Report (TR); covering the intent of the reports, what is allowed in a Technical Report versus a Standard, and how you can get access to the reports. Finally, we’ll dive into TR1: Alarm Philosophy Document, covering mandatory requirements in the Standard, new content in the Technical Report, and what you need to do now based on best practices discussed in the PAS Alarm Management Handbook.(Part 1 in a 3-part series) View now >

  • Learn more about ISA-18.2 TR5, TR2 and TR3

    Recorded Webinar: What You Need to Know About ISA-18.2 TR5, TR2 and TR3


    What are the ISA-18.2 Technical Reports, and what do they mean to you? In this session, we'll explore TR5: Alarm System Monitoring, Assessment, and Auditing; TR2: Alarm Identification and Rationalization; and TR3: Basic Alarm Design. We'll discuss mandatory requirements in the Standard, new content in the Technical Reports, and what you need to know based on best practices discussed in the PAS Alarm Management Handbook.(Part 2 in a 3-part series) View now >

  • Learn more about ISA-18.2 TR4, TR6, and TR7

    Recorded Webinar: What You Need to Know About ISA-18.2 TR4, TR6, and TR7


    What are the seven ISA 18.2 Technical Reports, and what do they mean to you? In this session, we’ll explore and TR3 (Basic Alarm Design), TR4 (Enhanced and Advanced Alarm Methods, TR6 (Alarm Systems for Batch and Discrete Processes), and TR7 (Alarm Management when Utilizing Packaged Systems); covering mandatory requirements in the Standard, new content in the Technical Reports, and what you need to do now based on best practices discussed in the PAS Alarm Management Handbook.(Part 3 in a 3-part series) View now >

  • See Through the Noise with Industrial Control System Configuration Baselines with Cyber Integrity

    Recorded Webinar: See Through the Noise with Industrial Control System Configuration Baselines


    Industrial process control facilities need baselines to secure both production- and IT-centric endpoints. Baselines allow facilities to monitor more easily the configuration changes that impact security, compliance, governance, and operations. By focusing on the configuration data deemed most critical, Cyber Integrity’s enhanced baseline capabilities significantly reduce the time that engineering and cybersecurity personnel spend investigating and pinpointing configuration changes. View now >

  • Are We Safe to Run the Plant?

    Recorded Webinar: Are We Safe to Run the Plant?


    Risk management best practices demand a consistent, automated approach to IPL performance analysis, testing, validation, and reporting. In this webinar, we discuss how industrial facilities utilize industry best practices to automate the IPL management lifecycle. ​We cover approaches and challenges companies face monitoring IPL and operational risk and best practices to monitor IPL performance, visualize risk, track bypass status, and ensure IPL maintenance and test frequency integrity. View now >

  • Alarm Management in 7 steps

    Recorded Webinar: Alarm Management - 7 Steps in 45 Minutes


    Poorly performing alarm systems - plagued by high alarm rates, periodic alarm floods, nuisance alarms, and uncontrolled alarm suppression - diminish operator situation awareness and impact plant production and safety. An effective alarm system optimization strategy combines proven methodology, knowledgeable plant personnel, and standards-based automation technology.  In this session, we present a 45-minute condensed review of the PAS 7-Step Alarm Management Methodology.  View now >

  • Understand High Performance HMI Principles and Best Practices

    Recorded Webinar: Understanding High Performance HMI Principles and Best Practices


    Find out about principles and best practices for process control systems with a computer-based HMI. Foundational to understanding the recently revised ANSI/ISA-101 standard requirements, we'll explore HPHMI principles and best practices. View now >

  • Develop a Plan of Action: Guidelines for Implementing an HPHMI Strategy

    Recorded Webinar: Developing a Plan of Action: Guidelines for Implementing an HPHMI Strategy


    In this follow-up to our first webinar in the series, we'll review practical methods to implement a High Performance HMI strategy. We'll examine the evolving ANSI/ISA-101 standard, summarizing exactly what you need to know. View now >

  • How far can you push process

    Recorded Webinar: Pushing Process Limits Without Compromising Safety


    How can operating teams push processes to their optimal limits while maximizing safety and minimizing environmental impact? In this webinar, we discuss new technology and methods for aggregating, analyzing, depicting, and controlling process boundary information to increase the awareness of the operator while enabling engineers and managers to ensure that the process is always operated. View now >

This site would like to place a cookie on your browser to help us better deliver relevant and valuable content to you.