How do you get started with implementing the ISA-101 (High-performance HMI) standard into your existing facility? If you start by recognizing that not all aspects of the standard will be equally embraced, you can work on creating an internal standards document that will define for your engineers how you are going to implement the standard. Best practice would be to have a true ISA-101 expert available for consultation during this process. If this is expertise you do not have in-house, please reach out and we can work on getting a project started. https://lnkd.in/e_MUPQkQ
Kurt Niehaus’ Post
More Relevant Posts
-
Here's a great video from our Executive Chair touching on how to liberate data from data islands and turn it into usable information.
Thanks to Paul J. Galeski, P.E., CAP for taking a few minutes to talk with GrayMatter's #TechHub blog about GrayMatter's rapid growth, domain expertise and our unique opportunity to take on the next evolution in industrial intelligence. Glad to have you back in action at GrayMatter! 🔗 Visit us at graymattersystems.com. #industrialtechnology #industrialintelligence #manufacturing
TechHub: GrayMatter Executive Chair Paul Galeski 'Back in Action' | GrayMatter
https://graymattersystems.com
To view or add a comment, sign in
-
Dale Peterson recently put up a snippet of his conversation with Dragos’ Robert M. Lee. If you don’t know these two, they are both OT Cybersecurity heavyweights and I suggest following them. For some background, Dragos, Inc. has long been known for their threat intelligence. In the OT space, it’s top-tier. Dale has a great question: “why does it matter, if regardless of threat you should do the same thing and follow the SANS recommendations?” Robert’s answer surprised me: it’s to help those not close to OT cybersecurity recognize why we should be doing all these (sometimes expensive) Cybersecurity controls. If you have an OT system and you’re struggling with what to do next, please reach out. We at | GrayMatter | can lend a hand guiding you through what a typical Cybersecurity maturity model looks like so that you’re able to make sure you get the basics right and implement those controls that makes sense for your risk tolerance and industrial profile.
ICS Security Catalyst, Founder of S4 Events, Consultant, Speaker, Podcaster, Get my newsletter friday.dale-peterson.com/signup
If the threat intel report says implement the five critical controls, why do I need threat intel? Robert M. Lee answers the question in this clip (hint: bookends). #s4xevents
To view or add a comment, sign in
-
Great Points Mike Holcomb! There are three aspects of | GrayMatter |'s approach that help with this. First, most business leaders don't like hearing about what seems like a simple overhead expenditure increase. Instead, we look at the investment in terms of potential risk mitigation. That is, after an assessment, we provide a report and a report summary - a summary which highlights the expenditure vs. mitigation. Second, our assessments are not conducted in a vacuum. All stakeholders are invited to participate, including both IT and OT. This allows the team to speak in a more unified voice instead of sounding adversarial to the higher-ups. Third, we look at cybersecurity as an enabler. Whether it is decreased downtime through secure remote support, or improving data utilization, cybersecurity supports other improvements that have an ROI.
95% of cyber security budgets go to IT. Only 5% goes to protect ICS/OT. A small percentage to protect the OT systems. The systems which generate 100% of the revenue. Which is the reason WHY the business exists. Why people have... -> Jobs -> Clean water -> Reliable energy -> Safe transportation -> Meds we use to live -> Food on the table to eat -> Products we use to thrive -> And so many services we rely on Every day of our lives. It is time for this to change. Do we want money taken away from IT? Not necessarily. But asset owners and operators need to increase spending for ICS/OT. We're not asking for the world. We're not asking for overspending. Even at 10%, there isn't a chance of spending too much on cyber. It's 2024. It's time for budgets to change. It's time to support cyber security in ICS/OT. More than 5%. P.S. Special thanks to Robert M. Lee for highlighting this. During the SANS ICS Summit and his GRID course. What's your take?
To view or add a comment, sign in
-
-
Sameer Kausar 🦆 It's a great picture to delineate the roles. Another point is that AEs tend to support different kinds of SE, with each SE type covering a different tech/product/service. So having the AEs surrounded by different SEs helps the SE see that the reason the AE doesn't go as deep technically is because they need to have broader topical knowledge and not because of some personal flaw.
Senior Solutions Consultant @ Homerun Presales ⚾️ | Building the future of Sales Engineering 🚀 | Diary of Sales Engineer 🦆 | Career Advisor for Presales Academy
Yesterday, Brian Lewis had a coffee thought about where the line between AE and SE fell... I felt it was less of a line and more of an overlap. Great AEs have a little SE in them and great SEs have a little AE in them. So I made a quick and dirty Venn diagram to illustrate how I saw the two roles and where I think the overlap is. Yes, SEs should do a little 𝗽𝗿𝗼𝘀𝗽𝗲𝗰𝘁𝗶𝗻𝗴 as it helps us hone our pitch to what matters the most. AEs should know how to run a 𝗯𝗮𝘀𝗶𝗰 demo as it helps them understand the technology a little more. How would you adjust this? What would you add? #ducklife #salesengineering #presales #AE #SE
To view or add a comment, sign in
-
-
We've got an opening for a Senior Cyber Engineer. If you meet the qualifications, please apply! If you're already connected to me, shoot me a DM and we can talk about it and I'll make sure your resume is "in the right pile."
To view or add a comment, sign in
-
Great slide deck! “The impending technical labor shortage” isn’t impending – it’s here. One thing I see very few employers understand is this: if the total compensation is better elsewhere, it’s not a lateral move to the employee. An example is moving from engineering into finance. If the money is better in finance, finance is a “step up.” A place I’d disagree is about poaching talent. It will always be possible, and I think it’s actually a necessity. Until a company starts losing people through poaching, the compensation needle won’t move enough to entice more people to join. And having young, smart people join the manufacturing workforce is what we need right now. That said, the people you want to poach are those with a track record of upskilling those around them. That makes them a force multiplier helping you get more out of your existing workforce investment. The slide I think might be missing is one on outsourcing. Up-skilling takes both strategic investment and time. When you need to be nimble, getting help from outside the organization can help jump start your efforts. One of the great things about | GrayMatter | is that we both strive to upscale internally, acquire experienced talent externally (thank you John Gehan!), and hire raw potential. This three- pronged approach allows us to provide technical expertise to companies who find themselves without the right technical staff with regards to automation and OT services.
✦ Smart Manufacturing Advocate ✦ Technical Education Consultant ✦ Workforce Development ✦ Industry 4.0 Keynote Speaker ✦ 𝐀𝐰𝐚𝐫𝐝-𝐖𝐢𝐧𝐧𝐢𝐧𝐠 𝐀𝐮𝐭𝐡𝐨𝐫 ✦ 3x Recognized Manufacturing Thought Leader ✦
For those involved in manufacturing, how many years (decades) have you heard these words? ❌Skills Gap ❌Employee Issues ❌Labor Shortage ❌Aging Workforce It has been discussed so much that for many it has become background noise, instantly ignored. But it's different now. The solution of poaching existing talent won't work in 2024 and beyond. There is none available! * Check out the 𝐬𝐥𝐢𝐝𝐞 𝐝𝐞𝐜𝐤 to summarize the above in seconds. And although challenging, it is far from hopeless. But change is needed. Sorry :) * there are some short term solutions that governments and multinationals might try that involve shifting talent from one region to another. But it isn't sustainable or practical. Everyone, everywhere, has to grow their own talent pools. The world demographic trends are clear and brutal in this regard.
To view or add a comment, sign in
-
Reposting for reach.
Reposting this opportunity. Looking for an engineer to work in our insider risk organization to develop policy and triage for enhanced monitoring. Great opportunity! Great Organization!
Insider Risk UAM Engineer
jpmc.fa.oraclecloud.com
To view or add a comment, sign in
-
I’ve seen several references to jump servers recently in literature with little explanation. So what is a jump server? Simply put, it is a (secure) computer that allows access from one network to another. Its typical application in ICS is to allow remote users – users not physically near the control system – to have access to a control system. A proper network design will make it the single conduit to the control system, allowing all access to be managed and administered at a single point. This architecture therefore reduces the attack surface of the control system. Additionally, it is a common – though not universal – practice to only allow such remote access if there is a credentialed local operator present to permit access to the system. Typically, authorized access is removed after an idle period and must be reauthorized to continue. Removing direct access to the internet is a key component to even the simplest OT cybersecurity program. Properly implementing a jump server can allow OEMs and other support personnel remote access while also retaining oversight by site personnel. Per above, by extending these controls beyond simple administrative controls (like removing a cable when complete), cybersecurity posture can be substantially improved. This control over remote access not only addresses some security concerns while retaining remote access for maintenance and support, it also serves as a safety check on any remote access by site personnel. This means that if remote personnel inadvertently create an adverse condition, there is a local presence able to assist in promptly identifying and mitigating the error before it becomes a dangerous event. Since a jump server needs to function in coordination with properly configured firewalls and an actively maintained role-based access control policy, it may be necessary to leverage outside assistance to ensure adherence to best practices. Please contact | GrayMatter | to learn more.
To view or add a comment, sign in
-
Because I'm a sucker for a LotR reference, and this a very good video, I suggest watching! Covers everything from initial steps to training on deployed system - a system that provides multiple recommendations based on current importance to keep your water plant compliant, even through changing regulations.
How Akron Water Supply Bureau Built One KPI to Rule Them All - GrayMatter
https://www.youtube.com/
To view or add a comment, sign in
-
As the world pauses to commemorate D-Day this, the 6th of June, we find ourselves reflecting on the fading echoes of a pivotal moment in history. The Normandy landings in 1944 were not merely a turning point in World War II but a testament to the extraordinary valor and sacrifice of countless individuals. As time marches on, the number of surviving veterans diminishes, making our remembrance of their deeds even more poignant. Operation Overlord was a monumental feat of coordination, strategy, and sheer bravery. The storming of Utah, Omaha, Gold, Juno, and Sword beaches required unflinching resolve in the face of almost insurmountable odds. Those who lived through that harrowing day have long borne the memories of comrades fallen, the chaos of battle, and the fragile line between life and death. In our remembrance, we find a call to action: to uphold the values for which they fought and to cherish the peace secured by their sacrifice. As the number of those who can recount that day dwindles, our duty to remember and honor their legacy grows ever more profound. Let us ensure that the bravery of June 6, 1944, is etched forever in the annals of history and in our collective memory.
To view or add a comment, sign in