GE Digital is rolling out iFIX 6.0 to help operators improve productivity with active decision support and high-performance visualizations.
Here are some of the new or upgraded features:
At the Three Rivers Information Security Symposium near Pittsburgh last week, a panel of Chief Information Security Officers from higher education, healthcare, energy, banking and other industries discussed how to persuade decision-makers to invest in cybersecurity, the emergence of ransomware attacks developed by nation states and controlling access to the cloud.
All of the panelists emphasized educating colleagues – regardless of their spot on the organizational chart – about the need to protect sensitive data and stay vigilant against targeted cyber attacks such as phishing and e-mail impersonation attempts.
Traditionally, some large companies have had restrictive policies regarding social media platforms and cloud-based technologies, but that’s changing, said James Ringold of Westinghouse Electric, one of the panelists.
“Up until this year we were very anti-cloud. Now my unofficial title is the chief cloud enablement officer,” Ringold said. “How can we get to the cloud, and how can we do it securely under regulatory requirements and things like that. So it’s ever-evolving and the threats continuously change and we continue to adapt to those threats.”
Omar Khawaja of Highmark Health, which manages millions of patient records, said he believes the healthcare industry contends with more cybersecurity-related breaches than any other sector.
“It also turns out that ransomware hits healthcare more than any other sector,” he said.
Beyond ransomware, Khawaja said a few years ago his team set out to define the forces affecting its security program.
“We identified four forces.”
As for the cloud, Khawaja said it’s important to evaluate the type of data potentially moving to the cloud, its business value, the risk level, the consequences of a breach and the controls in place.
“The location, the geography, the vendor, none of those things matter, what really matters is: Are the controls sufficient? And if they are then, great, we’ll move to the cloud every day,” he said.
Trebor Z. Evans of Dollar Bank said his company has been cloud-averse, but “we can’t continue that way and stay competitive.”
Evans said he and his team are assessing the risks of moving information to the cloud. He is trying to help executives realize that just because a web services provider has security, a secure environment isn’t a guarantee.
From a company culture standpoint, Evans said he stresses to managers at this company that his team’s security measures should be viewed as a “business enabler,” not a barrier.
“It is my mantra,” Evans said. “So (it’s about) looking at that and working with senior management to understand their goals and where they want to go, making sure that I can be a part of that, but securely.”
Tom Dugas of Duquesne University said institutions of higher education are tasked with offering students and faculty both a secure but open and free system in which they can share research and educational resources.
He said the university contends with a constant onslaught of intrusion attempts because of how many students require access to its network.
“From the threat landscape, we’re in this quasi position where we need to protect the institutional assets of the university, which happens to be the information of our people, the research we produce and the actual educational, scholarly materials that we collect,” he said.
For more information about the symposium: threeriversinfosec.com.
Asset Performance Management (APM) is all about improving the reliability of your company’s physical assets while reducing risk and operating costs.
“APM is a really holistic solution,” says Paul Casto, GrayMatter’s Intelligent Assets Practice Leader. “There are many different solutions out there, but APM sits on a foundation that allows you to configure it based on your needs.”
APM typically includes condition monitoring, predictive maintenance, asset integrity management, reliability-centered maintenance, and often involves technologies such as asset health data collection, visualization, machine learning and analytics.
To help break down the details of APM, Paul created a “toolset” to demonstrate its value.
Failure modes have different mechanics of failure and different time scales and failure patterns. The nature of failure modes can dictate the APM tool (technology) to use and what assets to use it on.
The first APM tool involves identifying failure modes, performing failure analysis and developing maintenance and reliability tasks to mitigate the risk of equipment failures.
These tasks are executed as preventive maintenance, predictive maintenance, inspections, condition monitoring, etc. Collectively, they form the asset strategy.
Surveillance technologies leverage the human senses and experiential knowledge of operators and technicians. They are effectively applied by identifying all leading indicators of failure modes that the operator or technician can find through inspection.
Asset Performance Management is the overarching approach to strategies focused on failure modes. AHM uses equipment information, processed using specific engineering rules, to make decisions related to safety, condition-based maintenance, leading indicators of failure modes and the presence of equipment degradation mechanisms to extend equipment life.
Click to learn more about the APM Toolset and incorporating machine learning into your approach.
|cookielawinfo-checbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|