POPULARITY
Emerson's Nikki Bishop and Franz Valmonte join podcast host Jim Cahill to discuss innovations in DeltaV Edge 2.0 to help pharmaceutical and biopharmaceutical manufacturers reduce time to market and release times for the medicines and therapeutics they deliver to the world.
In this Emerson Automation Experts podcast, Hamza Malik joins Jim Cahill to share a solution to silos of data, to bring them together to turn data into actionable information in order to drive performance improvements.
Emerson's Andrea Sutti and Massimiliano Franco join Jim Cahill in this Emerson Automation Experts podcast to discuss the role of these critical valves and actuators in the world's largest LNG project. They share the importance of selecting and testing the actuated valves to meet the requirements of safety, isolation and control applications.
Emerson's Riyaz Ali & Tom Mullins join podcast host Jim Cahill to share the story of an LNG producer and how they applied digitalization in their project design and installation to deliver integrated solutions to improve the project schedule and ongoing operational performance.
In this podcast, Devin Cloud with one of Emerson's Impact Partners, John H. Carter, and their ControlWorx Premier Service Provider organization, joins podcast host Jim Cahill to discuss one very successful project in the state of Louisiana along the Gulf of Mexico.
Melissa Lee & Kebra Tynan join Jim Cahill in this podcast to discuss how Emerson is helping Life Sciences manufacturers address drug development lifecycle challenges with a software-as-a-service (SaaS) based workflow management solution.
Reid Youngdahl joins Jim Cahill in this 30-minute podcast to discuss how Emerson helped a major LNG producer overcome key production challenges by implementing Fisher Joule-Thomson (JT) Valves.
In this Emerson Automation Experts podcast, Martha Rendon joins Jim Cahill to discuss the North American Energy Standards Board (NAESB) challenges and solutions around standards compliance for companies in the pipeline transport industry.
Johan Zebib joins Jim Cahill in an Emerson Automation Experts podcast to share how MES addresses many of the challenges for higher quality, and more efficient and reliable production in the pharmaceutical & biopharmaceutical manufacturing industries.
In this Emerson Automation Experts podcast, Emerson's John van Gorsel joins Jim Cahill to discuss these considerations in pressure and other measurements. Technology advancements have enabled new capabilities and simplified configuration, operation, and ongoing maintenance.
Bob Lenich joins podcast host Jim Cahill to discuss how the Process Knowledge Management (PKM) digital collaboration platform can help streamline the process and minimize errors, resulting in faster time-to-market for pharmaceutical & biopharmaceutical manufacturers.
Bill Carey joins Jim Cahill to discuss the Life Sciences Showroom facility in the Austin, Texas area. The showroom demonstrates how to address the challenges in developing a path forward.
Podcast: Emerson Automation Experts (LS 23 · TOP 10% what is this?)Episode: Building Cybersecurity Robustness in Pipeline Operations PodcastPub date: 2024-07-25Manufacturers and producers across all industries know the challenges in keeping their operations cyber-secure. Industries such as pipeline transportation and electrical & gas distribution networks face additional challenges in the wide geographic spread of their operations and the need for reliance on public communications networks. In this podcast, I'm joined by Emerson cybersecurity expert Steve Hill to discuss these additional challenges and ways the companies in these industries, suppliers, and federal regulators are collaborating to develop and implement best practices for strong cyber resiliency. Give the podcast a listen and visit the SCADA Solutions & Software for Energy Logistics on Emerson.com and the AspenTech Digital Grid Management page for methods and solutions to improve your cybersecurity defenses and ongoing programs. Transcript Jim: Hi, everyone. This is Jim Cahill with another “Emerson Automation Experts” podcast. Pipelines cover a wide geographic area and require continuous monitoring for safe, efficient, and reliable operations. Today, I’m joined by Steve Hill to discuss the challenges pipeline operators face in keeping their pipeline networks cybersecure. Welcome to the podcast, Steve. Steve: Thanks, Jim. Pleasure to be here. Jim: Well, it’s great to have you. I guess, let’s get started by asking you to share your background and path to your current role here with us at Emerson. Steve: Thanks, yeah. I’ve been in the automation and SCADA industry for about 40 years, started on the hardware design and communications that then moved over to software. And it’s nearly 20 years I’ve been with Emerson. I joined as part of the Bristol Babcock acquisition. My main focus now is working in wide-area SCADA as the director of SCADA Solutions for Emerson, and most of that’s working in the oil and gas industry, working with Emerson sales and the engineering teams and our customers as they design systems and products for the industry. And also, alongside that, for the last few years, I’ve been collaborating with CISA. That’s the U.S. government Cybersecurity and Infrastructure Security Agency as part of the Joint Cyber Defense Collaborative. Jim: Okay. That’s a nice, varied background. That’s really good for our discussion. So, what exactly do you mean by wide-area SCADA? Steve: That’s a great question. There’s a SCADA system where the software is monitoring equipment across a very wide area. It might be a very large geographic area, like a pipeline or gas, or water distribution network, or perhaps a well field. I mean, some of the systems, for example, I was speaking to a customer last week who is monitoring an entire pipeline across Peru, and yet, their control centers are actually in Mexico. So, to do that kind of thing, the equipment is usually connected via public networks. You know, private networks don’t extend that far, and even the control centers may be widely distributed. And as part of that, compared to in-plant control, there’s an assumption that your communications are clearly not gonna be 100% perfect. You’re gonna lose communications either momentarily, like with cellular networks, and when, for example, like we’ve got in Texas this week, with natural events like hurricanes can cut communications for hours. But because these systems are all critical infrastructure, such as pipelines or electrical distribution, the actual operations, the process, must never be interrupted. Today, we’re talking about cybersecurity, and that same sensitivity is why these systems are now the target to some of the most sophisticated cyberattacks. Jim: Okay, that gives a picture of the breadth of these types of SCADA systems, and you had mentioned you’d work with CISA, the cybersecurity infrastructure defense agency, and the Joint Cyber Defense Collaborative, which I’ll just call JCDC for short. Can you give some more examples on that work? Steve: Yeah. Really, I could give you a bit of background. Probably many of our listeners know that there’s been several successful cyberattacks against critical infrastructure over the last few years. Probably the most famous in the pipeline industry was an attack that’s referred to as the Colonial Pipeline attack. That was actually a criminal ransomware attack that resulted in gasoline and jet fuel shortage across the Eastern U.S. for several days, and that was criminals basically trying to get money. And it was almost a random attack, it wasn’t targeted. However, there have been actual state-sponsored attacks, and probably the one that was most successful was prior to the Russian military attack against Ukraine. They actually instituted several successful cyberattacks against the Ukrainian power grid. And very concerning is, in recent months, the U.S. infrastructure, including pipelines, have been successfully infiltrated by a group that are called Volt Typhoon, who are thought to be from the People’s Republic of China. So JCDC and CISA are working hard to really counter and protect against these threats. Jim: Wow. Well, that’s clearly a huge concern. What is the JCDC doing to address these challenges? Steve: Well, in 2023, so last year, JCDC facilitated the development of something called the Pipeline Reference Architecture. Basically, Emerson, alongside other industry vendors and also pipeline operators, participated in the development of this Pipeline Reference Architecture, which I’ll refer to as the PRA. It’s a fairly short document that outlines the design and operating principles for SCADA systems in the pipeline industry. And one thing the government is keen to point out, it’s not a regulatory document, but it does set out the best principles and is intended as guidance for the industry. Really, they want to work with the industry to come up with best practices. Jim: Well, it sounds like this PRA is another set of standards to address cybersecurity. Why is another document needed in the industry where a bunch of standards exist now? Steve: Yeah, that’s a question I and other members get asked quite a lot. The main reason is that wide-area SCADA represents a very different set of challenges to traditional SCADA, which we refer to as inside the wire. So for example, a refinery or a manufacturing plant, everything is in one location. But as I mentioned before, wide-area SCADA has got a very wide displacement, physically. It also actually has a lot of remote field workers. There may be folks working on that system hundreds of miles from base, and you’re also using communications networks that are not even owned or operated by the owners of the pipeline. Though this PRA is really intended for the pipeline industry, clearly, it’s applicable to almost any wide-area SCADA, that’s water or electrical industry as well. Jim: Okay, that makes sense. So those are definitely challenges that don’t exist for more automation systems, as you say, inside the wire. Tell us more about how the PRA addresses these. Steve: Well, the big thing is segmentation, basically, taking the network and splitting it into different levels that represent different areas of the operation. For example, the internet would be what’s referred to as level zero, and moving all the way down to the bottom of the network, that’s level nine. And the levels in between that represent different levels of trust. Now, those who are familiar with cybersecurity and SCADA are probably familiar with something that is called the Purdue model, which I think first came out in the late 1980s, and that also splits up SCADA and control networks and actually business networks into different levels. However, when that came out, the internet was in its infancy. No one would ever have used the internet or even really public IP networks for their connectivity. So it doesn’t really take into account many of the things we take for granted today in these systems. So the PRA is intended to expand and take into account the reality that, for example, some of this critical data will actually be transiting across a public network, right? And in order to achieve that with this segmentation, we’re using a concept called Defense in Depth, right? And as you go down the different levels of the network, the assumption is you can trust each item on that network better. So, for example, on the internet, you don’t trust anything, but when you get down, let’s say, to the communications between an RTU [remote terminal unit] and a gas chromatograph on a local serial link, you might completely trust that. Now, it’s interesting, although that’s part of the PRA model, that does actually conflict with a security concept called Zero Trust, which is something that Emerson has really based our products on. But both zero trust and defense in depth are valid. Jim: Now, you had mentioned a couple of concepts I’d like to explore a little bit more in there, and let’s start with zero trust. Can you explain that concept to us? Steve: Oh, yeah. Yeah. Zero trust is a concept where any piece of equipment or software should trust nothing. Don’t trust anything else on the network, don’t trust the network to be safe, and it should not rely on anything else for protection. And historically, SCADA was protected, for example, by firewalls. You would use insecure products that were known to not be secure because they were developed perhaps 20 or 30 years ago and hide them behind firewalls, and that’s really how we’ve handled security today. But there’s a realization you can’t do that. So we now need to design products so that they don’t trust anything. But the reality is many of our customers, Emerson’s customers and pipeline operators, have devices that were installed perhaps 30 years ago. That’s the typical lifespan of some RTUs and controllers in this industry. So as a result, when you get down to the lower levels of the network, zero trust doesn’t work. So you do have to have levels of additional protection. So for example, if you had a Modbus link, which is basically insecure almost by design, that should be protected by additional levels of firewalls and so on. But if you’re designing a modern product, it should be designed so it doesn’t rely on anything else. And that’s the concept of zero trust. Jim: Okay, got it. So don’t trust anything. Everything must be proven out. And the other concept you talked about was defense in depth. So, what does that mean? Steve: Well, the phrase is most commonly used where we’re talking about a network with multiple levels in. So when you come from, for example, the internet into your business network, you would have a set of firewalls and what’s called the demilitarized zone. And then when you go from your business network down to your controls network, you’d have another set of firewalls. So it’s multiple levels of protection. However, that same concept should be used actually within products as well. And, in fact, Emerson takes that very seriously with our secure development lifecycle certifications, IEC 62443, and how we design those products. Jim: Well, that’s good. As you get those two and as you put in more modern technology, that it complies and has that cybersecurity built into mind there. So, can you give us an example of how it’s built in? Steve: Yeah. That great one. If I take, for example, the Emerson FB3000 RTU, that’s a flow computer and a controller device that’s designed specifically for the oil and gas industry, especially for pipelines, an obvious concern is that that may be attacked externally to modify the firmware. Now, at the first level, the RTU itself has secure protocols. It uses something called DNP3, which would, in theory, provide access to the device. But then the firmware, when we issue new firmware, we put it on a website so we have protection of the website, we also publish a hash, which is basically a unique key that the customer downloading the firmware can check. It hasn’t been modified by anyone attacking the website. But then, when they actually put it into the RTU, so they’re updating firmware, the RTU will check that that firmware was developed by Emerson and was intended for that device. It does that by certifying certificates on the load. Now, once it’s in the device and it’s running in the field, you might say, “Well, the task is done,” but there’s an additional level of protection. It will continually and on boot, check that firmware, make sure the certificate still matches, it’s not being changed. And if it has been changed, it will actually revert to a known good factory firmware that’s basically embedded in the device. So you can see that there’s really five or six different things all checking and ensuring that firmware in that device was not compromised. So basically, multiple levels within the device, and in addition, there’s multiple levels on the network. So the bad guys have to get through a lot of different levels to damage or compromise the device. And we’re trying to do that with everything we design today. Jim: Yeah. And with modern cryptography and making any change completely will change that hash and everything and make it impossible to slip something in without it being noticed. So that’s really a nice thing. Steve: Yeah. And the fact that even if it detects it, it then goes back to factory firmware, which may be a slightly older version, but your operation will keep running. It will keep controlling, which is a very nice feature. Jim: Yeah, that’s a great example there. I guess, going back to the PRA, what else does it include other than the segmentation that you discussed? Steve: There’s about 10 high-level principles that cover aspects of the design and operation of the SCADA system. And for each of these, there’s various examples and guidance on how to actually follow the principle in a real-world system. So, for example, there was a whole section on how to manage third-party devices in the contractors, because on a pipeline system, you’re almost certainly gonna have, for example, engineers from Emerson coming in from third parties. So it gives examples on the real-world aspects of operating the system. Jim: Are there other examples from it you can share? Steve: Yeah. One important one is when you’re designing the system, you should identify and document all of the different data flows that occur. And that’s, when I say data flow, communications or conversation between different pieces of equipment. So, for example, this RTU may communicate with that SCADA platform on this particular machine and may communicate with a measurement system on another machine, document all of those data flows, and then deny all other data flows by default. Then, after the system is running, continually monitor it passively. And if you see an additional communication, say, between two pieces of equipment that normally never communicated or didn’t communicate on a particular IP socket, flag that immediately, because it may be something that’s going on that was unexpected. It certainly was outside the original design of the system. Jim: This has been very educational. Thank you so much, Steve. Where can our listeners go to learn more? Steve: Well, really a couple of places. If you go to the CISA blog, which is at www.cisa.gov/news-events, there’s details there. The actual PRA was published on March the 26th of this year. And also, if you want to discover more about Emerson’s involvement in wide-area SCADA and the cybersecurity associated with it, if you go to Emerson.com/SCADAforEnergy, you’ll find some information there. Jim: Okay, great. And I’ll add some links to that and to some of the other things we discussed in the transcript. Well, thank you so much for joining us today, Steve. Steve: Not a problem. It’s a pleasure. -End of transcript-The podcast and artwork embedded on this page are from Emerson Team, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Emerson cybersecurity expert Steve Hill joins podcast host Jim Cahill to discuss these additional challenges and ways the companies in these industries, suppliers, and federal regulators are collaborating to develop and implement best practices for strong cyber resiliency.
Emerson's Scott Campbell joins Jim Cahill in this podcast to discuss the planning, execution, and follow-up of a successful modernization project.
On the Kula Ring podcast this week, we had the opportunity to speak with Jim Cahill, the Chief Blogger and the Head of Social Marketing at Emerson Automation Solutions. Since 2006, Jim has been cultivating Emerson's social media presence and digital brand. Over his 33-year career at the company, Jim has witnessed a lot of change in marketing, starting with the introduction of internet marketing in the mid-90s, ‘Web 2.0', and most recently how the pandemic shook up the marketing industry as a whole. Listen to Jim as he shares his industry knowledge on the best social media tactics that manufacturing marketers can implement to build connections with their audience and create social media content that drives sales.
In this Emerson Automation Experts podcast, Dave Imming joins Jim Cahill to discuss some of Life Sciences industry trends, the challenges they have introduced, and the role technology can play in addressing them.
In this podcast, Emerson's Jorge Costa and Bruce Greenwald join Jim Cahill to discuss the application of PAT technologies not only within the Life Sciences but across many of the process and hybrid manufacturing industries.
Phani Kanakamedala joins podcast host Jim Cahill to discuss the "Mega Rule" & its impact on gas pipeline transporters. He shares the challenges and the role of automation technology in addressing these regulations while improving overall pipeline performance.
Emerson Chief Sustainability Officer Mike Train joins Jim Cahill in this podcast to discuss Emerson's progress as measured through the CDP program and ways it's helping its customers drive their environmental performance.
Emerson's Jennifer Worthen joins podcast host Jim Cahill to discuss ways to drive more optimized liquids pipelines performance.
In this podcast, Caressa Kendall joins podcast host Jim Cahill to highlight the advantages and capabilities within the MyTraining section of MyEmerson to help manufacturers and producers upskill their workforce for improved operational performance.
In this Emerson Automation Experts podcast, Jim Cahill speaks with Emerson's Aaron Crews who leads the modernization team. Aaron discusses a new application, REVAMP which is a groundbreaking, cloud-based, advanced software solution that helps manage the transition of legacy applications to optimal control.
In this Emerson Automation Experts podcast edition, Martha Rendon joins Jim Cahill to discuss the role automation plays in driving greater operational efficiencies across the natural gas transportation and distribution supply chain.
Jim Cahill is joined by Spearix Technology VP of Sales & Marketing Juan Conchas and Emerson VP & General Manager for Pervasive Sensing Laura Schafer to discuss wireless communications innovations and how they will meet the challenges of increased communications bandwidth, device energy consumption, and continued reliability.
In this Emerson Automation Experts podcast, Jim Cahill speaks with Emerson's Greg Morrow to discuss how real-time transient models (RTTM) in the PipelineManager software application help pipeline companies maintain high performance levels.
Podcast host Jim Cahill is joined by Li-Cycle's Chris Biederman and Emerson's Nathan Pettus to discuss how the collaboration between the companies is helping to bring the process online sooner and enable scaling for future recycling processes across the globe.
Sarah talks with Jim Cahill, Chief Blogger and Head of Social Marketing at Emerson Automation Solutions. Jim shares his journey from engineer to sales to marketing and the knowledge and insights he's gained along the way. He also talks about building your personal brand, which is especially important in a high-turnover market.
As a part of our Asia-Pacific Sustainability & Decarbonization podcast series, Emerson's Sanjay Thakker joins Jim Cahill to discuss the trends, challenges, and solutions in the Biofuels & Biomaterials sector to achieve circular economy goals.
At the upcoming October 24-28 Emerson Exchange conference, Emerson's Karl White will be joined by a gas producer in the Western United States to share their success story on applying Rosemount measurement technology to improve their capital project and ongoing operational costs. Jim Cahill caught up with Karl to get a preview of what they'll discuss in this podcast.
Emerson's Shubhi Goel and Andy Wang join Jim Cahill in this Asia Pacific Sustainability and Decarbonization podcast to discuss the trends, challenges, and solutions to more effectively manage and control wind farms with integrated monitoring, supervisory control, and asset management.
In this podcast, Emerson Chief Sustainability Officer Mike Train joins Jim Cahill to discuss Emerson's “Greening Of, Greening By and Greening With” sustainability framework and the recently released 2021 ESG Report with firmly established net zero targets.
Podcast: Emerson Automation ExpertsEpisode: Growing Cybersecurity Threats and Mitigation Approaches PodcastPub date: 2022-06-15Cybersecurity was a big topic at the 2022 ARC Industry Forum in Orlando, Florida. While there, I had the opportunity to sit down and catch up with Emerson's Director of Cybersecurity, Mike Lester. We discussed many of the issues and growing threats companies face, as they try to maintain strong cybersecurity postures. Unfortunately, there is no silver bullet to becoming cyber-secure and maintaining strong defenses. Mike offers guidance on ways to develop a strong culture and address these challenges over time. Visit the Cybersecurity section on Emerson.com and subscribe to our continuing series of Emerson Automation Experts podcasts. Transcript Jim: Hi, everyone. This is Jim Cahill with another “Emerson Automation Experts” podcast. Today, I’m here at the 2022 ARC Forum in Orlando, and joined by Emerson’s director of cybersecurity, Mike Lester, to discuss some of the latest happenings in cybersecurity. Welcome, Mike. Mike: Thanks, Jim. Jim: Well, let’s get everyone grounded with a little bit of your background, and path to your current role here at Emerson. Mike: Sure, Jim. So, I’ll start way back in the Air Force, I was an aircraft mechanic back from 1985. so I did that for 12 years and then moved into communications, which was networking, data center operations, cybersecurity, you name it, and we did it from a technology perspective. And then after doing that for 10 years, I moved into Emerson as the operations manager for IT in the Rosemount twin cities factories, and helped, you know, maintain the factories, and networks, and systems there. Then moving into information security role for the then Process group. And then in 2017, moving into the current role for product security in the technology arm of the organization today, where I get to interact with customers, and all the business units around cybersecurity strategy, as well as technologies and governance. Jim: Well, that sounds like a really strong background, and I know cybersecurity is one of the key topic areas here at the conference this week. So why does cybersecurity remain such a large concern in the critical infrastructure space? Mike: Jim, there’s some obvious reasons and responses here, like, ever-increasing threats and successful attacks against critical infrastructure targets. Cybersecurity remains a large concern because there’s been a clear shift from gang-related cyberattacks seeking financial gain, to cyber as a fifth element of war with all nature of attacks between different threat actors, nation-states to nation-state saboteurs, to nation-state to private industry and in critical infrastructure sectors. A good example of this dynamic is Russia launching cyberattacks against Ukraine, days before the kinetic attacks began. Followed by that, was a global community of independent volunteer hackers that attacked and provided intelligence to the world about where oligarchs were docking their yachts, and much more direct, defensive, and offensive. Essentially crowdsourcing cyber warfare without anybody asking them to do it. Likewise, there’d been malicious threat actors like Anonymous, since most people are familiar with them, who chose sides in the cyber warfare effort. The threats are real, and we need to begin putting them into context in order to analyze risk with trained professionals in this space as opposed to some historically dismissive behavior or thinking that it can never happen. Jim: Yeah. It sounds like the degree of difficulty for companies to deal with it has gone way up, so there’s more that needs to be done. So I guess, given the strategic importance of critical infrastructure like manufacturing, what are the key areas of concern? Mike: Safety is always at the top of the list for concerns, but I would also couple this with the additional consequences of operational disruptions, leading to loss of revenue, supply chain disruption, all the way through to potential extreme or extended social and national capability disruptions, from lack of resiliency in cybersecurity and operations. Look, we depend on a Jenga stack of people, processes, and technology to live our daily lives with electronic everything. This includes our homes, our work, grocery stores, fuel, our national security, our entire way of life is really dependent on the continued and successful operation of critical infrastructure. And if I extend that Jenga analogy, you know, if you take the wrong block out, the entire structure can fail. And we’ve seen this, some blocks have been taken out or partial collapses in many places. But when we look at the cases like Venezuela and Haiti, where power outages lasted for extended periods of time, there were significant disruptions across the spectrum of what we would consider normal society and livelihood capabilities. We need to be cognizant of the possible, and engineer capabilities in critical infrastructure to match the risk. This may seem a bit doom and gloom but, you know, in reality, they are possible in civilization. We need to manage the risk appropriately in a way that equals a holistic capability. We need to work collaboratively and recognize the role that we have. Jim: I think that Jenga analogy is a real good one and gives people a picture of the challenges that we face in that. So what are some of the root causes of these points of concern? Mike: You know, it might be a little unexpected, but, you know, and I’m not gonna go point to a particular control or get dived down into the real technical details, recognizing that in reality, we have imperfect systems, and devices operated by imperfect processes, and often undertrained, imperfect people, we must look across the spectrum to determine how we can prioritize efforts in the right place. I believe this confusion or varying opinions to achieve better levels of cybersecurity, coupled with an extreme shortage in appropriate talent in the workforce, have led the industry to focus on a silver bullet approach primarily with technology solutions, and a market that fuels this approach. And we are misaligned through focus on discrete objectives, rather than industry, regional, national, company-strategic objectives that achieve outcome-based risk management, as opposed to compliance-oriented risk management that’s failed us for decades. A good example of this is antivirus or anti-malware, everybody’s familiar with that, being a mandatory compliance requirement for audits. When in reality, when it finds malware, it’s already in your environment, and likely active. Anti-malware is known as a reactive tool in the cybersecurity professional space, and what we should be focusing on is preventing that malware from getting into our environments in a proactive manner. Jim: Well, I guess we all wish there was a silver bullet to handle it, but much like other things, safety, there is no single thing that just makes everything perfect for you. So what can be done to mitigate these cybersecurity risks and threats? Mike: There’s a spectrum of thing, but it really equals work. Lots of work, with appropriate investment strategies, and dedicated budgeting. Threats can really only be addressed by more cyber-resilient and capable products, systems, services, supply chains, and operations. This requires cybersecurity skill and expertise across all business functional areas, similar to finance, or legal. Everyone in the company has a fiduciary expectation and responsibilities that they must meet. They don’t need to be a finance major, or certified public accountant, or a CFO. More directly, I always like to start with an assessment for your operations to determine gaps and create a plan to remediate those in a prioritized manner. We need to expand this thought process to all aspects of our business and across all functions if we’re gonna get beyond compliance to higher levels of maturity and capability. It’s not gonna be easy, and it’ll likely stretch, or break most paradigms of how to approach holistic cybersecurity that can achieve cyber and operational resiliency to the levels needed in our industries, and for future opportunities in automation and control. Jim: Well, yeah. It does sound like when you’re trying to tackle a very difficult problem, starting with the assessment and really prioritizing the things that need to be done, so it just doesn’t feel overwhelming. It seems like that’s a very logical approach to attack this very difficult problem. So what are your top recommendations to manufacturers and producers to strengthen their cyber defenses? Mike: Often we’re gonna be looking for…customers may be looking for, or other business folks may be looking for a list, “Here’s my checklist of things to do.” But really what it comes down to is, work with industry experts and cybersecurity partners, get an outside perspective, or a gap analysis. Cybersecurity in general from a people, process, and technology perspective, has very fast-paced rate of change across a full landscape. So it’s likely what was known about your operations last year, or when it was implemented, they’re stale data points. You know, looking to…or working with partners to build cybersecurity and operation resiliency in business investments, processes, implementations, etc., you know, with a prioritized business risk-based approach, is a really good start. Often, conversations around achieving cybersecurity devolve into technology and leverage, versus how to accomplish the right proactive or active defense against threats from the nation-state actors I spoke about earlier on, you know, an active cyber warfare landscape. I’m not saying this really to, you know, instill fear, uncertainty, or doubt, or what we commonly hear as FUD, but to really speak truth about what we face as an industry and as a society. Technology changes to improve cybersecurity capabilities will always be slow to implement and embed into systems and devices that control safety, operations, and the critical infrastructure segments. We’ve gotta understand the spectrum of cybersecurity architecture’s capabilities and operations that can enable resilient operations and fast recovery from what seems to be an inevitable incident that impacts manufacturers and producers. Jim: Well, I think that’s some good guidance of how to think about it and approach it. So where can our listeners go to learn more about ways to build their cybersecurity posture and culture? Mike: There’s a lot of good resources. I like to point folks, if they wanna be vendor-agnostic or they don’t…maybe they’re looking at vendors and asking whether we’re gonna sell them the silver bullet approach, you know, we can use resources like the national government’s U.S. Department of Homeland Security in the U.S., the Cyber and Infrastructure Security Agency (CISA), or the UK’s National Cybersecurity Centre, and others, you know. Most recently, Emerson’s partner Dragos, launched a program called OT-CERT. That provides free resources for companies who may not have the expertise available to help them understand the complex space of cybersecurity, and how to mature their programs, or even initialize their programs. Emerson also has a portfolio of cybersecurity capabilities like assessments, products, and services that focus on enabling secure customer operations. The bottom line is we really like to work with our customers and achieve their cybersecurity, and ultimately their business objectives. Jim: Well, that’s a great summary of places to go for more information, and I’ll add a link to the cybersecurity section on emerson.com for more on the tools and solutions to help our listeners in their cybersecurity efforts. Well, Mike, I wanna thank you for joining us today. I hope our listeners got as much out of this as I did. Mike: Thanks, Jim. Appreciate you having me.The podcast and artwork embedded on this page are from Emerson Team, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Emerson's Director of Cybersecurity, Mike Lester, discusses with podcast host Jim Cahill many of the issues and growing threats companies face, as they try to maintain strong cybersecurity postures.
One of the important methods in decarbonization is carbon capture, storage and utilization (CCUS). It's a way to capture the byproduct of combustion or other processes and avoid releasing CO2 into the atmosphere. In our continuing Asia Pacific Sustainability & Decarbonization podcast series, Emerson's Willie Tan and Amy Loi join me to discuss the trends, opportunities, and solutions available to continue to grow the role of CCUS in the region. Visit the Sustainability & Decarbonization section on Emerson.com or connect with a local expert in your country in the Asia-Pacific region. Transcript Jim: Hi everyone! This is Jim Cahill with another Emerson Automation Experts podcast in our continuing Asia-Pacific Sustainability & Decarbonization podcast series. Today we're going to explore carbon capture, utilization, and storage technologies with Emerson's Willie Tan and Amy Loi. We'll look at some technologies to optimize the carbon capture process. Welcome, Willie and Amy! Willie & Amy: Thanks, Jim Jim: It's great to have you both! Willie let's start with you. Can you share a bit about your current role and some background on your experience with our listeners? Willie: I'm Willie Tan. I'm based in Singapore. I joined Emerson in 2012. I have been working under the Flow Controls business division and supporting Fisher control valve products. I specialize in hydrocarbon industries covering the O&G, LNG, Refinery, and Petrochemical industries. I'm involved in business development and technical support for sustainability and renewable energies, which are actively happening in hydrocarbon industries. Some examples include renewable diesel, sustainable aviation fuel (SAF), hydrogen, and Carbon Capture, Utilization and Storage (CCUS) which is our topic today. Jim: That's great… thanks. Amy, can you tell us about yourself? Amy: My name is Amy Loi. I am the Sales & Marketing Director for Analytical Products. I have been with Emerson for 20 years in various technical, sales, business development, and marketing roles. With the recent focus in Sustainability & Decarbonization, I have been tasked to lead the Brownfield Sustainability, which covers Emission Control, Energy Efficiency, and Carbon Capture for Asia Pacific, and participation in other sustainability and renewable energies segments such as Hydrogen, biofuels, and batteries. Our primary focus within Brownfield sustainability is to create awareness of Emerson's solution and partner with our customers towards their decarbonization journey. Jim: Thank you, Amy. So let's dive into Carbon Capture, Utilization & Storage. Since that's a mouthful to say, we'll shorten it to CCUS during this podcast. Willie, can you define and describe CCUS for us? Willie: CCUS is a process to capture carbon dioxide before it is released into the atmosphere. The CCUS can capture up to 90% of carbon dioxide emissions released from burning fossil fuels during electricity generation and industrial processes such as steel or cement production. Once the carbon dioxide is captured, it can be compressed into a liquid state or left as gas before being transported by pipeline or ship to a storage site. The carbon dioxide can be stored permanently deep underground. Alternatively, carbon dioxide can be utilized for other industrial purposes instead of storage. For example, carbon dioxide can be used for enhanced oil recovery (EOR) by injecting it into the oil and gas reservoirs. Carbon dioxide can be used in chemical industries by feeding it to algae that are then harvested and processed into biofuel. Carbon Dioxide can also be used as a chemical feedstock in Petrochemical or Chemical processes. Jim: That's great. Amy, what's CCUS's role in net-zero emission, and how does it help with carbon dioxide reduction on a large scale? Amy: Time is running out to achieve the zero-emission target by 2050. CCUS could be a game-changer. The CCUS can be added to various industrial facilities iden...
Emerson's Martin Van Der Merwe joins podcast host Jim Cahill in part 2 to discuss the trends, challenges, and solutions in growing hydrogen's role in the Asia-Pacific region's energy mix.
Martin Van Der Merwe joins Jim Cahill as part of our Asia-Pacific Sustainability & Decarbonization podcast series to discuss the trends, challenges, and solutions for hydrogen as an energy carrier in the region.
Emerson's Tanner Erickson joins podcast host Jim Cahill to discuss the transition for SCADA (supervisory control and data acquisition) systems and the advantages and disadvantages in comparing on-premise and cloud-based SCADA systems.
Companies across the globe are placing a much greater focus on sustainability and decarbonization in their manufacturing and production processes. This is true across the Asia-Pacific region. In this initial podcast in our Asia-Pacific Sustainability & Decarbonization (S&D) series, I'm joined by ARC Advisory Group's General Manager for Southeast Asia, Bob Gill and Emerson's Director of Strategic Planning, Sustainability & Decarbonization for Asia Pacific, Pravin Raj to discuss the trends, practices, and technologies that companies are following to drive their strategies. In this episode, we explore Emerson's Sustainability Framework, key factors driving S&D initiatives, types of transformations, emissions management strategies, early successes, lithium battery & hydrogen production trends, and some of the technologies to enable these initiatives. Visit the Sustainability & Decarbonization section on Emerson.com and connect with Emerson's Asia-Pacific Sustainability & Decarbonization experts in your country. Transcript Jim: Hi everyone. This is Jim Cahill with another "Emerson Automation Experts" podcast. Globally, we are seeing an increasing emphasis on sustainability & decarbonization as countries, corporations and communities further define and implement their roadmaps to achieve net zero / carbon neutrality and operate in a more sustainable way. At the moment, this is nowhere more apparent than in Asia Pacific. Based on a Bloomberg NEF report, out of the $755B the world invested in low-carbon technologies (e.g. renewable energy, electrified transport, hydrogen, carbon capture, sustainable materials, etc) in 2021, 42% of that was invested in China, Japan, India and Korea alone, with China increasing its investment by 60% compared to the prior year. We are launching an Asia Pacific Sustainability & Decarbonization Podcast Series to take a closer look at trends in the region and to discuss with experts on the technologies and applications that are key to enabling companies to achieve their decarbonization goals. Today, in the very first of this series of podcasts, I'm joined by Pravin Raj, Director of Strategic Planning, Sustainability & Decarbonization from Emerson Automation Solutions Asia Pacific and Bob Gill, General Manager for Southeast Asia for the ARC Advisory Group, to discuss the sustainability and decarbonization trends we are seeing in the Asia Pacific region and how Emerson is supporting our customers in this space. Welcome Pravin and Bob! Pravin: Hi Jim and Bob. Excited to be here. Bob: Hi Jim and Pravin. Glad to be part of this discussion. Jim: Pravin, it's great to have you here with us. Let's begin by asking you to share your background and path to your current role with our listeners. Pravin: Thanks Jim. I am based in Singapore, and I manage both Strategic Planning and Sustainability & Decarbonization for Emerson Automation Solutions Asia Pacific. Prior to joining Emerson in Singapore, I was based in the United Kingdom and Azerbaijan, where I worked as an Offshore Installation Engineer and later as a Project Manager, responsible for leading the engineering, design, procurement, construction and commissioning of offshore oil & gas platforms. Empowering a more environmentally responsible planet is ingrained in Emerson's purpose. I am inspired and passionate about how we help customers across some of the world's most essential industries make measurable sustainability progress, and am grateful that I can contribute towards that in my current role. Jim: Thanks Pravin …And Bob, could you also give us a brief intro about yourself? Bob: Yes, sure. I manage ARC Advisory Group's business operations and market research activities in Southeast Asia. ARC provides technology research, advisory and consulting services to industrial automation and software suppliers as well as to end-user companies in the manufacturing, infrastructure and energy sectors. And certainly, at ARC,
Andy Coxall joins podcast host Jim Cahill to discuss the challenges in tailings management, the problems with valves not suited for this severe-service application, and why severe-service knife gate valve technology such as the Clarkson KS1 is the best choice for these challenging slurry applications.
Lion Street's Bob Carter and Jim Cahill talk about what has made their company successful and why joining forces with Integrity is the right move.
Emerson's Knut Riegel joins podcast host Jim Cahill in this Emerson Automation Experts podcast to discuss motor operated valves and the information that can be extracted to improve performance.
In this special Emerson Automation Experts podcast, BayoTech's General Council and Head of Policy, Andrew Leedom joins Jim Cahill. They discuss BayoTech technology innovations in modular, smaller scale & localized hydrogen production, the reduction in carbon intensity, and policies here in the U.S. at the federal and state levels to continue to foster hydrogen's increasing role as an energy carrier.
John Lucero and Vanessa Cahill are joined by Jim Cahill to discuss the latest entry in the Metroid series, Metroid Dread. Listen in as the crew delve deep into it and see how it compares with the other Metroid game we covered last year, Super Metroid! Support us on Patreon! Logo by Vanessa Cahill. Theme […]
Aurélien Tissot joins podcast host Jim Cahill in this Emerson Automation Experts podcast to discuss the topic of emissions and the technology opportunities for manufacturers and producers.
David Leavitt joins podcast host Jim Cahill to discuss how triple-offset isolation valves improve storage terminal reliability while reducing overall lifecycle costs compared with other isolation valve technologies.
In this Storage Terminal Reliability podcast, Emerson's Dag Joraholmen joins podcast host Jim Cahill to discuss how corrosion monitoring can reduce the need for reactive maintenance and increase the overall reliability of storage terminal operations across the production lifecycle.
On the Kula Ring podcast this week, we had the opportunity to speak with Jim Cahill, the Chief Blogger and the Head of Social Marketing at Emerson Automation Solutions. Since 2006, Jim has been cultivating Emerson's social media presence and digital brand. Over his 33-year career at the company, Jim has witnessed a lot of change in marketing, starting with the introduction of internet marketing in the mid-90s, ‘Web 2.0', and most recently how the pandemic shook up the marketing industry as a whole. Listen to Jim as he shares his industry knowledge on the best social media tactics that manufacturing marketers can implement to build connections with their audience and create social media content that drives sales.
Podcast host Jim Cahill is joined by Emerson's Michael Tworzydlo to discuss the role of operational analytics to ensure operational health and optimize plant-wide performance by detecting abnormal behavior of processes and assets, identify root causes of problems, and predict future performance.
Emerson's Nicolas Marti joins Jim Cahill in this Emerson Automation Experts podcast to discuss some of the challenges and opportunities in the fuel cell manufacturing process.
In this podcast, Emerson's Kristin Steiner and Adam Thompson joined Jim Cahill to discussed the MyAssets digital toolset, as one of the components of the MyEmerson Personalized Digital Experience. MyAssets provides a single location where you can instantly access a digital installed base record of devices – smart and non-smart – at your plant, regardless of manufacturer.
We welcome Jim Cahill to EV Chat for Episode 5. Jim currently oversees the Northwest Operations for Sunrun and has been with the company for almost three years. Previously, he spent 10+ years growing SolarCity and transitioned to Tesla for several years after the acquisition of SolarCity. Prior to joining SolarCity, Jim was co-founder and ran operations for Clean Fuel Connection, Inc. from 1999 to 2008 (founded with his partner Enid Joffe, EV Chat Episode 3 guest) which installed Electric Vehicle Supply Equipment (EVSE) for many OEMs including Toyota, GM, and Honda. Prior to Clean Fuel Connection, Jim worked for Edison EV helping to install public and residential EVSE for the GM EV1.In this episode, we cover several key topics including:The Latest at Sunrun Vivint [3:45 - 5:00]V2G [5:15 - 6:15]Off Grid & Peak Demand/ Peak Load Shaving [6:35 - 8:25]EV Battery Standardization [8:40 - 9:20]Smart Homes & Cloud Communication [9:20 - 10:42]Global Adaptation [10:43 - 12:55]EV Permitting Woes [13:05 - 14:10]EV Lessons Learned [14:10 - 16:35]Uptime Availability and EV Reliability [16:40 - 18:30]Which EV is Jim most excited about? [18:35 - 20:00]Reminiscing on the EV1 [20:10 - 21:10]Jim's Funniest EV Moment [21:15 - 23:02]Funding for EVSE Infrastructure [23:05 - 24:55]How Would Jim Spend 5 Billion in the EV Industry? [25:11 - 26:10]The US Post Office & Fleet Incentives [26:16 - 27:20]And lots more!Connect with Jim on Linkedin. Subscribe To EV Chat and never miss an episode!EV Chat Podcast *Available on iTunes, Google Play, Spotify & more.Thank you for tuning into EV Chat and thank you to our sponsor, 365 Pronto! We will see you back here for our next episode.For all inquiries: rue@365pronto.com
In advance of a May 20 webinar, Roadmap to the Autonomous Plant, Joe Perino, Principal Analyst with LNS Research join Jim Cahill in this podcast to discuss the path to autonomous operations.
Your Terminal Management System (TMS) handles all the data and business logic required to secure site access to load (or unload) vehicles. The TMS communicates directly with a wide array of physical devices from gate controls to preset batch controllers, with the latter automating and controlling product flow. It plays a large part in your midstream process management and business strategy, as well as how efficiently your operation functions. Effective TMS is measured by how quickly vehicles and vessels move in and out of the storage terminal facility. Also, how it's tracking both current inventory and the commercial transactions. Additional truck leads to increased revenue. Optimizing this process is one of the first steps when looking to reducing costs and improving profitability In this Optimizing Storage Terminal Capacity podcast series podcast, we are joined by Emerson midstream oil & gas expert, Ryan Thompson. Ryan highlights common challenges that terminal operators face, and how Emerson's TerminalManager is designed to address these challenges. Emerson's TerminalManager can help: Reduce truck turnaround times Implement faster queuing and truck tracking Track accurate delivery inventory and report distributions Ensure quality control impacted by blending ratios Support device compatibility Reduce human-error that comes with manual processes Visit the Optimize Terminal Capacity section on Emerson.com for on ways to maximize capacity yield and meet Top Quartile benchmarks through greater volume deployment, inventory turnover and revenue capture. It's time to put your TMS to work. We invite you to learn directly from our experts by tuning into other episodes in our Storage Terminal Capacity podcast series. Transcript Jim: Hi, everybody. I'm Jim Cahill. And welcome to another edition of our "Enabling Storage Terminal Capacity" podcast series. Today I'm joined by Ryan Thompson to discuss ways to achieve optimal truck and rail unloading rates to help improve operational capacity. Welcome, Ryan. Ryan: Thanks, Jim. Great to be here. Jim: Well, it's great having you here. Can you share with our listeners your educational background and path to where you are today as a senior manager in Emerson's Midstream Oil & Energy industry group? Ryan: Sure. I started out with a degree in petroleum engineering from Texas A&M University and took a bit of turn by getting into the IT consulting industry first with Accenture, and then later joined Deloitte Consulting. I made my way back into the oil and gas field in 2008, more specifically into Midstream, and I've been there ever since. I originally focused on pipelines and commercial applications, but now I put all of my energy into terminals and operations management. Jim: Well, that's great and that's a really interesting background with the IT consulting part in that, so that probably really helps as you work with terminal operators. So, can you tell us about a common challenge in the storage tanks and terminals industry today? Ryan: Yeah. A common challenge that I see is a constant push to do more with less. And what that translates to is improving profitability while at the same time reducing manpower, and this inherently leads us to process automation. And with a terminal management system, often called TMS for short, there are opportunities to impact both sides of that P&L equation. The very nature of a TMS system makes it both an interesting and critical piece of the solution. It's really where the rubber meets the road so to speak. The Emerson TMS called TerminalManager handles all of the data and business logic required to secure site access and handle loading and unloading activities. TerminalManager communicates directly with a wide array of physical devices, and that is from gate control to weigh scales, to preset batch controllers, with the ladder automating and controlling the product flow,
Thomas Nichley joins Jim Cahill to discuss ways to better control inventory and use data more effectively and efficiently to optimize operations in your terminal.
John Lucero, Vanessa Cahill, and Jason Arriola are joined by Jim Cahill to talk about the original The Legend of Zelda. It’s the 35th anniversary of this momentous game and we dig in deep to celebrate one of the most important games in the history of the industry! Here’s the comparison video that Clyde Mandelin made about the […]
Emerson’s Manuel Arroyo, Director, Oil & Gas Industry Programs kicks off this podcast series with host Jim Cahill by highlighting some of the risks & challenges and previews some of the technologies that can help you make the right operational decisions to achieve terminal profitability.
Many refineries and oil terminals are located beside major stretches of water, either sea or river, to provide a cost-effective transportation route for incoming crude oil and feedstock, and for outing finished products. If left undetected, a hydrocarbon leak resulting from corrosion in a jetty line will go straight into the local water sources causing serious environmental damage to the local ecosystem and to company reputation. Using continuous corrosion monitoring to proactively collect data on pipe integrity over time, operators can avoid environmental incidents, as well as increase operational performance, reduce unplanned outages, limit personnel in hazardous locations, and reduce the need for reactive maintenance. In this storage terminal safety podcast, we are joined by Emerson's Jake Davies to talk ways we're helping industry leaders keep an eye on corrosion and erosion with innovative continuous and remote corrosion monitoring technologies Visit the Storage Terminal Safety and the Corrosion & Erosion Monitoring sections on Emerson.com for more on the technologies and solutions to help you drive safer, more reliable, and more efficient terminal operations. Transcript Jim: Hello, everybody. I'm Jim Cahill with the Emerson Automation Experts blog. And as part of our continuing podcast series on enabling storage terminals safety, I'm joined today by Jake Davies. And Jake is a director of Global Product Marketing for Emerson's Corrosion and Erosion Solutions business. We'll be discussing ways to monitor for corrosion in storage, terminal, jetty pipelines, and other spots. Welcome, Jake. Jake: Thanks for having me, Jim. Great to be here. Jim: Well, it's great to be doing this. Let's begin by having you share with our listeners your educational background and path to your current role. Jake: Sure. Okay. It's a long path, but it started with, I guess, a formal university education in engineering. I had a little time in industry, not the process industry, but more electronics. And then I went back to university and did a Ph.D. in ultrasonic engineering. And then after that, and in fact, while I was doing my Ph.D., a Ph.D. colleague of mine was researching some corrosion monitoring opportunities. And that actually led, just as I finished my Ph.D., to the formation of a startup company which was called Permasense. So, I joined that after my Ph.D. And really, at that time, we were two people. So, I did a lot of different roles ranging from customer support, design, engineering, supply chain management, production. I used to make some of the equipment myself. So, I really did a lot of roles in that startup as you can imagine. And that startup became very successful. The technology was well adopted by the oil and gas industry. And in fact, that company was acquired by Emerson in 2016. So, that's when I came into Emerson. And since then, we have joined that acquisition with Emerson's wider Corrosion and Erosion monitoring portfolio. And effectively, I look after that portfolio in Emerson and now. Oh, and on the way, I did an MBA as well. I forgot to mention that in terms of educational background. So, yeah. I guess quite well-educated, but a lot more experience in, I would say, hands-on getting the job done. I learn more that way I think. Jim: Yeah, it sounds like you're a full-fledged entrepreneur to, you know, a startup company with two. I can imagine everything from helping drive some sales and supporting the customers and everything probably to pushing a broom at the end of the day to clean the dust down around there. Jake: Yeah. Yeah. I think that sums up the range pretty well, yeah. Jim: Yeah. That's a tremendous background. So, let's get into it a little bit. I know one of the things that terminals would be concerned about are hydrocarbon leaks caused by equipment failure and some other things. So, what are some of these types of issues, and what can be done to help mitigate some of ...
The effects of the coronavirus became real for Dr. Jim Cahill, an orthopedic surgeon practicing in Hackensack, New Jersey. While managing his practice’s patient load as restrictions were being lifted, he contracted COVID-19 himself. In this episode, you’ll learn where reputation marketing fits in for practices, how it helps patients make better choices, and how to keep abreast of potential COVID surges that can affect your practice. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen/
The effects of the coronavirus became real for Dr. Jim Cahill, an orthopedic surgeon practicing in Hackensack, New Jersey. While managing his practice’s patient load as restrictions were being lifted, he contracted COVID-19 himself. In this episode, you’ll learn where reputation marketing fits in for practices, how it helps patients make better choices, and how to keep abreast of potential COVID surges that can affect your practice. This conversation is brought to you by P3 Inbound. See acast.com/privacy for privacy and opt-out information.
Emerson's Manasi Menon joins Jim Cahill in this 23-minute operational analytics podcast to discuss how organizations are putting these analytics into action to help improve performance in safety, reliability, energy & emissions, and production.
In this episode we discuss the Ikelite Olympus TG-6 package, stony coral tissue loss disease, and some history of New England diving. The Ikelite Olympus TG-6 package comes with the Olympus TG-6 camera, the Ikelite housing, the action tray II with left handle, RC1 TTL (Through the Lens) receiver, a fiber optic cord, the Ikelite DS51 strobe and the compact ball arm for quick release. The camera features four underwater modes – normal, wide, macro, and microscope with 3 filter settings including shallow, mid and deep. You can add a 3 or 6 inch wide angle dome port. The camera shoots both JPEG and RAW formats. If you want to edit RAW images, you can download the Olympus Workspace application. You can edit JPEG in your favorite editing software. Stony coral tissue loss disease was first detected in Florida in 2014 and has spread to Jamaica, the Mexican Caribbean, St. Martin, St. Thomas and the Dominican Republic. It is suspected to be caused by bacterium but still not definitive. You can get a great deal of detail on stony coral tissue loss disease on the Atlantic and Gulf Rapid Reef Assessment (AGRRA) program website https://www.agrra.org/coral-disease-outbreak/. This outbreak is different because of the number of coral species effected, its high prevalence, rapid mortality, the high rate of transmission, its large geographic area and the long duration of the outbreak. Interventions include topical application of chlorine and amoxicillin, epoxy, amputation or relocation. Jim Cahill was a New England diver who is one of the pioneers of scuba diving in the United States. An original Navy Underwater Demolition Team member who started a salvage business after getting out of the Navy. He is credited with being a co-founder of NAUI, an original member of the Boston YMCA Sea Rovers and started New England Dive. Some of Jim's adventures are recounted in a book written by his brother, Robert Ellis Cahill, titled "Diary of the Depths". This book has some interesting stories. A couple of chapters are stories by Frank Sanger and double amputee diver who worked with Jim. You can read about the early days of salvage diving including a highly publicized murder case in MA, recovery efforts on a jet that crashed in Boston Harbor and the Texas Tower in the Atlantic.
Kendall Beushausen Emerson's Kendall Beushausen follows up his 5 Questions for Operational Certainty Consultant Kendall Beushausen podcast with this in-depth FIRSTHAND: Operational Certainty in Pod podcast. Kendall describes how the Internet of Things is all around us in our personal lives and how it is being applied in the manufacturing industries to improve business performance in many areas, especially reliability. We hope you'll enjoy this episode and will consider subscribing to the whole FIRSTHAND: Operational Certainty in Pod series on your iOS or Android mobile device. Transcript Jim: Hi everyone. This is Jim Cahill. And welcome to another edition of FIRSTHAND: A conversation with an operational certainty consultant. Today I'm joined by Kendall Beushausen and he's an Operational Certainty consultant based in South Carolina. You may have heard the earlier podcast on Kendall. He has a wealth of experience both in the Navy—the United States Navy—as well as some other companies before joining Emerson 11 years ago. And he has a wealth of experience in reliability. And today we're gonna talk a little bit about digital transformation and how that intersects with reliability. So welcome to the podcast, Kendall. Kendall: Thanks, Jim. Jim: All right. Let's start out by can you tell our listeners what is the internet of things and industrial internet of things which also go by IoT and IIoT? Kendall: Well, Jim, in the simplest form, IoT or IIoT is the idea of connected devices and, as you know, today we're living in a world with many, many devices that are connected to the internet, so to speak. Differentiating IoT and IIoT, IIoT is specifically to the industrial world, so it's industrial internet of things. Jim: You often hear with that digital transformation, so how would you describe digital transformation? Kendall: Digital transformation to me is simply what we do with these connected devices. The connected devices provide a wealth of information that make our lives easier, more convenient, etc. But what we do with that information is ultimately how our lives have changed and that also applies in the industrial world. How can this technology make our business better, easier, faster, safer? Jim: You know, I know it's all around us in our personal lives, even this podcast we're doing, people can subscribe to it, have it come to them, listen through their Bluetooth in their car, it's all in there. Can you share some examples maybe of digital transformation occurring in our personal lives? Kendall: Absolutely. Well, you hit on the podcast as an example, but I mean, let's talk about something as simple as the telephone. Twenty to 30 years ago, everyone had a landline in their house, and you had to run to the kitchen to answer the phone when it rang. Now we have these devices that we carry with us wherever we go, and not only can we call somebody on these phones, there's multiple means of communication through different applications such as texting, Facebook, Instagram, Twitter. These all have different levels of involvement or complexities, let's say. But ultimately, the communications that we used to have 20, 30 years ago has significantly changed, we don't have to wait for somebody to get home to talk to them. We can send a message to find out if they're available to chat on the phone. Also on this phone, let's consider television or entertainment. When I was growing up, there were three stations, ABC, NBC, and CBS, and you can watch whatever you wanted as long as it was on their schedule. But today, we can use this same device to stream whatever show we want and as what's common now is binge-watching. So it's improved by entertainment world for those that are into movies and sitcoms, etc. Another good example is our health. I have several apps on my phone that help me track my health and my wellness through different applications. Some of them are exercise applications.
Podcast: Emerson Automation ExpertsEpisode: 5 Questions for Cybersecurity Expert Jaime FoosePub date: 2019-07-08Emerson’s Jaime Foose joins our continuing podcast series, 5 Questions for an Emerson Expert. Jaime is an ICS cyber security expert, Director of Security Solutions and Lifecycle Shared Services. She helps power producers and water & wastewater utilities with programs and processes to improve their cyber defenses and the ongoing health of their distributed control systems & operational technology (OT). https://www.emersonautomationexperts.com/wp-content/uploads/2019/07/Jaime-Foose-5-Questions.mp3 We hope you enjoy this podcast episode and will subscribe to the Emerson Automation Experts podcast series on your iOS or Android device. Transcript Jim: Hi, everyone, and welcome to another edition of “5 questions for an Emerson Expert.” Today, I’m joined by Jaime Foose. Jaime is a Director of Security Solutions and Lifecycle Shared Services in our Power and Water Solutions (PWS) business unit. Jaime received her bachelor’s degree in computer science with a minor in Mathematics, as well as also attaining an MBA and a Master of Science in IT project management. Wow. That’s an impressive academic career. Welcome, Jaime. Jaime: Thanks, Jim. It’s great to be here today. Jim: Well, it’s great having you. So I always like to start out because some of the courses, computer science, mathematics, and then some business and some IT, all in there. So what made you decide to pursue a STEM-based career? Jaime: So, Jim, I’d always had an interest in computers, but my college career didn’t start out there. I started in another science field. Actually, because when I was in eighth grade, I had a teacher that had told me he didn’t think I’d be able to pass college-level calculus. And that had always stuck with me for a really long time, so much so that I didn’t pursue computer science. In the summers, when I was going to college, I worked for Kelly Temporary Services, and I ran into a lady that worked for a gas company, and I was working as an admin that summer. And I told her about my college background in history and this teacher that had really gotten in my head. And she really encouraged me to pursue my dream and really chase doing computer science. So I went back to school that fall, changed my major to computer science, made it through all the calculus courses just fine, and ended up finishing with my computer science degree, just one semester extra to do that. And then found that it led me here to Emerson. So it was a really fantastic change that I made. Jim: Well, that’s a great story. It’s nice that there was a person along the way that spurred you on and overcame some negative about how difficult it was or whatever. I hope other people are a force of being positive with other younger people to encourage them along. So from there, I guess with that background, what led you to a career in the field of process automation, and I guess more specifically, in your area, cybersecurity for control systems? Jaime: Sure. So when I first started, I don’t think I really even realized what industry I was getting into. I used the placement services of the university I attended for job placement and actually interviewed with Westinghouse at the time. And so, this was right when PWS had just been acquired by Emerson. And in my hometown, Westinghouse had a fantastic name. And if you got offered a job from Westinghouse, you took it. So I had this great interview with a great company. I didn’t really know all that much about process automation, but I knew it was a good company. And that’s how I joined. When I first started, I worked on communication interfaces, and just did a lot of different work in a lot of different areas, but always seemed to gravitate towards new things or things that were just a little bit more challenging or tricky. So in 2008, we saw a big increase in cybersecurity concerns around power generation. And this was really in tune with when NERC CIP [North American Reliability Corporation Critical Infrastructure Protection] started making regulatory obligations, you know, requirements for power generators. And we started seeing this in the business and coming in through different requests for proposal. And so I took on that challenge to try to understand what exactly was going on in our industry. You know, for a long time, cyber had been a problem for financial industries and retail industries, but now was really hitting home in power. I felt like this was an area that I could dig into and really help, not only ease the burden for our customers, but also for our company as well. And that’s kind of how I ended up in cybersecurity realm. Jim: Well, that’s great. And we’ll have a follow-on podcast, at some point, to dig more into that specific area. But for right now, tell us about a recent challenge that you’ve been working on to solve. Jaime: Sure. So, a recent challenge that’s facing, not only our customers, but also Emerson as a whole is this idea of what’s called a Transient Cyber Asset. And so what that means, these are devices, computers, USB sticks, or other electronic equipment that come and go on the control system. So it might be like a maintenance laptop or the USB stick a field service engineer has in their pocket. In power space, our customers are now required to apply some base level security controls for those devices and implement them across their different systems to make sure that, for any devices entering into the control system network, there’s some core security controls. So, for our customers, that means they have to inventory everything, not only internally, but also systems that their vendors bring on site. And then make sure that their vendor systems are secured and able to work on the control system. This is a really big challenge for us in field service area, because up until now we’ve been very accustomed to using our own Emerson provided laptops to perform this type of work. And we’ve been able to do this for upgrades or other maintenance activities. Now we have to figure out, not only how can we continue to do our job effectively and efficiently, but do it under these new controls and restrictions of using a Transient Cyber Asset. So, not only we’re working right now to figure out how that impacts Emerson and what types of things we can put in place to help our customers, we also have several jobs with customers right now helping them inventory their Transient Cyber Assets, and apply some basic cyber controls. The standard for this goes into effect on January, so we’re starting to really see a big uptick in concern around Transient Cyber Assets. Jim: Well, yeah, that sounds like it really raises the degree of difficulty, just from, it’s one thing to secure everything that’s known and fixed and part of the control system, but when you have these electronic devices and USB sticks coming and going, that really sounds challenging and a meaty problem to be working on. So enough about all this about automation, cybersecurity, and all this. So once we get outside the world of process automation, what do you enjoy doing in your spare time? Jaime: I have two little girls. They’re 9 and 10, so they really keep me busy. They love to swim, actually, we all love to swim, so we spend a lot of time at the pool, especially, it’s been pretty hot here in Pittsburgh lately, so we’ve been doing that. Also, spend a lot of time at the movies. We’re big Marvel movie fans. And so we’ve been busy this spring and summer catching up on all of that. And when we’re not doing that, we participate in Community 5K races as a family and with friends, now, whether we’re walking or running, just some community engagement, and trying to stay healthy. We do some volunteering as well with the Light of Life Rescue Mission for the women and children’s program. So I spend one Tuesday a month down there. And then we’ve also been working as volunteers with the Agapao Ministries, they are serving the refugees that have been placed here in Pittsburgh. So, some fun and volunteering and exercise all rolled into one, is what keeps us busy in the off time. Jim: Wow. That sounds like busy. So staying healthy and fit, and volunteering your time, and all of that, that’s really great. And I guess the final of the 5 questions, we have a lot of newcomers joining our ranks both in our world of process automation and power producers, and other manufacturing industries, and everything else. So what advice would you have for someone new coming into the field, I guess, especially around the area that you see in cybersecurity? Jaime: Advice I’d give to anyone new coming into this field or any field really is to follow your passion. Don’t let other people, you know, tell you what you can and can’t do. Certainly, set your mind to what you’d like to accomplish and work hard. I can’t stress enough, you know, being the hardest worker in the room and really putting your full self into it. Specific to the field of cybersecurity or process automation, I think it’s actually a fantastic field where you can have an impact on the critical infrastructure of the world. When you think about the systems that we’re securing, you know, they’re helping to provide energy and water, and really maintaining our way of life as we know it. Every night when we go home, the air conditioning is on, the lights are on, we have clean drinking water. Securing those systems and making sure that they are protected from attack is really a noble, noble cause that people can join in and make a difference. And so, it’s an exciting field. It’s always changing. Every day there’s something new. And so for folks that are interested in staying up to date with the latest and greatest, and never getting bored, cyber and process automation is a great place to be. Jim: Wow. It sounds like, yeah, everybody knows if the power is not making its way to their house, or there’s a problem with the water or something else. So, yeah, this may be the noblest of noble causes. Well, thank you so much for joining us today, Jaime, and I look forward when we do round two here in a little while. Jaime: Thanks, Jim. Me too, looking forward to it. End of Transcript Visit the ICS Cyber Security section on Emerson.com for more ways to protect your distributed control system and other elements of your operational technology infrastructure.The podcast and artwork embedded on this page are from Jim Cahill, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
We talk with Sacramento Republic Fc Coach Simon Elliott and Players Ray Saari and Adam Jahn, postgame, against Phoenix and Reno. Simon Elliott talks about execution and being clinical in the final third and anticipation needed to capitalize on opportunities. Adam Jahn talks about coming back to Sac to play and Ray Saari talks about depending on teammates. The Jim Cahill, from Sierra at Tahoe and Kirkwood, talks with us about helping purple hearts earn medals and the DeCelle Memorial Relay. It is the oldest relay race in the USA and it goes around Lake Tahoe on June 8th!
Emerson's Sudhir Jain joins us in this FIRSTHAND Operational Certainty in a Pod podcast as a follow up to our earlier 5 Questions for an Emerson Expert podcast with Sudhir. As an Operational Certainty consultant, he shares some of the oil & gas applications for operational improvements and describes how he works with clients to improve overall performance and sustain it over time. We hope you'll enjoy this episode and will consider subscribing to the whole FIRSTHAND: Operational Certainty in Pod series on your iOS or Android mobile device. Transcript Jim: Hi, this is Jim Cahill with another edition of "FIRSTHAND: Operational Certainty in a Pod." Today I'm joined by Sudhir Jain. You may have heard our earlier "5 Questions for an Emerson Expert" podcast with Sudhir. Today we'll explore how he works with clients to improve business performance in their production and manufacturing operations. But first, some background. Sudhir is a process automation and digital transformation specialist on our Operational Certainty Consulting team. And he works with clients in the oil and gas refining, petrochemicals and chemicals and life science industries. He has over 35 years of process automation experience and has been with Emerson for over 20 years. He has a Bachelor of Engineering degree in instrumentation and control engineering and an MBA. Welcome, Sudhir. Sudhir: Thank you, Jim. Jim: All right. Well, let's start out, how do you typically first get engaged with our customers in solving their operational challenges? Sudhir: We do go to various trade shows. And, you know, we have our application suites on the web, as well as we have the field salesforce, like our Impact Partners and our account directors. So, whenever they hear about the applications or solutions which we can provide at operational certainty consulting, they basically contact us to meet with the customer or to talk to the customer. Jim: So, once you've gone through the introductions, how do the projects typically begin? Sudhir: Well, once our salesforce finds the opportunity for the applications which we do, they connect us with the customer. And we either meet on the WebEx meeting or face to face, and during face-to-face or any other discussions, we find out what are the customer objectives for the application he's looking for, because most of the time in oil and gas upstream as well as downstream, which is my focus right now, we see that there is a little difference of the process workflow which they have. And that's where we find out what are their objectives, can we meet their objectives, and if we can, then address them during the meeting to engage him more deeply. Jim: What are some of these applications that you help them with? Sudhir: Today, the upstream applications are common, whether it's conventional or unconventional. But in North America our focus is more on unconventionals, because that's what is more engaging nowadays. Most of the unconventional fields, since they are fracking, we find that they have to use an artificial lift whichever way they want to. So, we provide the solution for artificial lift optimization, for example, gas lift optimization. In our applications, we have some of the good experience in dynamic lift optimization which can use either gas or the ESPs [electric submersible pumps] or beam pumps, whatever customer is using. Jim: Okay. And when you work with them, I guess a lot of times you're bringing in some new technologies that might not be familiar with them. How do you familiarize them with new technologies you might be introducing in a solution? Sudhir: Yeah. Well, most of the time, customer expect us to talk about systems and control systems. But the applications which we are talking are more of software solutions, and these are not product. These are customized to the customer requirement but have a standard implementation process. So, we have created some of the simulated demos.
Jason Arriola, Vanessa Cahill, and John Lucero head back to the Street Fighter universe. This time, we’re looking at Street Fighter: The Movie. Let’s just say opinions feelings have flipped from the last episode. Also, stay tuned for a special guest appearance towards the end! Like what you hear? You can support us on Patreon, listen to us on Apple Podcasts, Google Play, Stitcher, Spotify, […]
Emerson's James Beall joins our continuing podcast series on 5 Questions for an Emerson Expert. The goal of these podcasts is to share some tidbits on how they got their start in a science, technology, engineering & math (STEM)-based career and more about their background, interests and advice for new folks joining our world of automation. James provides Control Performance Consulting and hands-on implementation for control improvement projects in the chemical, refining, upstream oil & gas and the pharmaceutical industries. Some of his key areas of expertise include instrumentation and control valve performance, advanced regulatory control and advanced multivariable control. Leave a comment below, send me an email or LinkedIn message if there is an Emerson expert you'd like me to interview as well as the questions you'd like me to ask them… thanks! https://www.emersonautomationexperts.com/wp-content/uploads/2017/07/5-Questions-James-Beall.mp3 Transcript Jim: Hi, I’m Jim Cahill and welcome to our “5 Questions for an Emerson Expert” podcast series. Today I’m joined by James Beall. James is a principal process control consultant with more than 35 years of experience in the industry and in process automation. Welcome, James. James: Hi Jim, how you doing? Good to be here. Jim: I’m doing just great today. So, I like to start out and ask everyone what made you decide to pursue a STEM based career? You know, science, technology, engineering and math? James: Well, probably the biggest influence was the fact that my dad was a Mechanical Engineer, and of course growing up I did all things mechanical with him. He taught me from a very early age how to work on engines, cars, everything! , I was rebuilding lawnmower motors and go kart motors when I was less than 10 years old. I got involved with the mechanical engineering side of things, but in general just the engineering way of thinking. I also got very good tutoring in math! I was very strong in math with the help from my dad and enjoyed that. That’s probably the biggest influence, and then maybe the other thing is my grandfather was a medical doctor. It seemed like to me being a doctor was too much involvement with people, and back then I didn’t want to have that much involvement with people. But now I love it and I probably spend more time with people than my doctor siblings! So that’s been interesting to see that evolve. Jim: Well that’s fascinating. So what made you specifically get from that electrical engineering degree into process automation? James: I enrolled in chemical engineering but switched to electrical engineering and finished up in that degree. When I was interviewing for my first job, I saw a company in Longview, Texas called Eastman Kodak, the chemicals division, that was close to where I grew up. I thought that’d be kind of neat to go back there and there were two openings for electrical engineers: one in electrical power and one in process instrumentation, which I had never heard of. So I interviewed in both areas and when I went back at the end of the day to the engineering superintendent, he asked me which area I was interested in and I said, “Well instrumentation engineering looks really interesting,” and he leaned over at me, and I can still remember him saying, “Are you sure?” I wondered what I was getting into, but I’ve absolutely loved it. I did take a lot of chemical engineering actually along with my EE degree, and I had a good chemical engineer mentor in the instrument engineering group that really brought out the application of chemical engineering in that field. And of course, as soon as I got into instrumentation I started getting interested in control and then got involved with DCS’s and put in the first Provox system in the mid-80s and got interested in control. And went to all the advanced Emerson…well back the Fisher Rosemount Systems’ Advanced Control Seminars, and spent as much time as possible around people...
Biofeedback sounds mysterious and technical, but it’s been in use since the mid-to-late 1960’s. Today, we’ll examine Biofeedback with the help of two of our guests. Retired anesthesiologist Dr. Blossom Sanger shares how this therapy has given her much better control of her pain and her life. Jim Cahill, Biofeedback Therapist from the Scripps Center … The post Biofeedback appeared first on Dr. Paul Christo MD.
In this episode of Authority Marketing Roadmap, John Cass and John McDougall interview Jim Cahill of Emerson Process Management. Jim's Emerson Process Experts blog was named B2B Magazine's Best Corporate Blog of 2010.
A panel moderated by KCRW's Warren Olney, featuring energy journalist Lisa Margonelli, UC Berkeley energy expert Daniel Kammen, SolarCity's Jim Cahill, and LADWP general manager Ron Nichols discusses the future of solar energy in California. They agreed that solar energy has the potential to change the way the state is fueled, but that the financial and political policies need to catch up to technological advancements