The 2020 AIChE Spring Meeting & 16th Global Congress on Process Safety will now be held virtually on Sunday, August 16, 2020 from 9AM - 5PM Central Time.
You can register for any of these short courses by selecting the course title during the 2020 AIChE Spring Meeting and 16th GCPS online registration process or call customer service at 1.800.242.4363 to add the courses to your registration.
Short Course List
Click the plus sign on any of the courses below for a full description.
S6: Flammable Liquids, Vapors and Gases Training
Location: TBD
Price: $500
Instructor: Paul Osterberg, DEKRA
Book: No Book
This course is designed as a one (1) day learning experience to provide the knowledge and skills to identify, mitigate, and protect against the hazards associated with flammable liquids, vapors, or gases. Training will encompass a detailed overview of the fundamentals of flammability, test methods and interpretation, and relevant compliance standards, codes and regulations.
What You will Learn
- How to determine if a fire or explosion hazard exists within your facility.
- The minimum requirements to be in compliance with codes, standards, regulations and Recognized and Generally Accepted Good Engineering Practices (RAGAGEP)
- How to determine the validity of any existing laboratory data you might have and what test data is needed for design purposes.
- How to identify gaps in your facility's fire and explosion prevention and protection requirements;
- How to design and implement various explosion protection and prevention methods
- About different combustion events and explosions, their characteristics and the hazards they represent.
- Methods for controlling flammable atmospheres to prevent or reduce fire and explosion hazards.
- Essentials for storage of large & small (portable) quantities of flammable materials
- How to protect against the effects of explosions when control measures may not be fully effective.
Who Should Attend
- Process Safety Personnel
- Those responsible for processes handling flammable liquids/vapors/gases
- Process Engineers
- Safety and Health Personnel
- Designers of facilities that handle flammable liquids/vapors/gases
Codes, Standards and Regulations Reviewed
- OSHA 1910.106 Flammable Liquids
- NFPA 30 Flammable and Combustible Code
- NFPA 67 Guide on Explosion Protection for Gaseous Mixtures in Pipe Systems (Including new requirements of the 2019 edition!)
- NFPA 68 Standard on Explosion Protection by Deflagration Venting
- NFPA 69 Standard on Explosion Prevention Systems (Including new requirements of the 2019 edition!)
- International Building and Fire Codes (adopted by most states as a Legal Requirement)
Course Outline
- Introduction
- Fundamentals of flammability and flammability properties
- Test methods for determining flammability properties and interpretation
- Review Compliance to various Standards and Regulations
- Flammable Liquids (NFPA 30)
S7: Layer of Protection Analysis (LOPA) - Updated
Are proposed or existing combinations of safeguards enough to prevent an accident or mitigate the consequences? Do you perceive that doing a fully quantitative risk assessment (QRA) would be over-working the problem?
Then Layer of Protection Analysis (LOPA) is the new tool you need to learn. LOPA combines both qualitative and quantitative elements of hazard evaluation and risk assessment to analyze and judge the adequacy of existing or proposed safeguards against process deviations and accident scenarios. A key to the success of LOPA is its rules for judging if protection layers are truly independent. Because of these rules, LOPA helps the analysts make consistent judgments of if the risk of scenarios are “as low as reasonably practical (ALARP)”.
This “How To” course is taught by one of the principal authors of the AIChE/CCPS book, Layer of Protection Analysis (2001). The course will also bring you up-to-date on changes from the newly released Guidelines for Initiating Events and Independent Protection Layers, CCPS/AIChE (Mr. Bridges, the instructor, was the primary author of this textbook).
Workshops are used as the primary mode of teaching each aspect of LOPA. You will perform several complete LOPA before leaving class.
What You Will Learn:
- When and how to use LOPA and How to systematically create risk scenarios
- How to establish risk acceptance (risk tolerance) criteria for use within your company (this is also called development of ALARP criteria)
- How to calculate “as-is” risk for a cause-consequence pair: Estimate the frequency of the initiating event and estimate consequence
- What is meant by “independence” and “uniqueness” with respect to IPLs
- How to use LOPA to determine the Safety Integrity Level (SIL) necessary for an instrument IPL (to comply with the requirements of IEC 61508/61511)
- How other companies worldwide use LOPA to: Decide which PHA/HAZOP recommendations to reject and which to accept
- Focus limited resources within mechanical integrity departments and operations on what is critical to manage risk to ALARP
- Avoid wasting resources on quantifying risk using QRA methods • Perform specialized risk modeling for facility siting questions
Take Home:
- Comprehensive course notebook containing: Examples of risk acceptance and judgment protocols & Industry examples and solutions to all LOPA workshops
- Certificate of Completion and 0.7 CEUs & 0.7 COCs
Typical Course Candidates
This course is designed for experienced PHA/HAZOP leaders. Other individuals with a strong technical background (such as engineers and scientists) may attend:
- Managers of Operations, Safety; Project Managers; Engineers – Process, Safety, and Mechanical; PSM Coordinators and Managers
Course Outline
1-Day (9:00 a.m. to 5:00 p.m.)
Introduction to LOPA
- Learning objectives and goals of using the LOPA technique
- What is LOPA? How is LOPA applied? Definitions? When is LOPA used?
Developing LOPA Scenarios
- Selecting candidate scenarios from brainstorming hazard evaluations
- Scenarios from design questions and from incidents
Estimating the Consequence of the Scenario
- Using a look-up table of consequence; Developing a consequence look-up table for your company; Alternative methods for estimating consequences
- Workshop 1: Estimating the consequence of a scenario (part of a continuing example)
Estimating the Likelihood of the Selected Initiating Event
- Using a look-up table of initiating event categories and frequencies
- How to develop an initiating event look-up table for your company
- Addressing enabling conditions and time-dependent initiating events
- Workshop 1: Estimating the frequency of an initiating event of a scenario (part of a continuing example)
Estimating the Probability of Failure of Independent Protection Layers
- Definitions, rules, and exceptions for giving credit for an independent protection layer (IPL); Using a look-up table of IPL categories and probability of failure on demand (PFOD); How to develop an IPL look-up table
- Workshop 1: Deciding which safeguards are valid IPLs and estimating the PFOD of the valid IPLs (part of a continuing example)
Calculating the Risk
- Using a standardized LOPA worksheet; Rules for calculating risk for an individual scenario (LOPA); Rules for summing risk of related scenarios
- Workshop 1: Calculating the risk of a LOPA scenario (part of a continuing example)
Judging the Risk
- Examples of risk tolerance criteria from the industry
- Development and implementation of a company risk tolerance criteria
- Workshop 1: Judging the risk of a LOPA scenario (cont. example)
Special Applications of LOPA
- Using LOPA for facility siting questions; Selecting the SIL for an interlock
ISA Short Course: Introduction to Industrial Automation Security and ANSI/ISA 62443 Standards
Location: TBA
List Price:$815
ISA Member Price:$650
Instructors: TBD
Description:
"It gave me a general overview of how to setup security measures."
- Donald Peck, Utility SCADA Supervisor
Understanding how to secure factory automation, process control, and Supervisory Control and Data Acquisition (SCADA) networks is critical if you want to protect them from viruses, hackers, spies, and saboteurs.
This seminar teaches you the basics of the ISA/IEC 62443 standards and how these can be applied in the typical factory or plant. In this seminar, you will be introduced to the terminology, concepts, and models, as well as the element of creating a cybersecurity management system will be explained along with how these should be applied to industrial automation and control systems.
You will be able to:
- Discuss why improving industrial security is necessary to protect people, property, and profits
- Define the terminology, concepts, and models for electronic security in the industrial automation and control systems environment
- Define the elements of the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- Define the core concepts of risk and vulnerability analysis methodologies
- Define the concepts of defense in depth and the zone/conduit models of security
- Explain the basic principles behind the policy development and key risk mitigation techniques
- Explain why improving industrial security will be necessary to protect people, property, and profits
You WILL COVER:
- Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | Trends in Security Incidents
- How IT and the Plant Floor are Different and How They are the Same
- Current Security Standards and Practices
- Creating A Security Program: Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009) - Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- Risk Analysis: Business Rationale |Risk Identification, Classification, and Assessment
- Addressing Risk with Security Policy, Organization, and Awareness: CSMS Scope | Organizational Security | Staff Training and Security Awareness | Business Continuity Plan | Security Policies and Procedures
- Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control: Account Administration, Authentication, and Authorization
- Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management | Incident Planning and Response
- Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
Includes ISA Standards:
- ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007) - Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
- ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009) - Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- ANSI/ISA-62443-3-3 - Security for Industrial Automation and Control Systems: System Security Requirements and Security Levels