The Remote Access Workgroup Sessions

[vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Dec 02 – Security and Safety, Documentation and Change Management

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Dec 02″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://youtu.be/M5uLVIGIwHs”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FDec-2-Security-and-Safety-Documentation-and-Change-Management-2.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36655,36654,36653,36652,36651,36650,36649,36648,36647,36646,36645,36644,36643,36642,36641,36640,36639″ css_dt_gallery_carousel=”.vc_custom_1607384093443{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Dec 02″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]This meeting covered:

  • Details to be captured and documented when a remote activity occurs
  • Information to be collected on the proposed remote access action before allowing entry to individuals
  • Critical areas required to be recorded when applying “Change Management” in a Remote Access application
  • Security levels for individuals seeking access and why
  • Creation of a separate and isolated network (VLAN or wireless) to link to plant floor devices without going over the existing control network
  • A cellular connection to be made and approved by IT
  • Ways in which an IT group can control cellular activity
  • Automatically capture, log and store connection details to track remote access activities
  • Probability of cyber security and the need for multi-factor authentication
  • Separating Access Control from Identity, Authorization and Applications

[/vc_column_text][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_column_text][/vc_column_text][vc_custom_heading text=”Next Meeting is on Wednesday, Dec 16″ font_container=”tag:h2|font_size:162%25|text_align:left|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Review the Best Practices Document Draft

[/vc_column_text][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Nov 18 – Methodologies to Engage Beyond One-to-One

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Nov 18″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://youtu.be/35d6rd73DGE”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FNov-18-Methodologies-to-Engage-Beyond-One-to-One.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36610,36608,36607,36606,36605,36604,36603,36601,36600,36598″ css_dt_gallery_carousel=”.vc_custom_1605738723224{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Nov 18″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]This meeting covered:

  • The importance of Remote Access to plant floor equipment to make changes be restricted and controlled by an assigned administrator
  • Value of having a centralized method to coordinate the Remote activities of various individuals
  • Usefulness of having guidelines that all parties should follow when collaborating with multiple resources
  • When given Remote Access, whether it should allow general access to all equipment or restricted to only specific devices
  • Consequences of having/ not having a method that validates the individual resource is the proper person
  • Risks in leaving a connection continually open for External Access
  • Challenges caused due to the requirement of using the existing network infrastructure to reach a device
  • Consequences of having multiple users allowed to make changes when working on the same problem

[/vc_column_text][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_custom_heading text=”Action Items” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

  • The final survey questionnaire on “Security and Safety, Documentation and Change Management” is now live at https://www.surveymonkey.com/r/5WWYNBM. We request you to please submit this before Saturday, Nov 28, to give us enough time to review and include your feedback at the next meeting. This survey might take longer to complete due to the nature of the questions, so do set aside 25-30 minutes. 
  • We will have special guest speaker Eric Byers, SCADA and ICS Security Product Visionary at our next meeting. Please email us any questions that you may have related to cybersecurity for Eric.

[/vc_column_text][vc_custom_heading text=”Next Meeting is on Wednesday, Dec 02″ font_container=”tag:h2|font_size:162%25|text_align:left|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Topic: Security and Safety, Documentation and Change Management

[/vc_column_text][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Nov 04 – Validation of Assets being Connected

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Nov 04″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://www.youtube.com/watch?v=KXFRozLOPNc&feature=youtu.be”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FNov-4-Validation-of-Assets-being-Connected.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36583,36582,36581,36580,36579,36578,36577,36576,36575″ css_dt_gallery_carousel=”.vc_custom_1604968933773{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Nov 04″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]This meeting covered:

  • identification of devices that require remote connection
  • classification of devices that should/would not be connected
  • different methods used to connect these devices in the plant
  • techniques to verify if you are connected to the correct devices
  • actions required to validate that one or more devices are accurate
  • importance of having connection to several devices at one time for troubleshooting
  • discussed occurrences of connecting to the wrong the device
  • mechanisms to ensure that right device is selected

[/vc_column_text][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_custom_heading text=”Action Items” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

  • Please fill out this survey questionnaire on “Methodologies to engage beyond one-to-one” by Friday, Nov 13. The consolidated responses will be sent to you a day before the next meeting so you can review and prepare any follow up questions or provide additional feedback on our call: https://www.surveymonkey.com/r/SRC2CXY

[/vc_column_text][vc_custom_heading text=”Next Meeting is on Wednesday, Nov 18″ font_container=”tag:h2|font_size:162%25|text_align:left|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Methodologies to Engage Beyond One-to-One

[/vc_column_text][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Oct 21 – Classification of Remote Activities

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Oct 21″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://youtu.be/_1-bXwZHsPI” align=”center”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FOct-21-Classification-of-Activities.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36524,36523,36522,36521,36527,36526,36525,36520,36519,36518,36517″ css_dt_gallery_carousel=”.vc_custom_1603743388601{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Oct 21″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]This meeting covered:

  • activities that can be performed remotely
  • remote activities that require escorted access and the reason behind the escorted access
  • remote activities that do not require escorted access
  • activities that could require collaborative remote access
  • access Rules which relate to machine states
  • protocols tied to Environmental Health and Safety (EH&S) policies and other policies
  • liability impact of Remote Access

[/vc_column_text][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_custom_heading text=”Action Items” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

  • Please fill out this survey questionnaire on “Validation of Assets being Connected” by Friday, Oct 30. The consolidated responses will be sent to you a day before the next meeting so you can review and prepare any follow up questions or provide additional feedback on our call: https://www.surveymonkey.com/r/FG99L3R

[/vc_column_text][vc_custom_heading text=”Next Meeting is on Wednesday, Nov 4″ font_container=”tag:h2|font_size:162%25|text_align:left|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Validation of Assets being Connected

[/vc_column_text][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Oct 07 – Collaboration with IT

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Oct 07″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://youtu.be/CUC5-Si8Tv8″ align=”center”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FOct-7-Collaboration-with-IT.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36509,36508,36507,36506,36505,36504,36503,36502,36501,36500,36499,36498,36497″ css_dt_gallery_carousel=”.vc_custom_1602276528611{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Oct 07″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]The thought of creating a means for external individuals or companies to gain a connection into the manufacturing plant genuinely concerns most IT Managers. These systems have been purposely isolated to protect them from outside interference for many years. Isolation was developed for access from outside the plant and other networks inside the Business networks that could harm manufacturing operations. This environment is changing. As many companies adopt IIoT and Digital Convergence, there is a requirement to open the plant floor information and have a cooperative working relationship between IT and OT departments.[/vc_column_text][vc_column_text]This meeting covered:

  • the activities that contribute to a positive outcome in IT/OT interactions
  • actions that create problems in IT/OT relationship
  • different priorities that can cause a right and how can these be addressed
  • critical initial steps that can be taken to create a better IT/OT working relationship
  • challenges faced by outside company when dealing with a customer’s IT group and recommendations on how to deal with them better
  • times when an outside vendor gets permission to use another method of remote access

[/vc_column_text][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_custom_heading text=”Action Items” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

  • Please fill out this survey questionnaire on “Classification of Activities” by Friday, Oct 9. The consolidated responses will be sent to you a day before the next meeting so you can review and prepare any follow up questions or provide additional feedback on our call: https://www.surveymonkey.com/r/MKZW9FW

[/vc_column_text][vc_custom_heading text=”Next Meeting is on Wednesday, Oct 21″ font_container=”tag:h2|font_size:162%25|text_align:left|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Classification of Activities

[/vc_column_text][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Sep 23 – Current State and Stakeholders of Remote Access

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Sep 23″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://youtu.be/qygZ1J7YTro” align=”center”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FSept-23-Current-State-and-Stakeholders-of-Remote-Access.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36466,36479,36478,36477,36476,36475,36474,36473,36472,36471,36470,36480,36482,36481,36431″ css_dt_gallery_carousel=”.vc_custom_1601058805050{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Sep 23″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

  • Reviewed the responses from the #1 member survey to understand the current systems being used and the individuals involved.  

[/vc_column_text][vc_column_text]

  • Based on the feedback of the workgroup, it has been decided that the first assessment should include information on:
    • Technologies and techniques currently being used for Remote Access and Assistance
    • All individuals, both internally and externally involved
    • Target devices and assets to be supported
    • Establish what level a company is on the “Remote Access Maturity Model” (shown below)

[/vc_column_text][vc_single_image image=”36481″ img_size=”full” alignment=”center” onclick=”link_image”][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_custom_heading text=”Action Items” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

  • Please fill out this MEMBER-ONLY survey questionnaire by Sunday, Oct 4. The consolidated responses will be sent to you a day before the next meeting so you can review and prepare any follow up questions or provide additional feedback on our call: https://www.surveymonkey.com/r/B2HJZJY

[/vc_column_text][vc_custom_heading text=”Next Meeting is on Wednesday, Oct 7″ font_container=”tag:h2|font_size:162%25|text_align:left|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Stages of Remote Connectivity & Collaboration with IT

[/vc_column_text][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_color_value=”#333333″ css=”.vc_custom_1600225331120{padding-top: 0.3% !important;padding-bottom: 0.3% !important;}”][vc_column][vc_column_text]

The OMAC Remote Access Workgroup

Kickoff Meeting Review, Sep 09 & Agenda for Sep 23

[/vc_column_text][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600225338366{padding-top: 1.5% !important;padding-right: 1% !important;padding-bottom: 3% !important;padding-left: 1% !important;}” bg_color_value=”#ffffff”][vc_column width=”1/2″][vc_custom_heading text=”Watch the Recording from Sep 09″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_video link=”https://youtu.be/PmvDDOaIGSE” align=”center”][/vc_column][vc_column width=”1/2″][vc_custom_heading text=”View & Download the Presentation Slides” font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FKickoff-Presentation.pdf|target:_blank|rel:nofollow”][dt_media_gallery_carousel image_sizing=”proportional” image_border_radius=”” image_scale_animation_on_hover=”disabled” image_hover_bg_color=”disabled” slides_on_wide_desk=”1″ slides_on_desk=”1″ slides_on_lapt=”1″ slides_on_h_tabs=”1″ slides_on_v_tabs=”1″ item_space=”” project_icon_color=”#ffffff” project_icon_border_width=”0px” next_icon=”dt-icon-the7-arrow-07″ prev_icon=”dt-icon-the7-arrow-06″ arrow_bg_width=”30x” arrow_bg_height=”30px” arrow_border_width=”0px” arrow_bg_color=”#000000″ r_arrow_icon_paddings=”0px 0px 0px 0px” r_arrow_v_offset=”0px” r_arrow_h_offset=”-30px” l_arrow_icon_paddings=”0px 0px 0px 0px” l_arrow_v_offset=”0px” l_arrow_h_offset=”-30px” include=”36415,36416,36417,36418,36419,36420,36421,36422,36423,36424,36425,36426,36427,36428,36429,36430,36431″ css_dt_gallery_carousel=”.vc_custom_1600225742286{background-color: #ffffff !important;}”][/vc_column][/vc_row][vc_row gap=”35″ content_placement=”top” bg_type=”bg_color” css=”.vc_custom_1600227475668{padding-top: 3% !important;padding-right: 3% !important;padding-bottom: 3% !important;padding-left: 3% !important;background-color: #f7f7f7 !important;border-radius: 1px !important;}” bg_color_value=”#f7f7f7″][vc_column width=”1/2″][vc_custom_heading text=”Meeting Minutes – Sep 09″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]

Kickoff Meeting

[/vc_column_text][vc_column_text]

  • Discussed purpose of the Workgroup: to create a comprehensive best-practices handbook for remote monitoring services that will help manufacturing companies, OEMs, SIs and automation vendors to allow secure remote access to machines and automation systems on the plant floor.

[/vc_column_text][vc_column_text]

  • Introduced the Workgroup Members

[/vc_column_text][vc_column_text]

  • Discussed the role of the workgroup leader, Mark Fondl:
    • Facilitates and organizes agenda and necessary material for the meetings.
    • Analyzes and compiles the survey responses and meeting outcomes to create the rough draft of best practices document 
    • Be a proxy for members who are unable to attend

[/vc_column_text][vc_column_text]

  • Discussed the role of the workgroup members:
    • Informs the workgroup team leader of any topics or sub-topics that you feel are important to include
    • Reviews and provides input and feedback on the materials sent before each meeting.
    • Shares learnings (positive or negative) that may help others to gain a better understanding of specified topics.

[/vc_column_text][vc_column_text]

  • Reviewed the agenda for coming weeks:
  9 Sep Introduction, Agenda Review
  23 Sep Current State and   Stakeholders of Remote Access
  7 Oct Collaboration with IT
  21 Oct Classification of Activities
  4 Nov Validation of Assets being Connected
  18 Nov Methodologies to engage beyond one-to-one
  2 Dec Security and Safety, Documentation and Change Management
  16 Dec Review of Draft Report
  13 Jan Final Report Approval

[/vc_column_text][vc_column_text]

  • Described the process:

The Remote Access Workgroup Timeline[/vc_column_text][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1600227497488{background-color: #e8eff6 !important;}”][vc_custom_heading text=”Meeting Agenda – Sep 23″ font_container=”tag:h2|font_size:162%25|text_align:center|color:%230651a0|line_height:46px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.ei3.com%2Fwp-content%2Fuploads%2FKickoff-Presentation.pdf|target:_blank|rel:nofollow”][vc_column_text]

Current State and Stakeholders of Remote Access

[/vc_column_text][vc_column_text]We will enlist and review the various remote access methods currently being deployed and outline stakeholders involved with remote access.

Action Items:[/vc_column_text][vc_column_text]

  • If you would like us to update your picture or if your picture is not in our listing then please email it to us.

[/vc_column_text][vc_column_text]

  • Please fill out this MEMBER-ONLY survey questionnaire before Sunday, Sep 20. The responses and recommendations of this will be discussed at the next meeting https://www.surveymonkey.com/r/QQQWR2S.

[/vc_column_text][vc_column_text]

  • Distribute this general OMAC Remote Access Workgroup survey to other manufacturing companies, OEMs, SIs, and automation vendors to gather a collective view from anyone involved in remote access and outline best practices of broader acceptance https://www.surveymonkey.com/r/YCKFX2Z.

[/vc_column_text][vc_column_text]You can easily view all the questions included in the general survey by downloading this pdf document. 

Below is an email template that you can use to invite your contacts to participate in the general survey:[/vc_column_text][vc_column_text css=”.vc_custom_1600274514065{border-top-width: 0.5px !important;border-right-width: 0.5px !important;border-bottom-width: 0.5px !important;border-left-width: 0.5px !important;padding-top: 1.5% !important;padding-right: 1.5% !important;padding-bottom: 1.5% !important;padding-left: 1.5% !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-radius: 1px !important;}”]Subject: Your opinion on the use of remote access matters

Hello <First Name>,

Remotely accessing machines and other manufacturing assets has become a necessity for many in the industry but doing it safely and securely poses a range of new and serious issues. Take this latest survey and help OMAC ​develop a comprehensive handbook with best practices on allowing remote access.

Your participation will help the workgroup understand the current use of this technology, its benefits and importance. Please submit your responses by Friday, Oct 09, 2020.

If you are not the individual within your organisation best suited to complete this survey, please forward this survey for them to complete. Operations leaders and service managers will likely be most versed in this technology.
​Sincerely,
<Your Name>
<Your Title, Company Name>​

[/vc_column_text][/vc_column][/vc_row]