By using this website you allow us to place cookies on your computer. They are harmless and never personally identify you.
  • Home
  • Create Account
  • Volunteer Form
  • Conference Schedule
    • Program Schedule
  • Sponsors & Sponsorship Opportunities
    • Sponsors
  • More
    • Pay your ISSS membership
    • ISSC37 Merchandise
    • Please Donate
    • International System Safety Society
    • Photo Gallery
    • Contact Us
    • Sitemap
    • Attendee Survey
    • Sponsor Survey
  • Login
Site Logo Image
37th International System Safety Conference
Site Logo Image
37th International System Safety Conference
  • Login
Site Logo Image
37th International System Safety Conference
  • Home
  • Create Account
  • Volunteer Form
  • Conference Schedule
    • Program Schedule
  • Sponsors & Sponsorship Opportunities
    • Sponsors
  • More
    • Pay your ISSS membership
    • ISSC37 Merchandise
    • Please Donate
    • International System Safety Society
    • Photo Gallery
    • Contact Us
    • Sitemap
    • Attendee Survey
    • Sponsor Survey
  • Login

Accident Analysis and Hazard Analysis using STAMP, CAST, and STPA

ISSC37-8190

? With the increasing complexity of modern systems, traditional approaches to safety (most of which were created 50-70 years ago) are losing effectiveness and leading to avoidable losses. In this class, you will learn about a new approach based on systems theory and systems thinking. This approach a...

Analytical Techniques
Tutorials
Dr. John Thomas

Modern U.S. Nuclear Weapon System Safety Design Process and Panel Q&A wit...

ISSC37-37

The tutorial provides an overview of the U.S. nuclear weapon system safety design process and the approach taken to assess and manage system safety throughout the weapon lifecycle. Key considerations include the emergence of stringent safety requirements, the simplifying concept of assured safety im...

Walking Through the Life-Cycle
Tutorials
Dr. Jeffrey Brewer

Reconstructing Your Process Hazard Analysis for Success!

ISSC37-29

Rarely as IH/OS Professionals are we given the luxury of developing?anything from scratch and without boundaries. We typically inherit?programs and processes that have been in place for years, developed?nuances, and workarounds. Based on some of the most commonly seem violations and findings from Oc...

Resourcing to Ensure Success of the System Safety Program: Guide for Managers
Tutorials
Kelsey Forde

An Examination of the Implications of 2017 Revisions to General Criteria for ...

ISSC37-4589

Undergraduate engineering degree programs in the United States as well as some other countries are accredited with reference to general criteria (which must be met by programs in all engineering disciplines) and program-specific criteria (which apply to a single engineering discipline (e.g., chemica...

Case Studies drawn from the World of System Safety
Tutorials
Dr. Rodney Simmons

Pulling the Thread: Hazards Analyses from Start to Finish

ISSC37-31

A "thread analysis" is a method to ensure identified hazards are analyzed and controlled. Hazards analysis can be?intimating ? a mistake can literally be a life-or-death issue. What happens if a hazard is missed? What happens if a?hazard is mistakenly characterized? What happens if a hazard isn't ad...

Keeping the System Safety Program On-Track
Tutorials
Kelsey Forde

System Safety Management

ISSC37-8597

This tutorial teaches fundamentals of system safety management with practical applications of establishing and maintaining a system safety department within an organization, and the use of standard recognized system safety tools to plan projects. Use of Preliminary Hazard Lists, Work Breakdown Struc...

System Safety Program Planning
Tutorials
Mr. Russell Mitchell

Cyber Safety and Security

ISSC37-50

? Safety and Security are two characteristics that are required in many systems simultaneously, such as in critical infrastructure like air navigation or public transport. The need for state-of-the-art security will continue to increase in the light of the continuously increasing number of cyber-att...

Walking Through the Life-Cycle
Tutorials
Mr. Andreas Gerstinger

Qualitative Risk Analysis: A Redbook Tool for the IH/OS Tool Box

ISSC37-30

The course is based on the principles and methodologies presented in the?Redbook, "The Guidelines for Hazard Evaluation Procedures", 3rd Edition?for using the What-If/Checklist hazards analysis method. The Redbook is a?standard industry reference for hazard evaluation procedures published by?the Cen...

Analytical Techniques
Tutorials
Kelsey Forde

System Safety Part 2: Practical Generation of Safety Cases With the Help of GSN

ISSC37-48

  This tutorial will introduce you to the concept of safety cases. Safety cases are structured arguments that support the claim that a system is safe to be used for a given application in a given environment. Several standards require the production of such safety cases as a prerequisite for ap...

Analytical Techniques
Tutorials
Mr. Andreas Gerstinger
Display #
Site Logo Image
37th International System Safety Conference

Dryfta Logo Dryfta event tools for academia & non-profits

Forgot your Password?
Disconnected from server
You are disconnected from the server. The changes you made may not be saved. Please check when connected.