System Safety (promotional image)

14 - 16 October 2014 | The Midland Hotel, Manchester, UK

Tutorial programme


Tuesday 14 October 2014

The first day of the conference will host the increasingly popular tutorials.

There will be two AM and two PM tutorials to choose from. Refreshments, lunch a full set of notes will be provided to each delegate for the tutorial they attend.



An Introduction to System Safety

Presenter: Dr Carl Sandom CEng FIET MIEHF, Safety Consultant, iSys Integrity Ltd


The IET System Safety Conference 2014 will incorporate the inaugural IET Cyber Security Conference to provide an opportunity for delegates to broaden their professional knowledge.

There is much in common between the disciplines of System Safety and Cyber Security and practitioners from each discipline can benefit immensely from an enhanced understanding of the other.

This half-day tutorial will give delegates unfamiliar with System Safety a chance to gain a good foundation in the discipline before the main conference begins and delegates can then choose to attend presentations dedicated to a single discipline or they can move freely between both.

This half-day tutorial will present An Introduction to System Safety and no prior knowledge of the subject is assumed of delegates.



An Introduction to Cyber Security

Presenter: Mike StJohn-Green CEng FIET, Independent Cyber Security Consultant


This tutorial is aimed at delegates unfamiliar with Cyber Security. Exploring what cyberspace comprises, its role in society, the trends for the future, this introduction will demystify the jargon.

It will touch on topical concepts like Cloud Computing, Big Data, BYOD, the Internet of Things, explaining what this all means in terms of cyber security.

The tutorial will look at some international standards in common use and briefly explain their key differences. It will show that cyber security balances risks against benefits and explain that complete security is impractical, so organisations must plan for incidents. Finally, the tutorial will consider the relationship between security, safety and resilience.

This half-day tutorial will encourage participants to ask questions, to explore the subject and dispel the fog and mystique that can seem to shroud this important and fast-moving subject.



Arguing about safety: Constructing and deconstructing arguments about safety

Presenter: Matthew Squair, MIEAust CPEng, Principal consultant for System Safety, Jacobs Australia


This tutorial is aimed at delegates with a background in system safety. The workshop will begin with a short overview of the rise of formal safety arguments as a tool of regulatory oversight and licensing, from both the proponent and assessor's standpoint.

Methodologies for both preparing and critically reviewing a safety argument will be explained along with the role of argumentation theory and probabilistic reasoning.

Finally we'll finish with a discussion of whether we consider such arguments to be persuasive. The course is intended to provide a clearer understanding of how we have arrived at the current state of practice, as well as sparking some lively debate along the way.



Cyber-Security of Safety-Critical Systems

Presenter: Chris Johnson, Professor and Head of Computing Science, University of Glasgow


This tutorial is aimed at delegates with a background in cyber-security or system safety. It will begin with a series of case studies showing the impact that malware has already had during previous incidents involving safety-critical systems from the healthcare, aviation, military and nuclear domains.

The tutorial will then explain why existing standards and guidelines cannot be applied within most safety-critical industries.   For instance, it is difficult to immediately isolate affected systems during a forensic analysis without undermining safety-requirements.

We will then describe attempts across Europe and North America to address these problems, including the proposed EC Network and Information Security Directive and the growing market in cyber-insurance.

The tutorial will finish by outlining a number of research initiatives to improve the detection of and recovery from cyber-attacks on safety-critical infrastructures.


Topic Partners