


Planning for Interactive Threats: Part 2 of 2
In Part I of this series, we covered what constitutes an interactive threat. Now that you have a handle on what an interactive threat is, how can you use this information to help you plan for them in your Integrity Management Plan (IMP)? When identifying

Defining Interactive Threats: Part 1 of 2
When putting together an Integrity Management Plan (IMP), we know to consider individual threats, but what about threats that interact together to increase risk? The concept of interactive threats and how to address them has perplexed many operators. There are many reasons for this confusion,