BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210505T080000
DTEND;TZID=America/Chicago:20210507T160000
DTSTAMP:20260413T055637
CREATED:20210415T054025Z
LAST-MODIFIED:20210415T055214Z
UID:4001-1620201600-1620403200@www.houstonisa.org
SUMMARY:Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
DESCRIPTION:Certificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nUse Coupon code: HOUS2021 to receive discount of $200 off registration.\nCertification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nDescription: \nThe first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1 these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system\, identifying security level targets\, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). \nThis course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements the project. \nYou Will Be Able to: \n\nIdentify and document the scope of the IACS under assessment\nSpecify\, gather or generate the cybersecurity information required to perform the assessment\nIdentify or discover cybersecurity vulnerabilities inherent in the IACS products or system design\nOrganize and facilitate a cybersecurity risk assessment for an IACS\nIdentify and evaluate realistic threat scenarios\nIdentify gaps in existing policies\, procedures and standards\nEstablish and document security zones and conduits\nPrepare documentation of assessment results\n\nYou Will Cover: \n\nPreparing for an Assessment\nCybersecurity Vulnerability Assessment\nConducting Vulnerability Assessments\nCyber Risk Assessments\nConducting Cyber Risk Assessments\nDocumentation and Reporting\nAnd more…\n\nClassroom/Laboratory Exercises: \n\nCritiquing system architecture diagrams\nAsset Inventory\nGap Assessment\nWindows Vulnerability Assessment\nCapturing Ethernet Traffic\nPort Scanning\nUsing Vulnerability Scanning Tools\nPerform a high-level risk assessment\nCreating a zone & conduit diagram\nPerform a detailed cyber risk assessment\nCritiquing a cybersecurity requirements specification\n\nWho Should Attend: \n\nControl systems engineers and managers\nSystem Integrators\nIT engineers and managers industrial facilities\nIT corporate/security professionals\nPlant Safety and Risk Management\n\nRecommended Pre-Requisite: \nISA Course IC32 or equivalent knowledge/experience. \nRecommended Reading: \nCybersecurity Library
URL:https://www.houstonisa.org/event/assessing-the-cybersecurity-of-new-or-existing-iacs-systems-ic33/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Cyber-Security,Training
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
END:VCALENDAR