BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20200903T080000
DTEND;TZID=America/Chicago:20200930T170000
DTSTAMP:20260417T081552
CREATED:20200903T161026Z
LAST-MODIFIED:20200903T161026Z
UID:3593-1599120000-1601485200@www.houstonisa.org
SUMMARY:IC32M  Using the ISA/IEC 62443 Standard to Secure Your Control Systems M-Course
DESCRIPTION:Dates: Self-paced \nLength:  : 12 Modules of Varying Length \nCEU Credits:  1.0 \nLocation: Online \nDescription: This is a self-paced\, online course consisting of 12 modules which take a detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems \n  \nMake sure to use HOUS2020 for $200 discount!\n  \nCertificate Program (if available) Part of the ISA/IEC 62443 Cybersecurity Certificate Program. After successfully completing all twelve modules\, students may take the exam for ISA/IEC 62443 Cybersecurity Fundamentals Specialist. Exam fee is included with course purchase. \nYou will be able to:   \n\nDiscuss the principles behind creating an effective long term program security\nInterpret the ISA/IEC 62443 industrial security framework and apply them to your operation\nDefine the basics of risk and vulnerability analysis methodologies\nDescribe the principles of security policy development\nExplain the concepts of defense in depth and zone/conduit models of security\nAnalyze the current trends in industrial security incidents and methods hackers use to attack a system\nDefine the principles behind the key risk mitigation techniques\, including anti-virus and patch management\, firewalls\, and virtual private networks\n\n  \nYou will cover:  \n\nUnderstanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nCreating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nRisk Analysis:  Business Rationale | Risk Identification\, Classification\, and Assessment\nAddressing Risk with Security Policy\, Organization\, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness\nAddressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control\nAddressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management\nMonitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS\nValidating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems\n\nLaboratory Demo: \nPCAP Live Capture Analysis
URL:https://www.houstonisa.org/event/ic32m-using-the-isa-iec-62443-standard-to-secure-your-control-systems-m-course/
CATEGORIES:Cyber-Security,Training
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
END:VCALENDAR