BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20180311T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20181104T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190508T080000
DTEND;TZID=America/Chicago:20190510T170000
DTSTAMP:20260413T103908
CREATED:20190916T132251Z
LAST-MODIFIED:20190916T132251Z
UID:2552-1557302400-1557507600@www.houstonisa.org
SUMMARY:IC33 – Assessing the Cybersecurity of New or Existing IACS Systems
DESCRIPTION:The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1\, these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system\, identifying security level targets\, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). \nThis course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a CRS that can be used to document the cybersecurity requirements for a project. \nYou will be able to:\n\nIdentify and document the scope of the IACS under assessment\nSpecify\,gather\, or generate the cybersecurity information required to perform the assessment\nIdentify or discover cybersecurity vulnerabilities inherent in the IACS’ products or system design\nOrganize and facilitate a cybersecurity risk assessment for an IACS\nIdentify and evaluate realistic threat scenarios\nIdentify gaps in existing policies\, procedures\, and standards\nEstablish and document security zones and conduits\nDevelop a cybersecurity requirements specification (CRS)\n\nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250535
URL:https://www.houstonisa.org/event/ic33-assessing-the-cybersecurity-of-new-or-existing-iacs-systems/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
END:VCALENDAR