BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20180311T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20181104T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190514T080000
DTEND;TZID=America/Chicago:20190516T170000
DTSTAMP:20260415T005256
CREATED:20190916T132827Z
LAST-MODIFIED:20190916T132827Z
UID:2557-1557820800-1558026000@www.houstonisa.org
SUMMARY:IC34 – IACS Cybersecurity Design & Implementation
DESCRIPTION:The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. \nThis course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new and existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally\, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification (CRS). \nYou will be able to:\n\nInterpret the results of an IACS cybersecurity risk assessment\nDevelop a cybersecurity requirements specification (CRS)\nDevelop a conceptual design based upon information in a well-crafted CRS\nExplain the security development lifecycle process and deliverables\nPerform a basic firewall configuration and commissioning\nDesign a secure remote access solution\nDevelop system hardening design specification\nImplement a basic network intrusion detection system\nDevelop a Cybersecurity Acceptance Test Plan (CFAT/CSAT)\nPerform a basic CFAT or CSAT\n\n  \nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250670
URL:https://www.houstonisa.org/event/ic34-iacs-cybersecurity-design-implementation/
LOCATION:La Quinta Inn & Suites Houston – Westchase\, 10850 Harwin Dr Houston\, TX 77072 United States\, Houston\, TX\, 77072\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
END:VCALENDAR