BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260923T080000
DTEND;TZID=America/Chicago:20260925T160000
DTSTAMP:20260412T074338
CREATED:20260303T155743Z
LAST-MODIFIED:20260303T155743Z
UID:10000311-1790150400-1790352000@www.houstonisa.org
SUMMARY:IC34 – IACS Cybersecurity Design & Implementation
DESCRIPTION:Course Overview \nIndustrial Automation Control System (IACS) Cybersecurity Design & Implementation (IC34) focuses on the design and implementation phase of the ISA/IEC 62443 cybersecurity lifecycle. This course builds on the results of cybersecurity risk assessments and Cybersecurity Requirements Specifications (CRS) to design\, implement\, and validate cybersecurity countermeasures that achieve target security levels for each zone and conduit. \nParticipants learn how to translate cybersecurity requirements into practical system designs\, select appropriate technologies\, and perform acceptance testing to ensure systems meet security objectives. \nCourse Details \nCourse #: IC34 \nDates: September 23–25 \nLength: 3 days \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 2.1 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC34 is the third course in the ISA/IEC 62443 Cybersecurity Certificate Program. \nSuccessful completion of the course and exam earns the ISA/IEC 62443 Cybersecurity Design Specialist certificate. \nRequired Prerequisites \nSuccessful completion of IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems \nPassing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist exam \nRecommended: IC33 – Assessing the Cybersecurity of New or Existing IACS Systems \nWho Should Take IC34 \n– Control systems engineers and managers \n– System integrators- IT engineers and managers in industrial facilities \n– Plant managers \n– Plant safety and risk management personnel \nLearning Objectives \n– Interpret cybersecurity risk assessment results \n– Develop a Cybersecurity Requirements Specification (CRS) \n– Develop conceptual and detailed cybersecurity designs \n– Explain the Security Development Lifecycle (SDL) \n– Design secure remote access solutions \n– Perform basic firewall configuration and commissioning \n– Develop system hardening specifications \n– Implement basic intrusion detection systems (IDS) \n– Develop cybersecurity acceptance test plans (CFAT/CSAT) \n– Validate achieved security levels using ISA/IEC 62443 \nTopics Covered \n– IACS cybersecurity lifecycle overview \n– Assessment\, implementation\, and maintenance phases \n– Interpreting risk assessment results \n– Cybersecurity requirements specifications \n– Conceptual and detailed design processes \n– Firewall\, remote access\, and intrusion detection design \n– System hardening and secure architecture \n– Cybersecurity Factory Acceptance Testing (CFAT) \n– Cybersecurity Site Acceptance Testing (CSAT) \n– Using ISA/IEC 62443-3-3 to validate security levels \nHands-On Activities & Exercises \n– Firewall configuration and commissioning \n– Remote access design exercises \n– Intrusion detection implementation \n– Network device hardening \n– Developing and executing CFAT/CSAT \n– Validating achieved security levels (SL-A) \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security LevelsRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Additional Preparation \nStrong understanding of cybersecurity fundamentals\, risk assessment methods\, and prior experience with \nindustrial automation systems will help participants succeed in this advanced course.
URL:https://www.houstonisa.org/event/ic34-iacs-cybersecurity-design-implementation-2/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
END:VCALENDAR