BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210913T080000
DTEND;TZID=America/Chicago:20211114T160000
DTSTAMP:20260406T161505
CREATED:20210728T172258Z
LAST-MODIFIED:20210728T172405Z
UID:10000029-1631520000-1636905600@www.houstonisa.org
SUMMARY:Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
DESCRIPTION:Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nCertificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nDescription: \nThe move to using open standards such as Ethernet\, TCP/IP\, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA99 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. \nYou will be able to: \n\nDiscuss the principles behind creating an effective long term program security\nInterpret the ISA/IEC 62443 industrial security framework and apply them to your operation\nDefine the basics of risk and vulnerability analysis methodologies\nDescribe the principles of security policy development\nExplain the concepts of defense in depth and zone/conduit models of security\nAnalyze the current trends in industrial security incidents and methods hackers use to attack a system\nDefine the principles behind the key risk mitigation techniques\, including anti-virus and patch management\, firewalls\, and virtual private networks\n\nYou will cover: \n\nUnderstanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nCreating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nRisk Analysis:  Business Rationale | Risk Identification\, Classification\, and Assessment\nAddressing Risk with Security Policy\, Organization\, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness\nAddressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control\nAddressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management\nMonitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS\nValidating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems\n\nClassroom/Laboratory Demo: \n\nPCAP Live Capture Analysis\n\nIncludes ISA Standards: \n\nANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007)\, Security for Industrial Automation and Control Systems Part 1: Terminology\, Concepts & Models\nANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)\, Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nANSI/ISA-62443-3-3\, Security for industrial automation and control systems: System security requirements and security levels\n\nRecommended Pre-Requisites: \nThere are no required prerequisites for taking this course; however\, it is highly recommended that applicants have at least one to three years of experience in the cybersecurity field with some experience in an industrial setting. \nISA Courses: TS06\, TS12\, or equivalent knowledge/experience would be beneficial. \nNote from the Instructor: One of the challenges I have had in teaching IC32 is students attending without any or limited knowledge of TS04\, TS06\, TS12 or cybersecurity general principles. IC32 is a 14-hour boot camp style class and there is not a lot of time to teach basic comms and cybersecurity. \nRecommended reading in preparation for course: \nCybersecurity Library \nWhich Security Level (SL) would have been required to prevent the attack? \nNot sure this particular course is for you? \nA pre-instructional survey is available for you to evaluate your level of understanding of the course material and to show you the types of questions you’ll be able to answer after completing the course.
URL:https://www.houstonisa.org/event/using-the-isa-iec-62443-standards-to-secure-your-control-systems-ic32-2/
LOCATION:Burns McDonnell\,1898 & Co.\, 1700 West Loop South\, Houston\, 77027\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Glen Wood":MAILTO:glnwd15@gmail.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20211011T080000
DTEND;TZID=America/Chicago:20211015T170000
DTSTAMP:20260406T161505
CREATED:20210728T173542Z
LAST-MODIFIED:20210728T173755Z
UID:10000133-1633939200-1634317200@www.houstonisa.org
SUMMARY:Automation Engineering Survival Training (AEST)
DESCRIPTION:ISA Automation Engineering Survival Training (AEST) \nDo you have what it takes to survive in the world of process automation? \nSharpen your process automation know-how with this intensive week of expert-led lecture and hands-on exercises covering practical\, real-world automation survival skills. \nAutomation Engineering Survival Training is a unique process automation engineering experience designed to hone your process automation knowledge and skills. This intensive technical training boot camp for automation engineers combines lecture and hands-on labs with bonus features\, including a plant tour to maximize your learning experience. \nISA’s seasoned “Survival Expert” will guide you through a fast-paced and rigorous course of topics from process measurement fundamentals through advanced automation\, and everything in between! This course also serves as a solid introduction to other ISA engineering courses that can assist in the advancement of your process engineering career. \nWho Should Attend? \n\nNew automation\, control system\, or process control engineers\nRecent process engineering and other engineering graduates\nSeasoned engineers looking to refresh their process automation knowledge and skills\nIndividuals wanting to learn more about process automation\n\nIntensive Hands-On Training Curriculum \nDays: 4.5 \nCEUs: 3.6 \nPDHs: 36 \nDAY 1: Measurement Basics & Documentation \nYou Will Cover: \n\nConcepts of Process Control: Typical Industries | Definitions | Continuous vs. Batch | Feedback Loop\nDocumentation: Instrument Line Symbols | Function Symbols | Identification Letters | Piping and Instrumentation Drawing (P&ID) | Loop Diagram\nIndustrial Measurement Systems: Process Measurement | Standard Signals | Instrument Performance Terminology | Repeatability and Accuracy | Zero\, Span\, and Linearity Errors | Calibration Chart\nControl System Hardware: Pneumatic Controller | Electronic Controller | Single Loop Controller | Distributed Control System (DCS) | Programmable Logic Controller (PLC) | Personal Computers (PC) for Control\nTemperature Measurement: Temperature Scales | Liquid-in-Glass\, Filled Bulb\, and Bimetallic Thermometers | Resistance Temperature Detectors (RTDs) | Reference Junction Compensation | Thermocouplers\nPressure Transducers: Pressure Elements | Signal Generation | Pressure/Force Relationships | Selection\nFlowmeters: DP | Magnetic | Mass | Other\n\n  \n  \nClassroom/Laboratory Exercises: \n\nDevelop diagrams for flow\, level\, temperature\, and pressure loops\nInterpret simple P&IDs\nEvaluate level instrument performance and accuracy\nDetermine upstream and downstream piping considerations\nSelect flowmeters for a variety of specific applications and specify installation and calibration requirements\n\n  \nYou Will Be Able To: \n\nDiscuss the role of measurement and control in industrial processes\nDifferentiate between continuous\, batch\, and discrete control\nDiscuss the fundamentals of process control\nApply specific ISA Standards to interpret symbols and drawings associated with process control documentation\nDiscuss and apply the most common methods and devices used in temperature\, pressure\, level\, and flow measurement\n\n  \nDAY 2: Control Valves & Strategies \nYou Will Cover: \n\nIntroduction: Valve in Loop | Valve | Actuator | Positioner\nBasic Valve Types: Globe | Ball | Plug | Butterfly\nInstallation: Performance | Safety | Other\nValve Sizing: Manual | Computer\nReview of Feedback Control Concepts and Components: History of Control Operation | Concepts\nControl Modes: Proportional | Integral | Derivative\nDynamic and Steady State Considerations: Gain | Dead Time | Time Constant\nTuning Control Systems: Closed Loop Tuning Using Ziegler Nichols Method | Evaluation and Control Criteria\nAdvanced Regulatory Control: Feedback Penalty | Challenges in Feedback Control | Real-World Control\n\n  \nClassroom/Laboratory Exercises: \n\nSize valves manually and with software\nSpecify valves\, actuators\, and auxiliaries for specific applications\nTune feedback control loops via a number of different methods\nTune using PC-based simulation software\n\nYou Will Be Able To: \n\nCompare various types of final control elements\nSize valves for any flow condition likely to be found in a process plant\nDefine the concepts of PID control\nExplain the operation of the components in a closed loop control system including static and dynamic functions\nUse three methods to tune a control system for stated quality control\nApply the operation and function of ratio control systems\nIdentify real-world control problems as the basis of need for advanced control\n\n  \nDAY 3: Safety & Operator Effectiveness \nYou Will Cover: \n\nGraphics and Controls: HMI Hierarchy Design | Classes of Displays | Navigation\nHuman Engineering: Human Factors in Console Design\nThe Common Problems in Alarm Systems\nThe Alarm Management Lifecycle\nLocation Classification Standards\nProtection Techniques Standards\nExplosion Proof Enclosures\nIntrinsic Safety\nGeneral SIS Design Considerations: Design Life Cycle | Separation of Control and Safety\nFailure Rates and Modes: Safe vs. Dangerous | Failure Mode vs. Technology | Failure Rates | Test Intervals\nSystem Technologies: Pneumatic | Relays | Microprocessors\nOperations and Maintenance: Installation | Bypassing | Testing\n\n  \nClassroom/Laboratory Exercises: \n\nAlarm prioritization\nArea classification\nCalculate device failure rates\n\n  \nYou Will Be Able To: \n\nDesign a graphical hierarchy for navigation\nExplain best practices in HMI\nDevelop an Alarm Management Philosophy\nDiscuss rationalization\, classification\, and prioritization of alarms\nDescribe and use procedures for electrical classification\nDescribe the basic principles of protection\nSelect explosion proof apparatus for specific applications\nSelect the appropriate protective techniques for different hazards\nDifferentiate between process control and safety control\nAnalyze the performance of different logic system technologies\nSpecify and select safety instrumented systems (SIS)\n\n  \nDAY 4: Industrial Security & Project Management \n  \nYou Will Cover: \n\nWhat is Data Communications?: ISO/OSI Reference Model | Terminology Basics\nTCP/IP Basics: Is Ethernet Ready for the Plant Floor? | Industrial Ethernet Design Techniques\nData Exchange: Using OPC for Inter-System Data Exchanges\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nStandards and Models: ANSI/ISA95 Standards | MESA International Model | WBF B2MML XML Schemas\nInformation Model: Production Resources | Process Segments | Product Definition and Capability | Production Schedules | Production Performance\nTypes of Projects: Facility Update | Addition to Existing Process | Technology Replacement | New Facility\nFundamentals: Activity/Phase Concept | Best Practices | Phase Interaction | What to Do/How to Do it | Do it\nProject Development: Schedule Preparation | PERT | CPM | GANT | Cost\n\n  \nClassroom/Laboratory Exercises: \n\nConduct security threat analysis\nIdentify key business processes and objects\nIdentify process segment definitions\nPractice project scheduling techniques\n\n  \nYou Will Be Able To: \n\nIdentify Local Area Network (LAN) topologies and protocols\nDefine the different Ethernet varieties and which are best for industry\nDiscuss the principles behind creating an effective long-term security program\nDefine the basics of risk and vulnerability analysis methodologies\nSpecify the requirements for an enterprise-control integration solution\nExplain the business drivers involved in integration\nIdentify project types and overall goals and objectives\nExplain the four important objectives critical to automation projects vs. the three objectives typical of other projects\n\n  \nDAY 5: Advanced Process Automation \nYou Will Cover: \n\nPhysical Model: Process Cells | Units | Equipment Modules | Control Modules\nRecipe Information Categories: Header | Procedure | Formula | Equipment Requirements\nProcedural Control Model: Procedure | Unit | Operation | Phase\nModes and States: Exception Handling | Allocation and Arbitration\nControl Activity Model: Recipe Management | Production Planning and Scheduling | Production Information Management | Process Management | Unit Supervision | Process Control | Personnel and Environmental Protection\nIntegration: Communications | Manufacturing Execution System (MES) | Network Security\nWorkflow and Project Leadership: Opportunity Identification and Project Justification | Communications and Team Processes\n\n  \nClassroom/Laboratory Exercises: \nDevelop procedural elements using the ANSI/ISA88 procedural control model and test those procedural elements against the equipment entities \n  \nYou Will Be Able To: \n\nSpecify the requirements for a batch control system\nEffectively structure and subdivide equipment entities\nDescribe modes and states and how they are applied at the equipment level\nDescribe the interfaces that are needed between batch control and other systems within an enterprise\nApply the critical areas of automation opportunity identification and project justification\nInterpret the best practice methodology for automation project execution
URL:https://www.houstonisa.org/event/automation-engineering-survival-training-aest/
LOCATION:Kenexis\, 15995 N Barkers Lndg Rd Ste 143 Houston\, TX 77079-2418\, Houston\, TX\, 77079-2418\, United States
CATEGORIES:Training,Technical-Training
ORGANIZER;CN="Glen Wood":MAILTO:glnwd15@gmail.com
END:VEVENT
END:VCALENDAR