BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210125T080000
DTEND;TZID=America/Chicago:20210319T170000
DTSTAMP:20260407T103847
CREATED:20210117T080843Z
LAST-MODIFIED:20210117T080913Z
UID:10000118-1611561600-1616173200@www.houstonisa.org
SUMMARY:EC50E Safety Instrumented Systems: A Life-Cycle Approach
DESCRIPTION:Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course.Your course registration includes your registration for the exam. \nMake sure to use HOUS2020 for $200 discount!\nDescription \nISA’s CyberU online instructor-led training course offers the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home or while traveling. \nThis online course utilizes online training modules\, additional text materials\, online evaluations\, and email discussions. Students will have access via email to an instructor and have an opportunity to participate in live Q&A sessions with the instructor and other class participants. The course focuses on the engineering requirements for the specification\, design\, analysis\, and justification of safety instrumented systems for the process industries. Students will learn how to determine safety integrity levels and evaluate whether proposed or existing systems meet the performance requirements. \n  \nThis CyberU course runs for eight (8) weeks. You will have access to seven online modules for a web/audio session. Each module takes approximately 60 minutes. Your course syllabus will guide you through the course modules\, provide assignments\, and the schedule for live Q & A sessions. \n  \nYou will be able to: \n\nDefine safety instrumented system.\nDiscuss how regulations have resulted through lessons learned from high profile process industry accidents.\nDetermine which ANSI/ISA\, AIChE\, and IEC guidelines and standards are relevant in industry.\nIdentify the Scope of ISA 61511\nDiscuss strategies for the management of functional safety\nIdentify the stages of the safety design life cycle.\nIdentify available safety layers for an IACS\nDiscuss the importance of “defense in depth” concept\nIdentify how SISs are used to reduce risk.\nCategorize risk using a PHA\nDetermine SIL using qualitative methods\nDetermine performance requirements for each SIL\nConduct a LOPA\nDiscuss LOPA methodology\nDevelop guidelines for LOPA\nDetermine risk tolerance\nIdentify resources for cyber security in an IACS\nIdentify failure modes and the risks involved with each\nIdentify hardware modeling techniques (SIL verification.)\nExplain the impact of redundancy on failure rates.\nDemonstrate the use of fault tolerance tables.\nDevelop an SRS\nExplain the pros and cons of relay logic systems\nExplain the pros and cons of microprocessor systems (PLC)\nDiscuss the pros and cons of pneumatic systems\nIdentify typical field devices in an IACS\nDiscuss impact of field devices on system performance\nExplain Center for Internet Security (CIS) Benchmarks\nExplain pros and cons of using certification vs prior use devices.\nExplain the FAT process.\nExplain installation and commissioning process.\nExplain the validation process\nIdentify priorities of the operation and maintenance phase.\nIdentify safety requirements for MOC\nIdentify documents to maintain for SRS\n\n  \nYou will cover: \nEach course module has been pre-recorded by your instructor\, so that you can access on your schedule. Each module is a web/audio session that takes approximately 60 minutes. \nModule 1/Week 1: Background\, Scope\, Management Issues\, The Life Cycle \nCovers high profile process industry accidents\, the legislation that resulted and various lessons learned \nModule 2/Week 2: Hazard and Risk assessment\, Selecting SILs \nCovers concepts and benefit of independent safety layers\, hazard identification\, risk assessment and safety integrity levels (SIL) \nModule 3/Week 3: Layer Of Protection Analysis (LOPA) and cybersecurity \nCovers the semi-quantitative method of determining safety integrity levels called LOPA \nModule 4/Week 4: Reliability and Modeling Issues \nCovers reliability issues and helps make sense of the minimum hardware fault tolerance requirement tables in the standard \nModule 5/Week 5: SRS and Logic Solver Technologies \nCovers the safety requirements specification (SRS) and the pros and cons of pneumatic\, relay and microprocessor logic systems \nModule 6/Week 6: Field Devices\, Certification\, Misc Design Issues \nCovers field devices\, their impact and the differences between using certified vs. proven-in-use devices. \nModule 7/Week 7: FAT and beyond \nCovers factory acceptance testing\, installation\, commission\, validation\, operations\, maintenance\, testing\, bypassing and management of change \n  \nCourse materials: \nCourse materials will be provided to all course registrants prior to the course start date. \n\nCourse noteset with slides from course modules and course syllabus\nOnline access to ISA/IEC 61511 standards for the duration of the course\nTextbook Included:\n\n  \n\n\n\n\n\nSafety Instrumented Systems: A Life Cycle Approach\nBy Paul Gruhn\, PE\, CFSE and Simon Lucchini\, CFSE\, MIEAust CPEng\n\n\n\n\n  \nFeatures of ISA CyberU online course: \nOnline Pre-recorded Course Modules \nYour instructor has pre-recorded each course module so that you can access the course presentations on your schedule. Each module is a web/audio session that takes approximately 60 minutes. \n  \nAsk the Expert \nInteract with your expert instructor\, via email throughout the course and through scheduled live Q& A sessions. You can expect a reply to your email within 24 hours. This email address is active during the entire course duration. \nThe Q&A sessions provide an opportunity for you and your classmates to speak one-on-one with the instructor. You will have an opportunity to ask any questions you may have about the course material and interact with your fellow classmates. \n  \nClass Discussions \nYou will be invited to subscribe to a course listserve that includes course participants. You can use this listserve to post questions and share experience relevant to the course with other class members. \n  \nCourse Assignments and Exams \n\nTake the course pre-test before you begin studying the course material to get a better understanding of areas that you will want to focus on more during the course.\nHomework assignments for all modules will be indicated on the syllabus. The homework assignments are designed to help expand your understanding of the course material.\nComplete the final exam for the course in order to receive Continuing Education Units (CEU) credit. The final exam will be taken and scored online. You must receive at least 80% on the course exam to receive CEU credit.\nContinuing Education Units (CEU) credits are awarded to all students who successfully complete the final course exam.
URL:https://www.houstonisa.org/event/ec50e-safety-instrumented-systems-a-life-cycle-approach/
LOCATION:TX
CATEGORIES:Training,Safety
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210125T080000
DTEND;TZID=America/Chicago:20210319T170000
DTSTAMP:20260407T103847
CREATED:20210117T081052Z
LAST-MODIFIED:20210117T081052Z
UID:10000119-1611561600-1616173200@www.houstonisa.org
SUMMARY:ES10E Applying Instrumentation in Hazardous Locations
DESCRIPTION:Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nMake sure to use HOUS2020 for $200 discount!\nISA’s online instructor-assisted training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \n  \nThis online course utilizes pre-recorded training modules\, additional video/simulation modules\, as well as e-mail and live discussions. Students will have access via email to an instructor throughout the course\, as well as a listserve to communicate with other students in the class. \n  \nThis online\, self-paced course runs for eight (8) weeks. You will have access to 11 online modules\, each taking approximately 60 minutes. Your course syllabus will guide you through the course modules and provide assignments and opportunities to interact with the instructor and other course participants. \n  \nDescription: \nThis self-paced\, online course provides a systematic approach to specifying and implementing instrumentation in hazardous locations. Related standards from National Fire Protection Association (NFPA)\, National Electrical Manufacturers Association (NEMA)\, International Electrotechnical Commission (IEC)\, American Petroleum Institute (API)\, and ISA are discussed. \n  \nYou will be able to: \n\nIdentify process and environmental factors that determine classification\nDescribe and use procedures for electrical classification\nUse applicable standards to develop classification drawings for gases\, dusts\, and fibers\nDescribe the basic principles of protection\nSelect explosion proof apparatus for specific applications\nDetermine when and why explosion seals should be used\nSpecify the use of intrinsically safe and nonincendive systems\nSelect the appropriate protective techniques for different hazards\nSelect alternative protective techniques for reduced cost\nSpecify devices\, design methods and safe construction approaches per National Electrical Code NFPA 70\nPrepare electrical maintenance plans in these classified areas per National Electric Recommended Practice NFPA 70B\nPerform safe operation in these classified areas per National Electric Standard for Work Place Safety NFPA 70E\n\n  \nYou Will Cover: \nPre-Exam \nStudents are asked to take the pre-exam\, which includes questions related to the subject matter areas. Answers will be provided for students to assess their knowledge\, prior to beginning the course material. \nWEEK 1 – Module 1: Introduction & Location Classification Standards \nWEEK 2 – Module 2:   Class I Division & Zone Classification \nWEEK 3 – Modules 3: Class I Zone (Alternative) & Class II Division Classifications \nWEEK 4 – Module 4:   Class III Division & Zone Classification for Dusts and Module 5: Protection Technique Standards & Enclosure Types \nWEEK 5 – Module 6:   Explosion Proof Enclosures & Module 7: Intrinsic Safety \nWEEK 6 – Module 8:   Non-incendive Systems & Module 9: Pressurization & Purging \nWEEK 7 – Module 10: Other Types of Protection & Module 11: Maintenance Considerations \nWEEK 8 – Final Examination \n  \nClassroom Materials: \n\nCourse noteset with slides from course modules and course syllabus\nISA Standards: ANSI/ISARP12.06.01-2003 – Intrinsic Safety; ANSI/ISATR12.24.01-1998 (IEC 60079-10 Mod) – Class I\, Zones 0\, 1\, and 2; ANSI/ISA12.01.01-1999 – Definitions and ANSI/ISA12.12.01-2000 – Non-incendive\n\n  \nFeatures of ISA CyberU online course: \n  \nOnline Pre-recorded Course Modules \nYour instructor has pre-recorded each course module so that you can access the course presentations on your schedule. Each module is a web/audio session that takes approximately 60 minutes. \n  \nAsk the Expert \nInteract with your expert instructor\, via email throughout the course and through scheduled live Q& A sessions. You can expect a reply to your email within 24 hours. This email address is active during the entire course duration. \nThe Q&A sessions provide an opportunity for you and your classmates to speak one-on-one with the instructor. You will have an opportunity to ask any questions you may have about the course material and interact with your fellow classmates. \n  \nClass Discussions \nYou will be invited to subscribe to a course listserve that includes course participants. You can use this listserve to post questions and share experience relevant to the course with other class members. \n  \nCourse Assignments and Exams \n\nTake the course pre-test before you begin studying the course material to get a better understanding of areas that you will want to focus on more during the course.\nHomework assignments for all modules will be indicated on the syllabus. The homework assignments are designed to help expand your understanding of the course material.\nComplete the final exam for the course in order to receive Continuing Education Units (CEU) credit. The final exam will be taken and scored online. You must receive at least 80% on the course exam to receive CEU credit.\nContinuing Education Units (CEU) credits are awarded to all students who successfully complete the final course exam.
URL:https://www.houstonisa.org/event/es10e-applying-instrumentation-in-hazardous-locations/
LOCATION:TX
CATEGORIES:Training,Safety
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210125T080000
DTEND;TZID=America/Chicago:20210319T170000
DTSTAMP:20260407T103847
CREATED:20210122T085342Z
LAST-MODIFIED:20210122T085624Z
UID:10000017-1611561600-1616173200@www.houstonisa.org
SUMMARY:IC32E Using the ISA/IEC 62443 Standard to Secure Your Control Systems
DESCRIPTION:A detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems. \nMake sure to use HOUS2020 for $200 discount!\nCertification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nPart of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \n  \nISA’s CyberU online instructor-led training courses offer the benefit of a high quality ISA training course with the added advantage of studying at your own pace in the office\, at home\, or while traveling. \n  \nThis online course utilizes online training modules\, additional text materials\, online evaluations\, and e-mail discussions. Students will have access via email to an instructor and an opportunity to participate in live Q&A sessions with the instructor and other class participants. \n  \nThis CyberU course runs for eight (8) weeks. You will have access to twelve online modules for the web/audio sessions. Each module is between 20 to 60 minutes. Your course syllabus will guide you through the course modules and provide assignments and the schedule for the live Q&A sessions. \n  \nDescription \nA detailed look at how the ISA/IEC 62443 (formerly ISA 99) Standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. The course explores the move to using open standards such as Ethernet\, TCP/IP\, and web technologies in SCADA and process control networks that has begun to expose these systems to the same cyber-attacks that have wreaked so much havoc on global government and corporate information systems. \n  \nYou will be able to: \n\nDiscuss the need and importance for control system security\nLearn about current principles and best practices\nUnderstand the structure and content of the ISA 99 / IEC 62443 series of documents\nDiscuss the principles behind the creating an effective long term program security\nLearn the basics of risk analysis\, industrial networking and network security\nUnderstand the concepts of defense in depth and zones and conduits\nLearn how to apply key risk mitigation techniques such as anti-virus\, patch management\, firewalls and virtual private networks\nLearn how secure software development strategies can make systems inherently more secure\nLearn what is being done to validate or verify the security of systems\n\n  \nYou will cover: \n  \nModule 1: Using the ISA/IEC 62443 Standards to Secure Your Control Systems \nProvides a basic introduction to control system cyber security and the ISA/IEC 62443 standards. Discussion of trends\, regulations\, industry standards and best practices\, common myths\, the ISA 99 committee\, and the structure of the ISA 62443 standard. Topics include: Self-assessment of your Control Systems Security knowledge\, Trends in control system cybersecurity\, Potential Impacts\, Five common myths regarding IACS Security\, Regulations and Standards\, ISA99 committee work. \n  \nModule 2: Terminology\, Concepts\, Models and Metrics \nCovers the material in ISA 62443-1-1 (published as ISA-99.00.01:2007) that forms the basis for the ISA 62443 series of standards. Topics include: Difference between IT and IACS\, Security Objectives\, Defense-in-Depth\, Risk Assessment\, Policies\, Zones & Conduits\, Security Levels and the Security Lifecycle Models \n  \nModule 3: Threats and Vulnerabilities \nProvides a basic introduction to networking with a focus on the application of Ethernet in the industrial environment. Topics include: Types of networks\, OSI reference model\, Network Devices\, Network Protocols\, Network Tools built into Operating Systems. \n  \nModule 4: Industrial Networking Basics L1-L3 \nBuilds on the previous module and covers networking with a focus on the upper layers of the OSI reference model\, problems with the OSI model\, network discovery\, and security auditing tools in the industrial environment. Topics include: Encapsulating data\, OSI reference model\, Network Devices\, Network Protocols. \n  \nModule 5: Network Security Basics 101 \nProvides a basic introduction to network security. Topics include: Security Appliances\, Network Segmentation\, Encryption\, Secure Protocols and Intrusion Detection. Topics include: Why address security? Firewalls\, Network Segmentation Architectures\, Encryption\, Intrusion Detection\, Monitoring Network Traffic. \n  \nModule 6: Industrial Protocols \nCovers at a high level the structure and application of common industrial protocols such as MODBUS\, PROFIBUS\, OPC and CIP (EtherNet/IP). Topics include: What is a protocol? Multitude of Industrial Protocols\, Ports in use. \n  \nModule 7: Establishing an Industrial Automation and Control Systems Security Program \nCovers the material in ISA 62443-2-1 (published as ISA-99.02.01:2009) that specifies the elements and requirements of an IACS Cyber Security Management System (CSMS). Topics include: Six top level activities\, Common pitfalls\, Risk Analysis\, Security Policy\, Organization and Awareness\, Personnel security\, Physical & Environmental Security\, Network Segmentation\, Access Control\, Change Management\, Patch and Anti-virus management\, Information management\, Incident Response and Disaster Recover Planning\, Compliance Monitoring\, and Program Maintenance. \n  \nModule 8: Security Risk Assessment and System Design \nCovers Security Level definitions and Foundational Requirements that establish a basis for the requirements in scoping an IACS assessment\, establishing zones & conduits\, analyzing the security risk for each zone\, assigning a security level target to each zone and verifying the design satisfies the security level target. Topics include: Definitions\, Risk Equation\, Cyber Risk Reduction Factor\, Basic Security analysis tools\, Identification of Zones and Conduits. \n  \nModule 9: Intro to the IACS Cybersecurity Lifecycle \nShort jaunt into the Assess\, Develop & Implement and Maintain phases of the IACS Cybersecurity Lifecycle. These phases are covered more in depth in ISA’s IC33\, IC34 & IC37 courses. Topics include: Cyber Security Life Cycle diagram\, Phases\, Continuous processes. \n  \nModule 10: Security Program Requirements for IACS Service Providers \nCreating a secure product out of the box is only a small piece of the security puzzle. Asset Owners\, Integrators and Suppliers all have a role. This module covers how IEC 62443-2-4 specifies requirements IACS service providers can offer to the asset owner during integration and maintenance activities of an Automation Solution. Topics include: IACS Patching\, Asset Owner Requirements\, Product Supplier/Service Provider Requirements\, Malicious Code Protection. \n  \nModule 11: Developing Secure Products and Systems \nOverview of component tier Product Development Requirements and Technical Security Requirements for IACS that are Product supplier centric. Topics include: Component tier standards ISA-62443-4-1 & ISA-62443-4-2\, Primary & Secondary goals\, ISA 62443 relationships\, ISA Security Compliance Institute (ISCI)\, ISASecure™. \n  \nModule 12: Evolving Security Standards and Practices \nStandards are voluntary documents unless there is a requirement to use them. In this module\, we look at the continuously evolving industrial security regulatory landscape. The only constant is change! Topics include: Normative and Informative elements\, NIST Cyber Security Framework\, ISA-62443-2-1 requirement to monitor and evaluate applicable legislation relevant to cyber security\, Standards Development Organizations (SDOs). \n  \nCourse Materials (PDF format): \n\nIC32E v2.0 Course Syllabus\nIC32E v2.0 Noteset Volume I with sections on Course Presentation slides from course modules\, Instructional Surveys/Answers and Additional Resources\nIC32E v2.0 Noteset Volume II with the following three publications\nANSI / ISA 99.00.01-2007 / IEC 62443-1-1: Security for Industrial Automation and Control Systems Part 1: Terminology\, Concepts\, and Models (Approved 29 October 2007)\nANSI / ISA 99.00.02-2009 / IEC 62443-2-1: Security for Industrial Automation and Control Systems Part 2: Establishing an Industrial Automation and Control System Security Program\nISA-62443.03.03 / IEC 62443-3-3: Security for Industrial Automation and Control Systems: System Security Requirements and Security Assurance Levels\nTextbook: Industrial Automation by Ronald L. Krutz (Second Edition)\n\n  \nFeatures of ISA CyberU online course: \nOnline Pre-recorded Course Modules \nYour instructor has pre-recorded each course module so that you can access the course presentations on your schedule. Each module is a web/audio session that takes approximately 20 – 60 minutes. \n  \nAsk the Expert \nInteract with your expert instructor via email throughout the course and through scheduled live Q&A sessions. You can expect a reply to your email within 24 hours. This email address is active during the entire course duration. \nThe Q&A sessions provide an opportunity for you and your classmates to speak one-on-one with the instructor. You will have an opportunity to ask any questions you may have about the course material and interact with your fellow classmates. \n  \nClass Discussions \nYou will be invited to subscribe to a course listserve that includes course participants. You can use this listserve to post questions and share experience relevant to the course with other class members. \n  \nCourse Assignments and Exams \n\nTake the course pre-test before you begin studying the course material to get a better understanding of areas that you will want to focus on more during the course.\nHomework assignments for all modules will be indicated on the syllabus. The homework assignments are designed to help expand your understanding of the course material.\nComplete the final exam for the course in order to receive Continuing Education Units (CEU) credit. The final exam will be taken and scored online. You must receive at least 80% on the course exam to receive CEU credit. (Note this exam is not the ISA/IEC 62443 Cybersecurity Fundamentals Specialist Exam)\n\nRecommended Reading: \nCybersecurity Library \n  \nNot sure this particular course is for you? \nA pre-instructional survey is available for you to evaluate your level of understanding of the course material and to show you the types of questions you’ll be able to answer after completing the course.
URL:https://www.houstonisa.org/event/ic32e-using-the-isa-iec-62443-standard-to-secure-your-control-systems/
LOCATION:TX
CATEGORIES:Training,Cyber-Security
END:VEVENT
END:VCALENDAR