BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210913T080000
DTEND;TZID=America/Chicago:20211114T160000
DTSTAMP:20260406T044411
CREATED:20210728T172258Z
LAST-MODIFIED:20210728T172405Z
UID:10000029-1631520000-1636905600@www.houstonisa.org
SUMMARY:Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
DESCRIPTION:Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nCertificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nDescription: \nThe move to using open standards such as Ethernet\, TCP/IP\, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA99 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. \nYou will be able to: \n\nDiscuss the principles behind creating an effective long term program security\nInterpret the ISA/IEC 62443 industrial security framework and apply them to your operation\nDefine the basics of risk and vulnerability analysis methodologies\nDescribe the principles of security policy development\nExplain the concepts of defense in depth and zone/conduit models of security\nAnalyze the current trends in industrial security incidents and methods hackers use to attack a system\nDefine the principles behind the key risk mitigation techniques\, including anti-virus and patch management\, firewalls\, and virtual private networks\n\nYou will cover: \n\nUnderstanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nCreating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nRisk Analysis:  Business Rationale | Risk Identification\, Classification\, and Assessment\nAddressing Risk with Security Policy\, Organization\, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness\nAddressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control\nAddressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management\nMonitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS\nValidating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems\n\nClassroom/Laboratory Demo: \n\nPCAP Live Capture Analysis\n\nIncludes ISA Standards: \n\nANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007)\, Security for Industrial Automation and Control Systems Part 1: Terminology\, Concepts & Models\nANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)\, Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nANSI/ISA-62443-3-3\, Security for industrial automation and control systems: System security requirements and security levels\n\nRecommended Pre-Requisites: \nThere are no required prerequisites for taking this course; however\, it is highly recommended that applicants have at least one to three years of experience in the cybersecurity field with some experience in an industrial setting. \nISA Courses: TS06\, TS12\, or equivalent knowledge/experience would be beneficial. \nNote from the Instructor: One of the challenges I have had in teaching IC32 is students attending without any or limited knowledge of TS04\, TS06\, TS12 or cybersecurity general principles. IC32 is a 14-hour boot camp style class and there is not a lot of time to teach basic comms and cybersecurity. \nRecommended reading in preparation for course: \nCybersecurity Library \nWhich Security Level (SL) would have been required to prevent the attack? \nNot sure this particular course is for you? \nA pre-instructional survey is available for you to evaluate your level of understanding of the course material and to show you the types of questions you’ll be able to answer after completing the course.
URL:https://www.houstonisa.org/event/using-the-isa-iec-62443-standards-to-secure-your-control-systems-ic32-2/
LOCATION:Burns McDonnell\,1898 & Co.\, 1700 West Loop South\, Houston\, 77027\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Glen Wood":MAILTO:glnwd15@gmail.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210921T080000
DTEND;TZID=America/Chicago:20210923T170000
DTSTAMP:20260406T044411
CREATED:20210728T172736Z
LAST-MODIFIED:20210728T173632Z
UID:10000031-1632211200-1632416400@www.houstonisa.org
SUMMARY:IACS Cybersecurity Design & Implementation (IC34) Houston
DESCRIPTION:Certificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nDescription: \nThe second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution\, in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. \nThis course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally\, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification. \nYou will be able to: \n\nInterpret the results of an ICS cybersecurity risk assessment\nDevelop a cybersecurity requirements specification (CRS)\nDevelop a conceptual design based upon information in a well-crafted CRS\nExplain the security development lifecycle process and deliverables\nPerform a basic firewall configuration and commissioning\nDesign a secure remote access solution\nDevelop system hardening specification\nImplement a basic network intrusion detection system\nDevelop a Cybersecurity Acceptance test plan (CFAT/CSAT)\nPerform a basic CFAT or CSAT\n\nYou Will Cover: \n\nIntroduction to the ICS Cybersecurity Lifecycle\nAssessment phase\nImplementation phase\nMaintenance phase\nConceptual Design Process\nInterpreting risk assessment results\nCybersecurity requirements specifications\nDeveloping a conceptual design\nConceptual design specification\nDetailed Design Process\nSecurity Development Lifecycle (SDL)\nTypes of technology\nSelecting appropriate technology\nDeveloping a detailed design\nDocumenting the design/specification\nDesign & Implementation Examples\nFirewall design example\nRemote access design example\nSystem hardening design example\nIntrusion detection design example\nTesting\nDeveloping test plans\nCybersecurity Factory Acceptance Testing\nCybersecurity Site Acceptance Testing\n\nClassroom/Laboratory Exercises: \n\nDevelop a Physical & Cybersecurity Plan\nConfigure a Perimeter Firewall\nConfigure an ICS Firewall\nInstall and use SNORT!\nConfigure Windows Local Group Policy Objects\nInstall MS Security Compliance Manager (SCM)\nConduct ICS Device Hardening\nConduct Network Device Hardening\nUse a Domain Controller\nConfigure a VPN Connection\nConduct Security Configuration Auditing\nConduct System Robustness Testing\n\nWho Should Attend: \n\nControl systems engineers and managers\nSystem Integrators\nIT engineers and managers industrial facilities\nPlant managers\nPlant Safety and Risk Management\n\nRecommended Pre-Requisites: \nISA Courses IC32 and IC33 or equivalent knowledge/experience. \nRecommended Reading: \nCybersecurity Library
URL:https://www.houstonisa.org/event/iacs-cybersecurity-design-implementation-ic34-houston-tx-21st-23rd-september-2021/
LOCATION:Burns McDonnell\,1898 & Co.\, 1700 West Loop South\, Houston\, 77027\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Glen Wood":MAILTO:glnwd15@gmail.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210922T180000
DTEND;TZID=America/Chicago:20210922T193000
DTSTAMP:20260406T044411
CREATED:20210708T190144Z
LAST-MODIFIED:20210708T190144Z
UID:10000134-1632333600-1632339000@www.houstonisa.org
SUMMARY:CSE Exam Study Group : Final Control Elements Part 2
DESCRIPTION:Are you looking to take your PE Engineering Exam for the State of Texas in October? \nAre you looking for a Group to Study with?  HOUSTON ISA Section is your answer. \n  \nAll Future Control Systems PEs! \n  \nSign up quickly with ISA Houston Section which is offering a 10-session professional study group course to prepare you to pass the Control Systems Engineer (CSE) Professional Engineer (PE) examination in October. \n  \nThe course includes exam preparation materials that will be reviewed during each session with a knowledgeable facilitator. If you are a control systems professional in the Houston area and are planning to take the CSE exam\, follow this link to find out more information and register for the course.” \n  \nFor each session you want to attend you MUST sign up for that session. Also\, you must be a ISA member in good standing. These sessions are at no charge and are provided as a service from the ISA Houston Section. \n  \nIn order to receive the discount for ISA books\, you must register no later than July 31st. \n  \nFor questions on the CSE Exam Study Course please email  the assistant education chair\, Glen Wood\, at glnwd15@gmail.com
URL:https://www.houstonisa.org/event/cse-exam-study-group-final-control-elements-part-2/
LOCATION:Vector\, 14517 Kirby Dr\, Pearland\, TX\, 77047\, United States
CATEGORIES:Training,Professional-Engineering
ORGANIZER;CN="Glen Wood":MAILTO:glnwd15@gmail.com
END:VEVENT
END:VCALENDAR