BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260914T080000
DTEND;TZID=America/Chicago:20260915T160000
DTSTAMP:20260412T061407
CREATED:20260303T152422Z
LAST-MODIFIED:20260303T153031Z
UID:10000309-1789372800-1789488000@www.houstonisa.org
SUMMARY:IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems
DESCRIPTION:Course Overview \nUsing the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. The course explores the procedural and technical differences between traditional IT security and security solutions appropriate for SCADA and plant floor environments. \nWith the increased use of open standards such as Ethernet\, TCP/IP\, and web technologies in industrial automation and control systems\, cybersecurity risks have expanded. This course addresses how to protect control systems against modern cyber threats. \nCourse Details \nCourse #: IC32 \nDates: September 14–15 \nLength: 2 days (14 hours) \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 1.4 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC32 is a preparatory course for the ISA/IEC 62443 Cybersecurity Certificate Program. \nWho Should Take IC32 \n– Control systems engineers and managers \n– System integrators \n– IT engineers and managers at industrial facilities \n– Plant managers \n– Plant safety and risk management professionals \nLearning Objectives \n– Describe the importance of securing control systems- Describe the structure and content of the ISA/IEC 62443 standards \n– Explain cybersecurity awareness as an effective countermeasure \n– Define principles of an effective long-term cybersecurity program \n– Discuss basics of risk analysis\, industrial networking\, and network security \n– Explain defense-in-depth and zones & conduits concepts \n– Apply risk mitigation techniques such as antivirus\, patching\, and firewalls \n– Explain secure software development strategies \n– Validate and verify system security \n– Utilize ISA/IEC 62443 security profiles \nTopics Covered \n– Introduction to control systems security \n– Cybersecurity awareness \n– ISA/IEC 62443 standards overview \n– Models and security levels \n– IACS cybersecurity lifecycle \n– Security program requirements for asset owners and service providers \n– Network security basics and industrial protocols \n– Patch management \n– Risk assessment for system design \n– Secure product and system development \n– Security profiles and protection schemes \nExercises \n– PCAP live capture analysis \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security Levels \nRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Prerequisites \nNo formal prerequisites are required. However\, 1–3 years of cybersecurity experience and familiarity with industrial environments are strongly recommended. \nISA courses TS07 and TS12 or equivalent experience are beneficial. \nInstructor Note: Students with limited cybersecurity fundamentals may find the pace challenging.
URL:https://www.houstonisa.org/event/ic32-using-the-isa-iec-62443-standards-to-secure-your-control-systems/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260916T080000
DTEND;TZID=America/Chicago:20260918T160000
DTSTAMP:20260412T061407
CREATED:20260303T154713Z
LAST-MODIFIED:20260303T154713Z
UID:10000310-1789545600-1789747200@www.houstonisa.org
SUMMARY:IC33 – Assessing the Cybersecurity of New or Existing IACS Systems
DESCRIPTION:Course Overview \nAssessing the Cybersecurity of New or Existing IACS Systems (IC33) provides the knowledge and skills needed to \nassess the cybersecurity of new or existing industrial automation and control systems (IACS). Participants learn how to identify assets\, evaluate vulnerabilities\, perform cybersecurity risk assessments\, and develop a Cybersecurity Requirements Specification (CRS) aligned with ISA/IEC 62443. \nThe course focuses on the first phase of the IACS cybersecurity lifecycle and applies to both greenfield and brownfield systems. \nCourse Details \nCourse #: IC33 \nDates: September 16–18 \nLength: 3 days \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 2.1 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC33 is the second course in the ISA/IEC 62443 Cybersecurity Certificate Program. \nSuccessful completion of the course and exam earns the ISA/IEC 62443 Cybersecurity Risk Assessment Specialist\ncertificate. \nRequired Prerequisites \nSuccessful completion of IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems \nPassing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist exam \nWho Should Take IC33 \n– Control systems engineers and managers \n– System integrators \n– IT engineers and managers in industrial facilities- Plant managers \n– Plant safety and risk management personnel \nLearning Objectives \n– Identify and document the scope of the IACS under assessment \n– Gather cybersecurity information required to perform assessments \n– Identify cybersecurity vulnerabilities in products and system design \n– Interpret Process Hazard Analysis (PHA) results \n– Organize and facilitate cybersecurity risk assessments \n– Identify and evaluate realistic threat scenarios \n– Assess effectiveness of existing countermeasures \n– Identify gaps in policies\, procedures\, and standards \n– Establish security zones and conduits \n– Develop a Cybersecurity Requirements Specification (CRS) \nTopics Covered \n– Preparing for an assessment and defining scope \n– Security lifecycle concepts \n– System and network architecture diagrams \n– Asset inventory and cyber criticality assessment \n– Cybersecurity vulnerability assessments (high-level\, passive\, active) \n– Penetration testing concepts \n– Cyber risk assessment methodology \n– ISA/IEC 62443-2-1 alignment \n– Zones and conduits modeling \n– Risk identification\, classification\, and calculation \n– Countermeasures and residual risk \n– Documentation and reporting requirements \nHands-On Activities & Exercises \n– High-level risk assessment using CSET \n– Capturing Ethernet traffic \n– Vulnerability scanning \n– Penetration testing demonstrations \n– Creating zone and conduit diagrams \n– Developing a Cybersecurity Requirements Specification \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security LevelsRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Additional Preparation \nFamiliarity with industrial networking concepts\, cybersecurity fundamentals\, and prior exposure to ISA standards will help students succeed in this fast-paced course.
URL:https://www.houstonisa.org/event/ic33-assessing-the-cybersecurity-of-new-or-existing-iacs-systems-2/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260923T080000
DTEND;TZID=America/Chicago:20260925T160000
DTSTAMP:20260412T061407
CREATED:20260303T155743Z
LAST-MODIFIED:20260303T155743Z
UID:10000311-1790150400-1790352000@www.houstonisa.org
SUMMARY:IC34 – IACS Cybersecurity Design & Implementation
DESCRIPTION:Course Overview \nIndustrial Automation Control System (IACS) Cybersecurity Design & Implementation (IC34) focuses on the design and implementation phase of the ISA/IEC 62443 cybersecurity lifecycle. This course builds on the results of cybersecurity risk assessments and Cybersecurity Requirements Specifications (CRS) to design\, implement\, and validate cybersecurity countermeasures that achieve target security levels for each zone and conduit. \nParticipants learn how to translate cybersecurity requirements into practical system designs\, select appropriate technologies\, and perform acceptance testing to ensure systems meet security objectives. \nCourse Details \nCourse #: IC34 \nDates: September 23–25 \nLength: 3 days \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 2.1 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC34 is the third course in the ISA/IEC 62443 Cybersecurity Certificate Program. \nSuccessful completion of the course and exam earns the ISA/IEC 62443 Cybersecurity Design Specialist certificate. \nRequired Prerequisites \nSuccessful completion of IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems \nPassing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist exam \nRecommended: IC33 – Assessing the Cybersecurity of New or Existing IACS Systems \nWho Should Take IC34 \n– Control systems engineers and managers \n– System integrators- IT engineers and managers in industrial facilities \n– Plant managers \n– Plant safety and risk management personnel \nLearning Objectives \n– Interpret cybersecurity risk assessment results \n– Develop a Cybersecurity Requirements Specification (CRS) \n– Develop conceptual and detailed cybersecurity designs \n– Explain the Security Development Lifecycle (SDL) \n– Design secure remote access solutions \n– Perform basic firewall configuration and commissioning \n– Develop system hardening specifications \n– Implement basic intrusion detection systems (IDS) \n– Develop cybersecurity acceptance test plans (CFAT/CSAT) \n– Validate achieved security levels using ISA/IEC 62443 \nTopics Covered \n– IACS cybersecurity lifecycle overview \n– Assessment\, implementation\, and maintenance phases \n– Interpreting risk assessment results \n– Cybersecurity requirements specifications \n– Conceptual and detailed design processes \n– Firewall\, remote access\, and intrusion detection design \n– System hardening and secure architecture \n– Cybersecurity Factory Acceptance Testing (CFAT) \n– Cybersecurity Site Acceptance Testing (CSAT) \n– Using ISA/IEC 62443-3-3 to validate security levels \nHands-On Activities & Exercises \n– Firewall configuration and commissioning \n– Remote access design exercises \n– Intrusion detection implementation \n– Network device hardening \n– Developing and executing CFAT/CSAT \n– Validating achieved security levels (SL-A) \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security LevelsRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Additional Preparation \nStrong understanding of cybersecurity fundamentals\, risk assessment methods\, and prior experience with \nindustrial automation systems will help participants succeed in this advanced course.
URL:https://www.houstonisa.org/event/ic34-iacs-cybersecurity-design-implementation-2/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260928T080000
DTEND;TZID=America/Chicago:20260930T160000
DTSTAMP:20260412T061407
CREATED:20260303T160527Z
LAST-MODIFIED:20260303T160527Z
UID:10000312-1790582400-1790784000@www.houstonisa.org
SUMMARY:IC37 – IACS Cybersecurity Operations & Maintenance
DESCRIPTION:Course Overview \nIACS Cybersecurity Operations & Maintenance (IC37) focuses on the ongoing operation\, monitoring\, and maintenance of cybersecurity controls implemented in industrial automation and control systems (IACS). This course addresses how to sustain the achieved security level throughout the system lifecycle despite evolving threats\, system changes\, and operational constraints. \nParticipants learn how to detect\, respond to\, and recover from cybersecurity incidents while maintaining compliance with ISA/IEC 62443 requirements. \nCourse Details \nCourse #: IC37 \nDates: September 28–30 \nLength: 3 days \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 2.1 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC37 is the fourth and final course in the ISA/IEC 62443 Cybersecurity Certificate Program. \nSuccessful completion of the course and exam earns the ISA/IEC 62443 Cybersecurity Maintenance Specialist certificate. \nRequired Prerequisites \nSuccessful completion of IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems \nPassing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist exam \nRecommended: IC33 and IC34 or equivalent knowledge/experience \nWho Should Take IC37 \n– Control systems engineers and managers- System integrators \n– IT engineers and managers in industrial facilities \n– Plant managers \n– Plant safety and risk management personnel \nLearning Objectives \n– Perform basic network diagnostics and troubleshooting \n– Interpret IACS device alarms and event logs \n– Implement backup and restoration procedures \n– Apply patch management lifecycle procedures \n– Implement antivirus and application whitelisting strategies \n– Define intrusion detection and security monitoring basics \n– Implement incident response plans \n– Manage cybersecurity-related changes (MOC) \n– Conduct basic cybersecurity audits \nTopics Covered \n– IACS cybersecurity lifecycle overview \n– Operations & maintenance phase focus \n– Network diagnostics and troubleshooting \n– Interpreting device\, OS\, and application logs \n– Intrusion detection systems (IDS) \n– Security incident and event monitoring (SIEM) \n– Backup\, recovery\, and configuration management \n– Patch management and antivirus procedures \n– Management of Change (MOC) \n– Cybersecurity audits and compliance \nHands-On Activities & Exercises \n– Network diagnostics and troubleshooting \n– Allowlisting and antivirus configuration \n– Patch management exercises \n– Intrusion detection using Snort \n– Incident response and recovery scenarios \n– Security Information and Event Management (SIEM) demonstrations \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security LevelsRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Additional Preparation \nExperience with industrial automation systems\, cybersecurity fundamentals\, and familiarity with monitoring and maintenance practices will help participants get the most value from this course.
URL:https://www.houstonisa.org/event/ic37-iacs-cybersecurity-operations-maintenance/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
END:VCALENDAR