BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20180311T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20181104T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190521T080000
DTEND;TZID=America/Chicago:20190523T170000
DTSTAMP:20260403T132037
CREATED:20190916T133140Z
LAST-MODIFIED:20190916T133140Z
UID:10000100-1558425600-1558630800@www.houstonisa.org
SUMMARY:10850 Harwin Dr Houston\, TX 77072 United States
DESCRIPTION:The third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting\, security monitoring and incident response\, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change\, backup\, and recovery procedures and periodic cybersecurity audits. \nThis course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an ever-changing threat environment. \nYou will be able to: \n\nPerform basic network diagnostics and troubleshooting\nInterpret the results of IACS device diagnostic alarms and event logs\nDevelop and follow IACS backup and restoration procedures\nUnderstand the IACS patch management lifecycle\nDevelop and follow an IACS patch management procedure\nDevelop and follow an antivirus management procedure\nDefine the basics of application control and whitelisting tools\nDefine the basics of network and host intrusion detection\nDefine the basics of security incident and event monitoring tools\nDevelop and follow an incident response plan\nDevelop and follow an IACS management of change procedure\nConduct a basic IACS cybersecurity audit\n\nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63252153
URL:https://www.houstonisa.org/event/10850-harwin-dr-houston-tx-77072-united-states/
LOCATION:The Best Western Westchase Mini-Suites\, 2950 W Sam Houston Pkwy S Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190514T080000
DTEND;TZID=America/Chicago:20190516T170000
DTSTAMP:20260403T132037
CREATED:20190916T132827Z
LAST-MODIFIED:20190916T132827Z
UID:10000101-1557820800-1558026000@www.houstonisa.org
SUMMARY:IC34 – IACS Cybersecurity Design & Implementation
DESCRIPTION:The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. \nThis course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new and existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally\, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification (CRS). \nYou will be able to:\n\nInterpret the results of an IACS cybersecurity risk assessment\nDevelop a cybersecurity requirements specification (CRS)\nDevelop a conceptual design based upon information in a well-crafted CRS\nExplain the security development lifecycle process and deliverables\nPerform a basic firewall configuration and commissioning\nDesign a secure remote access solution\nDevelop system hardening design specification\nImplement a basic network intrusion detection system\nDevelop a Cybersecurity Acceptance Test Plan (CFAT/CSAT)\nPerform a basic CFAT or CSAT\n\n  \nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250670
URL:https://www.houstonisa.org/event/ic34-iacs-cybersecurity-design-implementation/
LOCATION:La Quinta Inn & Suites Houston – Westchase\, 10850 Harwin Dr Houston\, TX 77072 United States\, Houston\, TX\, 77072\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190508T080000
DTEND;TZID=America/Chicago:20190510T170000
DTSTAMP:20260403T132037
CREATED:20190916T132251Z
LAST-MODIFIED:20190916T132251Z
UID:10000103-1557302400-1557507600@www.houstonisa.org
SUMMARY:IC33 – Assessing the Cybersecurity of New or Existing IACS Systems
DESCRIPTION:The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1\, these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system\, identifying security level targets\, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). \nThis course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a CRS that can be used to document the cybersecurity requirements for a project. \nYou will be able to:\n\nIdentify and document the scope of the IACS under assessment\nSpecify\,gather\, or generate the cybersecurity information required to perform the assessment\nIdentify or discover cybersecurity vulnerabilities inherent in the IACS’ products or system design\nOrganize and facilitate a cybersecurity risk assessment for an IACS\nIdentify and evaluate realistic threat scenarios\nIdentify gaps in existing policies\, procedures\, and standards\nEstablish and document security zones and conduits\nDevelop a cybersecurity requirements specification (CRS)\n\nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250535
URL:https://www.houstonisa.org/event/ic33-assessing-the-cybersecurity-of-new-or-existing-iacs-systems/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190506T080000
DTEND;TZID=America/Chicago:20190523T170000
DTSTAMP:20260403T132037
CREATED:20190916T132447Z
LAST-MODIFIED:20190916T132447Z
UID:10000102-1557129600-1558630800@www.houstonisa.org
SUMMARY:Houston May Cyber Camp
DESCRIPTION:Houston May Cyber Camp
URL:https://www.houstonisa.org/event/houston-may-cyber-camp/
LOCATION:Kenexis\, 15995 N Barkers Lndg Rd Ste 143 Houston\, TX 77079-2418\, Houston\, TX\, 77079-2418\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190505T080000
DTEND;TZID=America/Chicago:20190509T170000
DTSTAMP:20260403T132037
CREATED:20190916T131845Z
LAST-MODIFIED:20190916T131845Z
UID:10000104-1557043200-1557421200@www.houstonisa.org
SUMMARY:Analysis Division Symposium @ Galveston Island Convention Center
DESCRIPTION:Join friends and colleagues in Galveston\, Texas for the ISA Analysis Division Symposium! Attendees will gain the opportunity to hear from and engage with industry thought leaders and innovators\, as well as meet with representatives of process analyzer manufacturers who will be showcasing their products/services and applications. \nThe 2019 symposium event features expert presentations and speakers\, valuable training courses\, and informative technology forum and exhibition\, and a wide range of social networking events.
URL:https://www.houstonisa.org/event/analysis-division-symposium-galveston-island-convention-center/
CATEGORIES:Event
ATTACH;FMTTYPE=image/gif:https://www.houstonisa.org/wp-content/uploads/2019/09/unnamed.gif
ORGANIZER;CN="Dale Merriman":MAILTO:dcmerriman@sbcglobal.net
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190501T110000
DTEND;TZID=America/Chicago:20190501T130000
DTSTAMP:20260403T132037
CREATED:20190916T133635Z
LAST-MODIFIED:20190916T133635Z
UID:10000099-1556708400-1556715600@www.houstonisa.org
SUMMARY:Flow Technology Overview
DESCRIPTION:Confused about which Precision Flow Technology to select for your application? In this presentation\, we will review the theory\, advantages/limitations\, and Best Fit applications for the eight flow technologies that make up the Precision Flow Market. Those technologies are DP Flow\, Coriolis\, Magmeter\, Vortex\, Ultrasonic\, Thermal Mass\, Turbine and Positive Displacement. At the conclusion of the presentation\, attendees will have a better understanding of what technologies will meet their application needs. \nPresenter: PARKER SEATON\, Gulf Area Flow & Density Specialist for Emerson Process Automation \nMr. Seaton graduated from The University of Arkansas in 1976 and was employed by Dow Chemical in Freeport from 1977 to 1983. During his tenure at Dow\, he was a Production Engineer with the Energy Systems and the Polyethylene Units. After a brief foray into private business\, Mr. Seaton began his career with Rosemount in 1987. From 1987 to 1999 the presenter was involved in growing the sales of Rosemount products at accounts in the Freeport area. In 2000\, Mr. Seaton took on the role of Flow Specialist for the Gulf Area supporting DP Flow\, Magmeters and Vortex. In 2010\, the responsibility for product support was refocused on Coriolis\, Density\, Magmeters and Vortex for the Emerson Flow Team in the Gulf Area.
URL:https://www.houstonisa.org/event/flow-technology-overview/
LOCATION:ExxonMobil Building\, 1725 Hughes Landing Blvd. (Meeting Room A) The Woodlands\, 77380\, Woodlands\, 77380\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/meeting-e1569307118626.jpg
ORGANIZER;CN="Clifford D. Wuertz":MAILTO:cdwuertz@gmail.com
END:VEVENT
END:VCALENDAR