BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260914T080000
DTEND;TZID=America/Chicago:20260915T160000
DTSTAMP:20260412T093430
CREATED:20260303T152422Z
LAST-MODIFIED:20260303T153031Z
UID:10000309-1789372800-1789488000@www.houstonisa.org
SUMMARY:IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems
DESCRIPTION:Course Overview \nUsing the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. The course explores the procedural and technical differences between traditional IT security and security solutions appropriate for SCADA and plant floor environments. \nWith the increased use of open standards such as Ethernet\, TCP/IP\, and web technologies in industrial automation and control systems\, cybersecurity risks have expanded. This course addresses how to protect control systems against modern cyber threats. \nCourse Details \nCourse #: IC32 \nDates: September 14–15 \nLength: 2 days (14 hours) \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 1.4 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC32 is a preparatory course for the ISA/IEC 62443 Cybersecurity Certificate Program. \nWho Should Take IC32 \n– Control systems engineers and managers \n– System integrators \n– IT engineers and managers at industrial facilities \n– Plant managers \n– Plant safety and risk management professionals \nLearning Objectives \n– Describe the importance of securing control systems- Describe the structure and content of the ISA/IEC 62443 standards \n– Explain cybersecurity awareness as an effective countermeasure \n– Define principles of an effective long-term cybersecurity program \n– Discuss basics of risk analysis\, industrial networking\, and network security \n– Explain defense-in-depth and zones & conduits concepts \n– Apply risk mitigation techniques such as antivirus\, patching\, and firewalls \n– Explain secure software development strategies \n– Validate and verify system security \n– Utilize ISA/IEC 62443 security profiles \nTopics Covered \n– Introduction to control systems security \n– Cybersecurity awareness \n– ISA/IEC 62443 standards overview \n– Models and security levels \n– IACS cybersecurity lifecycle \n– Security program requirements for asset owners and service providers \n– Network security basics and industrial protocols \n– Patch management \n– Risk assessment for system design \n– Secure product and system development \n– Security profiles and protection schemes \nExercises \n– PCAP live capture analysis \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security Levels \nRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Prerequisites \nNo formal prerequisites are required. However\, 1–3 years of cybersecurity experience and familiarity with industrial environments are strongly recommended. \nISA courses TS07 and TS12 or equivalent experience are beneficial. \nInstructor Note: Students with limited cybersecurity fundamentals may find the pace challenging.
URL:https://www.houstonisa.org/event/ic32-using-the-isa-iec-62443-standards-to-secure-your-control-systems/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260916T080000
DTEND;TZID=America/Chicago:20260918T160000
DTSTAMP:20260412T093430
CREATED:20260303T154713Z
LAST-MODIFIED:20260303T154713Z
UID:10000310-1789545600-1789747200@www.houstonisa.org
SUMMARY:IC33 – Assessing the Cybersecurity of New or Existing IACS Systems
DESCRIPTION:Course Overview \nAssessing the Cybersecurity of New or Existing IACS Systems (IC33) provides the knowledge and skills needed to \nassess the cybersecurity of new or existing industrial automation and control systems (IACS). Participants learn how to identify assets\, evaluate vulnerabilities\, perform cybersecurity risk assessments\, and develop a Cybersecurity Requirements Specification (CRS) aligned with ISA/IEC 62443. \nThe course focuses on the first phase of the IACS cybersecurity lifecycle and applies to both greenfield and brownfield systems. \nCourse Details \nCourse #: IC33 \nDates: September 16–18 \nLength: 3 days \nHours: 8:00 a.m. – 4:00 p.m. \nCEUs: 2.1 \nLocation: Microsoft\, Houston TX \nCertificate: Certificate of completion provided \nExam: One exam included with registration \nCertificate Program \nIC33 is the second course in the ISA/IEC 62443 Cybersecurity Certificate Program. \nSuccessful completion of the course and exam earns the ISA/IEC 62443 Cybersecurity Risk Assessment Specialist\ncertificate. \nRequired Prerequisites \nSuccessful completion of IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems \nPassing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist exam \nWho Should Take IC33 \n– Control systems engineers and managers \n– System integrators \n– IT engineers and managers in industrial facilities- Plant managers \n– Plant safety and risk management personnel \nLearning Objectives \n– Identify and document the scope of the IACS under assessment \n– Gather cybersecurity information required to perform assessments \n– Identify cybersecurity vulnerabilities in products and system design \n– Interpret Process Hazard Analysis (PHA) results \n– Organize and facilitate cybersecurity risk assessments \n– Identify and evaluate realistic threat scenarios \n– Assess effectiveness of existing countermeasures \n– Identify gaps in policies\, procedures\, and standards \n– Establish security zones and conduits \n– Develop a Cybersecurity Requirements Specification (CRS) \nTopics Covered \n– Preparing for an assessment and defining scope \n– Security lifecycle concepts \n– System and network architecture diagrams \n– Asset inventory and cyber criticality assessment \n– Cybersecurity vulnerability assessments (high-level\, passive\, active) \n– Penetration testing concepts \n– Cyber risk assessment methodology \n– ISA/IEC 62443-2-1 alignment \n– Zones and conduits modeling \n– Risk identification\, classification\, and calculation \n– Countermeasures and residual risk \n– Documentation and reporting requirements \nHands-On Activities & Exercises \n– High-level risk assessment using CSET \n– Capturing Ethernet traffic \n– Vulnerability scanning \n– Penetration testing demonstrations \n– Creating zone and conduit diagrams \n– Developing a Cybersecurity Requirements Specification \nRecommended Resources – Standards \nISA-62443-1-1-2007 – Terminology\, Concepts\, and Models \nISA-62443-2-1-2009 – Establishing an IACS Security Program \nANSI/ISA-62443-3-2-2020 – Security Risk Assessment for System Design \nANSI/ISA-62443-3-3-2013 – System Security Requirements and Security LevelsRecommended Resources – Books \nIndustrial Automation and Control System Security Principles\, Second Edition by Ronald L. Krutz\, PhD\, PE \nRecommended Additional Preparation \nFamiliarity with industrial networking concepts\, cybersecurity fundamentals\, and prior exposure to ISA standards will help students succeed in this fast-paced course.
URL:https://www.houstonisa.org/event/ic33-assessing-the-cybersecurity-of-new-or-existing-iacs-systems-2/
LOCATION:Microsoft Corporate Office\, 750 Town and Country Blvd Suite #1000\, Houston\, TX\, 77494\, United States
CATEGORIES:Training,Cyber-Security
ORGANIZER;CN="Simon Steven Obame":MAILTO:educationdirector@houstonisa.org
END:VEVENT
END:VCALENDAR