BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20180311T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20181104T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190521T080000
DTEND;TZID=America/Chicago:20190523T170000
DTSTAMP:20260430T062213
CREATED:20190916T133140Z
LAST-MODIFIED:20190916T133140Z
UID:10000100-1558425600-1558630800@www.houstonisa.org
SUMMARY:10850 Harwin Dr Houston\, TX 77072 United States
DESCRIPTION:The third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting\, security monitoring and incident response\, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change\, backup\, and recovery procedures and periodic cybersecurity audits. \nThis course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an ever-changing threat environment. \nYou will be able to: \n\nPerform basic network diagnostics and troubleshooting\nInterpret the results of IACS device diagnostic alarms and event logs\nDevelop and follow IACS backup and restoration procedures\nUnderstand the IACS patch management lifecycle\nDevelop and follow an IACS patch management procedure\nDevelop and follow an antivirus management procedure\nDefine the basics of application control and whitelisting tools\nDefine the basics of network and host intrusion detection\nDefine the basics of security incident and event monitoring tools\nDevelop and follow an incident response plan\nDevelop and follow an IACS management of change procedure\nConduct a basic IACS cybersecurity audit\n\nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63252153
URL:https://www.houstonisa.org/event/10850-harwin-dr-houston-tx-77072-united-states/
LOCATION:The Best Western Westchase Mini-Suites\, 2950 W Sam Houston Pkwy S Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190514T080000
DTEND;TZID=America/Chicago:20190516T170000
DTSTAMP:20260430T062213
CREATED:20190916T132827Z
LAST-MODIFIED:20190916T132827Z
UID:10000101-1557820800-1558026000@www.houstonisa.org
SUMMARY:IC34 – IACS Cybersecurity Design & Implementation
DESCRIPTION:The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. \nThis course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new and existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally\, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification (CRS). \nYou will be able to:\n\nInterpret the results of an IACS cybersecurity risk assessment\nDevelop a cybersecurity requirements specification (CRS)\nDevelop a conceptual design based upon information in a well-crafted CRS\nExplain the security development lifecycle process and deliverables\nPerform a basic firewall configuration and commissioning\nDesign a secure remote access solution\nDevelop system hardening design specification\nImplement a basic network intrusion detection system\nDevelop a Cybersecurity Acceptance Test Plan (CFAT/CSAT)\nPerform a basic CFAT or CSAT\n\n  \nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250670
URL:https://www.houstonisa.org/event/ic34-iacs-cybersecurity-design-implementation/
LOCATION:La Quinta Inn & Suites Houston – Westchase\, 10850 Harwin Dr Houston\, TX 77072 United States\, Houston\, TX\, 77072\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190508T080000
DTEND;TZID=America/Chicago:20190510T170000
DTSTAMP:20260430T062213
CREATED:20190916T132251Z
LAST-MODIFIED:20190916T132251Z
UID:10000103-1557302400-1557507600@www.houstonisa.org
SUMMARY:IC33 – Assessing the Cybersecurity of New or Existing IACS Systems
DESCRIPTION:The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1\, these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system\, identifying security level targets\, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). \nThis course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a CRS that can be used to document the cybersecurity requirements for a project. \nYou will be able to:\n\nIdentify and document the scope of the IACS under assessment\nSpecify\,gather\, or generate the cybersecurity information required to perform the assessment\nIdentify or discover cybersecurity vulnerabilities inherent in the IACS’ products or system design\nOrganize and facilitate a cybersecurity risk assessment for an IACS\nIdentify and evaluate realistic threat scenarios\nIdentify gaps in existing policies\, procedures\, and standards\nEstablish and document security zones and conduits\nDevelop a cybersecurity requirements specification (CRS)\n\nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250535
URL:https://www.houstonisa.org/event/ic33-assessing-the-cybersecurity-of-new-or-existing-iacs-systems/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190506T080000
DTEND;TZID=America/Chicago:20190523T170000
DTSTAMP:20260430T062213
CREATED:20190916T132447Z
LAST-MODIFIED:20190916T132447Z
UID:10000102-1557129600-1558630800@www.houstonisa.org
SUMMARY:Houston May Cyber Camp
DESCRIPTION:Houston May Cyber Camp
URL:https://www.houstonisa.org/event/houston-may-cyber-camp/
LOCATION:Kenexis\, 15995 N Barkers Lndg Rd Ste 143 Houston\, TX 77079-2418\, Houston\, TX\, 77079-2418\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
END:VCALENDAR