BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ISA - Houston Section - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ISA - Houston Section
X-ORIGINAL-URL:https://www.houstonisa.org
X-WR-CALDESC:Events for ISA - Houston Section
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20180311T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20181104T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210518T080000
DTEND;TZID=America/Chicago:20210520T160000
DTSTAMP:20260413T084530
CREATED:20210415T054412Z
LAST-MODIFIED:20210415T055222Z
UID:10000123-1621324800-1621526400@www.houstonisa.org
SUMMARY:IACS Cybersecurity Operations & Maintenance (IC37)
DESCRIPTION:Certificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nUse Coupon code: HOUS2021 to receive discount of $200 off registration.\nDescription: \nThe third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting\, security monitoring and incident response\, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change\, backup and recovery procedures and periodic cybersecurity audits. \nThis course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an every changing threat environment. \n  \nYou will be able to: \n\nPerform basic network diagnostics and troubleshooting\nInterpret the results of IACS device diagnostic alarms and event logs\nImplement IACS backup and restoration procedures\nDescribe the IACS patch management life cycle and procedure\nApply an antivirus management procedure\nDefine the basics of application control and white listing tools\nDefine the basics of network and host intrusion detection\nDefine the basics of security incident and event monitoring tools\nImplement an incident response plan\nImplement an IACS management of change procedure\nConduct a basic IACS cyber security audit\n\n  \nYou will cover: \n\nIntroduction to the ICS Cybersecurity Lifecycle\n\nIdentification & Assessment phase\nDesign & Implementation phase\nOperations & Maintenance phase\n\n\nNetwork Diagnostics and Troubleshooting\n\nInterpreting device alarms and event logs\nEarly indicators\nNetwork intrusion detection systems\nNetwork management tools\n\n\nApplication Diagnostics and Troubleshooting\n\nInterpreting OS and application alarms and event logs\nEarly indicators\nApplication management and whitelisting tools\nAntivirus and endpoint protection tools\nSecurity incident and event monitoring (SIEM) tools\n\n\nIACS Cybersecurity Operating Procedures & Tools\n\nDeveloping and following an IACS management of change procedure\nDeveloping and following an IACS backup procedure\nIACS configuration management tools\nDeveloping and following an IACS patch management procedure\nPatch management tools\nDeveloping and following an IACS antivirus management procedure\nAntivirus and whitelisting tools\nDeveloping and following an IACS cybersecurity audit procedure\nAuditing tools\n\n\nIACS incident response\n\nDeveloping and following an IACS incident response plan\nIncident investigation\nSystem recovery\n\n\n\n  \nClassroom/Laboratory Exercises: \n\nAsset Inventory\nICS Device Hardening\nDisabling USB Storage Devices\nRestrict access to USB drives\nApplication Control / Whitelisting\nMicrosoft Windows Software Update Services (WSUS)\nPLC backup and configuration management\nChange Management (MOC form)\nEvent Detection Tracking and Log Monitoring\nVulnerability Scanning\nNetwork Packet Capture Analysis\nTroubleshooting and Forensics\n\n  \nWho Should Attend? \n\nOperations and maintenance personnel\nControl systems engineers and managers\nSystem Integrators\nIT engineers and managers industrial facilities\nPlant Safety and Risk Management\n\n  \nRecommended Pre-Requisites: \nISA Courses TS06\, TS12\, TS20\, IC32\, IC33 and IC34 or equivalent knowledge/experience. \n  \nRecommended Reading: \nCybersecurity Library
URL:https://www.houstonisa.org/event/iacs-cybersecurity-operations-maintenance-ic37/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Cyber-Security,Training
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210505T080000
DTEND;TZID=America/Chicago:20210507T160000
DTSTAMP:20260413T084530
CREATED:20210415T054025Z
LAST-MODIFIED:20210415T055214Z
UID:10000121-1620201600-1620403200@www.houstonisa.org
SUMMARY:Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
DESCRIPTION:Certificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nUse Coupon code: HOUS2021 to receive discount of $200 off registration.\nCertification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nDescription: \nThe first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1 these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system\, identifying security level targets\, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). \nThis course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements the project. \nYou Will Be Able to: \n\nIdentify and document the scope of the IACS under assessment\nSpecify\, gather or generate the cybersecurity information required to perform the assessment\nIdentify or discover cybersecurity vulnerabilities inherent in the IACS products or system design\nOrganize and facilitate a cybersecurity risk assessment for an IACS\nIdentify and evaluate realistic threat scenarios\nIdentify gaps in existing policies\, procedures and standards\nEstablish and document security zones and conduits\nPrepare documentation of assessment results\n\nYou Will Cover: \n\nPreparing for an Assessment\nCybersecurity Vulnerability Assessment\nConducting Vulnerability Assessments\nCyber Risk Assessments\nConducting Cyber Risk Assessments\nDocumentation and Reporting\nAnd more…\n\nClassroom/Laboratory Exercises: \n\nCritiquing system architecture diagrams\nAsset Inventory\nGap Assessment\nWindows Vulnerability Assessment\nCapturing Ethernet Traffic\nPort Scanning\nUsing Vulnerability Scanning Tools\nPerform a high-level risk assessment\nCreating a zone & conduit diagram\nPerform a detailed cyber risk assessment\nCritiquing a cybersecurity requirements specification\n\nWho Should Attend: \n\nControl systems engineers and managers\nSystem Integrators\nIT engineers and managers industrial facilities\nIT corporate/security professionals\nPlant Safety and Risk Management\n\nRecommended Pre-Requisite: \nISA Course IC32 or equivalent knowledge/experience. \nRecommended Reading: \nCybersecurity Library
URL:https://www.houstonisa.org/event/assessing-the-cybersecurity-of-new-or-existing-iacs-systems-ic33/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Cyber-Security,Training
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210503T080000
DTEND;TZID=America/Chicago:20210504T160000
DTSTAMP:20260413T084530
CREATED:20210415T052941Z
LAST-MODIFIED:20210415T055207Z
UID:10000015-1620028800-1620144000@www.houstonisa.org
SUMMARY:Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
DESCRIPTION:Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course. \nCertificate Program: Part of the ISA/IEC 62443 Cybersecurity Certificate Program \nYour course registration includes your registration for the exam. \nUse Coupon code: HOUS2021 to receive discount of $200 off registration. \nDescription: \nThe move to using open standards such as Ethernet\, TCP/IP\, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA99 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. \nYou will be able to: \n\nDiscuss the principles behind creating an effective long term program security\nInterpret the ISA/IEC 62443 industrial security framework and apply them to your operation\nDefine the basics of risk and vulnerability analysis methodologies\nDescribe the principles of security policy development\nExplain the concepts of defense in depth and zone/conduit models of security\nAnalyze the current trends in industrial security incidents and methods hackers use to attack a system\nDefine the principles behind the key risk mitigation techniques\, including anti-virus and patch management\, firewalls\, and virtual private networks\n\nYou will cover: \n\nUnderstanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same\nHow Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks\nCreating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nRisk Analysis:  Business Rationale | Risk Identification\, Classification\, and Assessment\nAddressing Risk with Security Policy\, Organization\, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness\nAddressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control\nAddressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management\nMonitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS\nValidating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems\n\nClassroom/Laboratory Demo: \n\nPCAP Live Capture Analysis\n\nIncludes ISA Standards: \n\nANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007)\, Security for Industrial Automation and Control Systems Part 1: Terminology\, Concepts & Models\nANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)\, Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program\nANSI/ISA-62443-3-3\, Security for industrial automation and control systems: System security requirements and security levels\n\nRecommended Pre-Requisites: \nThere are no required prerequisites for taking this course; however\, it is highly recommended that applicants have at least one to three years of experience in the cybersecurity field with some experience in an industrial setting. \nISA Courses: TS06\, TS12\, or equivalent knowledge/experience would be beneficial. \nNote from the Instructor: One of the challenges I have had in teaching IC32 is students attending without any or limited knowledge of TS04\, TS06\, TS12 or cybersecurity general principles. IC32 is a 14-hour boot camp style class and there is not a lot of time to teach basic comms and cybersecurity. \nRecommended reading in preparation for course: \nCybersecurity Library \nWhich Security Level (SL) would have been required to prevent the attack? \nNot sure this particular course is for you? \nA pre-instructional survey is available for you to evaluate your level of understanding of the course material and to show you the types of questions you’ll be able to answer after completing the course.
URL:https://www.houstonisa.org/event/using-the-isa-iec-62443-standards-to-secure-your-control-systems-ic32/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Cyber-Security,Training
ORGANIZER;CN="Jacqueline Buskop":MAILTO:jbuskop@wesleyan.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20190508T080000
DTEND;TZID=America/Chicago:20190510T170000
DTSTAMP:20260413T084530
CREATED:20190916T132251Z
LAST-MODIFIED:20190916T132251Z
UID:10000103-1557302400-1557507600@www.houstonisa.org
SUMMARY:IC33 – Assessing the Cybersecurity of New or Existing IACS Systems
DESCRIPTION:The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1\, these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system\, identifying security level targets\, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). \nThis course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a CRS that can be used to document the cybersecurity requirements for a project. \nYou will be able to:\n\nIdentify and document the scope of the IACS under assessment\nSpecify\,gather\, or generate the cybersecurity information required to perform the assessment\nIdentify or discover cybersecurity vulnerabilities inherent in the IACS’ products or system design\nOrganize and facilitate a cybersecurity risk assessment for an IACS\nIdentify and evaluate realistic threat scenarios\nIdentify gaps in existing policies\, procedures\, and standards\nEstablish and document security zones and conduits\nDevelop a cybersecurity requirements specification (CRS)\n\nTo register: \nhttps://www.isa.org/events-conferences/events-calendar/event-details/?productId=63250535
URL:https://www.houstonisa.org/event/ic33-assessing-the-cybersecurity-of-new-or-existing-iacs-systems/
LOCATION:AE Solutions\, 10375 Richmond Avenue\, Suite 800 Houston\, TX 77042 United States\, Houston\, TX\, 77042\, United States
CATEGORIES:Event
ATTACH;FMTTYPE=image/jpeg:https://www.houstonisa.org/wp-content/uploads/2019/09/training.jpg
ORGANIZER;CN="Magda Moreno":MAILTO:magda.moreno.v@outlook.com
END:VEVENT
END:VCALENDAR