ISA Training at the OT Cybersecurity Summit

Take advantage of ISA's most popular industrial cybersecurity training at this event!

The International Society of Automation (ISA) offers the most comprehensive set of industrial cybersecurity certificate training courses in the market—covering the complete lifecycle of industrial automation and control system (IACS) assessment, design, implementation, operations and maintenance.

This ISA industrial cybersecurity training and its knowledge-based certificate program are based on ISA/ IEC 62443—the world’s only consensus-based series of IACS standards and a key component of government cybersecurity plans. 

Select the course you want to take on the "Training Registration Options" drop-down list within the event registration form. Conference registration is not required to take a training course. Training fees are in addition to conference fees.

Students who register for the IC32 or IC34 offering held alongside the ISA OT Cybersecurity Summit are eligible to receive a special 30% discount, available until 1 April 2026, on the below self-paced online courses:

A code will be shared with all registrants who qualify for this discount.

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)

Separate registration fee applies. To register, select this course on the event registration form.

  • Onsite/in-person delivery
  • Course Dates: 19-20 June 2026, 08:00-16:00
  • CEU Credits: 1.4
  • A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course
Description

This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. 

With the move to using open standards, such as Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP), and web technologies, in supervisory control and data acquisition (SCADA) and process control networks (PCN), systems are being exposed to the same cyberattacks facing corporate information systems, protecting control systems is more important than ever.

Certificate Program

This is a preparatory class for the ISA/IEC 62443 Cybersecurity Certificate Program. The course registration includes the fee for one exam.

Learning Objectives
  • Discuss the principles behind creating an effective long-term program security
  • Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
  • Define the basics of risk and vulnerability analysis methodologies
  • Describe the principles of security policy development
  • Explain the concepts of defense in depth and zone/conduit models of security
  • Analyze the current trends in industrial security incidents and methods hackers use to attack a system
  • Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls and virtual private networks
Topics Covered
  • Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
  • How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
  • Creating A Security Program: Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • Risk Analysis: Business Rationale | Risk Identification, Classification and Assessment 
  • Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
  • Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
  • Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
  • Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
  • Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems
Classroom/Laboratory Demo 
  • PCAP Live Capture Analysis
Includes ISA Standards
  • ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
  • ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels

Instructor:
Marco Ayala
President, InfraGard Houston,
ISA Fellow
Marco Ayala
Marco (Marc) brings decades of expertise in process automation, safety systems and industrial control networks with an extensive focus on securing the energy, oil and gas, maritime, offshore and chemical sectors. A seasoned ISA leader, cybersecurity advocate, InfraGard Houston President, and USCG AMSC Cyber Chair for the Gulf of Mexico. He is highly active in the International Society of Automation and is a longtime member and newly elected to the Executive Board. He is an ISA Fellow and a certified cyber instructor for ISA (62443).

IACS Cybersecurity Design & Implementation (IC34)

Separate registration fee applies. To register, select this course on the event registration form.

  • Onsite/in-person delivery
  • Course Dates: 19-21 June 2026, 08:00-16:00
  • CEU Credits: 2.1
  • A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the entire three-day course
Description

Industrial Automation Control System (IACS) Cybersecurity Design & Implementation (IC34) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This includes the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the assess phase. The access phase includes cybersecurity acceptance testing of the integrated solution to validate that countermeasures are properly implemented and the IACS has achieved the target security level.

Students will learn the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification.  

Certificate Program

IC34 is third course in the ISA/IEC 62443 Cybersecurity Certificate Program. The course registration includes the exam fee. Pass the exam to earn the ISA/IEC 62443 Cybersecurity Design Specialist Certificate designation.

Required Prerequisites 

Successful completion of Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) and passing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist certificate exam are mandatory prerequisites for this course.

Who Should Take IC34?
  • Control systems engineers and managers
  • System integrators
  • IT engineers and managers in industrial facilities
  • Plant managers
  • Plant safety and risk management personnel
Learning Objectives
  • Interpret the results of an industrial control system (ICS) cybersecurity risk assessment
  • Develop a cybersecurity requirements specification (CRS)
  • Develop a conceptual design based upon information in a well-crafted CRS
  • Explain the security development lifecycle (SLD) process and deliverables
  • Perform a basic firewall configuration and commissioning
  • Design a secure remote access solution
  • Develop system hardening specification
  • Implement a basic network intrusion detection system (IDS)
  • Develop a cybersecurity acceptance test plan
    • Cybersecurity factory acceptance test (CFAT)
    • Cybersecurity site acceptance test (CSAT)
  • Perform a basic CFAT or CSAT
Topics Covered
  • Introduction to the ICS Cybersecurity Lifecycle
    • Assessment phase
    • Implementation phase
    • Maintenance phase
  • Conceptual Design Process
    • Interpreting risk assessment results
    • Cybersecurity requirements specifications
    • Developing a conceptual design
    • Conceptual design specification
  • Detailed Design Process
    • SDL
    • Types of technology
    • Selecting appropriate technology
    • Developing a detailed design
    • Documenting the design/specification
  • Design & Implementation Examples
    • Firewall design example
    • Remote access design example
    • System hardening design example
    • Intrusion detection design example
  • Testing
    • Developing test plans
    • CFAT
    • CSAT
Exercises
  • Building the board
  • Firewalls
  • Defining USB policy and procedure
  • Network device hardening
  • Remote access
  • Using 62443 3-3 to validate achieved security level (SL-A)
Recommended Prerequisites

ISA course Assessing the Cybersecurity of New or Existing IACS Systems (IC33) or equivalent knowledge/experience.

Recommended Resources
  • ISA-62443-1-1-2007, Security for Industrial Automation and Control Systems – Part 1-1: Terminology, Concepts and Models (Standard)
  • ANSI/ISA-62443-2-1-2024, Security for Industrial Automation and Control Systems – Part 2-1: Security Program Requirements for IACS Asset Owners ​(Standard)
  • ANSI/ISA-62443-3‑2-2020, Security for Industrial Automation and Control Systems – Part 3‑2: Security Risk Assessment for System Design ​(Standard)
  • ANSI/ISA-62443-3-3 (99.03.03)-2013, Security for Industrial Automation and Control Systems – Part 3-3: System Security Requirements and Security Levels ​(Standard)
  • ISA Cybersecurity Library (Publication)

Instructor:
Steve Mustard
President, au2mation,
ISA Fellow
Steve Mustard - 100px
Steve, PE, CAP, GISP, CMCP, has over 35 years of experience in the automation industry. He has developed embedded software and hardware for military applications and created products for industrial automation and control systems. Currently, much of his work focuses on assessing the cybersecurity readiness of organizations in critical infrastructure. 

In addition to being the former 2021 ISA President, Steve holds multiple certifications and professional engineering licenses. These include being a licensed Professional Engineer (PE), an ISA Certified Automation Professional (CAP), a UK-registered Chartered Engineer (CEng), a Fellow of the International Society of Automation (ISA), a Fellow of the Institution of Engineering & Technology, a European-registered Engineer (EUR Ing), a Global Industrial Cyber Security Professional (GICSP) and a Certified Mission Critical Professional (CMCP).

Laptop is required for this course.

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)

Separate registration fee applies. To register, select this course on the event registration form.

  • Onsite/in-person delivery
  • Course Dates: 20-21 June 2025, 08:00-16:00
  • CEU Credits: 1.4
  • A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course
Description

This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. 

With the move to using open standards, such as Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP), and web technologies, in supervisory control and data acquisition (SCADA) and process control networks (PCN), systems are being exposed to the same cyberattacks facing corporate information systems, protecting control systems is more important than ever.

Certificate Program

This is a preparatory class for the ISA/IEC 62443 Cybersecurity Certificate Program. The course registration includes the fee for one exam.

Learning Objectives
  • Discuss the principles behind creating an effective long-term program security
  • Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
  • Define the basics of risk and vulnerability analysis methodologies
  • Describe the principles of security policy development
  • Explain the concepts of defense in depth and zone/conduit models of security
  • Analyze the current trends in industrial security incidents and methods hackers use to attack a system
  • Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls and virtual private networks
Topics Covered
  • Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
  • How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
  • Creating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • Risk Analysis: Business Rationale | Risk Identification, Classification, and Assessment 
  • Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
  • Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
  • Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
  • Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
  • Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems
Classroom/Laboratory Demo 
  • PCAP Live Capture Analysis
Includes ISA Standards
  • ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
  • ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels

Instructor:
Marco Ayala
President, InfraGard Houston,
ISA Fellow
Marco Ayala
Marco (Marc) brings decades of expertise in process automation, safety systems and industrial control networks with an extensive focus on securing the energy, oil and gas, maritime, offshore and chemical sectors. A seasoned ISA leader, cybersecurity advocate, InfraGard Houston President, and USCG AMSC Cyber Chair for the Gulf of Mexico. He is highly active in the International Society of Automation and is a longtime member and newly elected to the Executive Board. He is an ISA Fellow and a certified cyber instructor for ISA (62443).

Assessing the Cybersecurity of New or Existing IACS Systems (IC33)

Separate registration fee applies. To register, select this course on the event registration form.

  • Onsite/in-person delivery
  • Course Dates: 20-21 June 2025, 08:00-16:00
  • CEU Credits: 1.4
  • A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course
Description

This course provides students with the information and skills to assess the cybersecurity of a new or existing industrial automation and control system (IACS); and to develop a cybersecurity requirements specification (CRS) that can be used to document the cybersecurity requirements of the project. 

IC33 focuses on the first phase of the IACS Cybersecurity Lifecycle, as defined in ISA/IEC 62443-1-1 standard. Students learn to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA/IEC 62443-2-1, these assessments need to be performed on both new (i.e., greenfield) and existing (i.e., brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system, identifying security level targets, and documenting the cybersecurity requirements in a CRS.

Certificate Program

IC33 is the second course in the ISA/IEC 62443 Cybersecurity Certificate Program. Pass the exam to earn the ISA/IEC 62443 Cybersecurity Risk Assessment Specialist certificate. Course registration includes one exam fee.

Learning Objectives
  • Identify and document the scope of the IACS under assessment
  • Specify, gather, or generate the cybersecurity information required to perform the assessment
  • Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design
  • Interpret the results of a Process Hazard Analysis (PHA)
  • Organize and facilitate a cybersecurity risk assessment for an IACS
  • Identify and evaluate realistic threat scenarios
  • Identify and assess the effectiveness of existing countermeasures
  • Identify gaps in existing policies, procedures, and standards
  • Evaluate the cost, complexity, and effectiveness of new countermeasures to make meaningful recommendations
  • Establish and document security zones and conduits
  • Develop a Cybersecurity Requirements Specification (CRS)
Topics Covered
  • Preparing for an Assessment
  • Security lifecycle
  • Scope
  • System architecture diagrams
  • Network diagrams
  • Asset inventory
  • Cyber criticality assessment
Cybersecurity Vulnerability Assessment
  • Risk
  • Types of cybersecurity vulnerability assessments
  • High-level assessments
  • Passive and active assessments
  • Penetration testing
  • Conducting high-level assessments
  • Assessment tools
  • Cyber Security Evaluation Tool (CSET)

Instructor:
Steve Mustard
President, au2mation,
ISA Fellow
Steve Mustard - 100px
Steve, PE, CAP, GISP, CMCP, has over 35 years of experience in the automation industry. He has developed embedded software and hardware for military applications and created products for industrial automation and control systems. Currently, much of his work focuses on assessing the cybersecurity readiness of organizations in critical infrastructure. 

In addition to being the former 2021 ISA President, Steve holds multiple certifications and professional engineering licenses. These include being a licensed Professional Engineer (PE), an ISA Certified Automation Professional (CAP), a UK-registered Chartered Engineer (CEng), a Fellow of the International Society of Automation (ISA), a Fellow of the Institution of Engineering & Technology, a European-registered Engineer (EUR Ing), a Global Industrial Cyber Security Professional (GICSP) and a Certified Mission Critical Professional (CMCP).

Incident Command System for Industrial Control Systems (ICS4ICS) Workshop

 Course Date: 16 June 2026, 10:30-17:00 

Separate registration fee applies.
To register, select this workshop on the event registration form.


Overview

Hands-on workshop demonstrating the ICS4ICS framework for managing cyber incident responses.

Understand
  1. Understanding of how ICS4ICS expedites cyber incident resolution.
  2.  Leverage FEMA NIMS/Incident Command System.
  3. Utilize DHS CISA materials and NIST Computer Incident Response Guide.

Key Features

  • Understand:  Improving Industrial Cybersecurity | ICS4ICS Program by ISAGCA
  • Learn by performing or observing key roles on the ICS4ICS team.
  • Obtain your ICS4ICS credentials by completing the required ICS4ICS Credentials Training.
  • Overcome incident staffing challenges by learning about Staffing and Work Force.

What You’ll Gain

  • Establish ICS4ICS Program Processes | Tools for Incident Management
  • Learn about prerequisites to deploy an ICS4ICS program (e.g., Delegation of Authority, ICS4ICS Job Aids, NIMS/ICS Forms and Cyber Insurance if appropriate)
  • Leveraging ICS4ICS procedure templates (e.g., ransomware, government reporting).

Exercises

Join us to enhance your skills and network with fellow professionals dedicated to effective cyber incident management!

Brian Peterson
Instructor:
Brian Peterson
ICS4ICS Program Manager


OT Cyber Insurance and Risk Transfer: Right-Sizing Coverage Using Evidence, Not Guesswork 

09:00-10:15 

Registrants of the ICS4ICS Workshop are encouraged to join us early for a special presentation sponsored by ISAGCA.

Session Description: Provide a practical framework to decide what to insure, what to retain, and what to mitigate—using quantified OT cyber loss scenarios to improve insurability and negotiate coverage on stronger terms. 

Incident Command System for Industrial Control Systems (ICS4ICS) Workshop

Separate registration fee applies. To register, select this workshop on the event registration form.

  • Onsite/in-person delivery
  • Course Date: 20 June 2025, 08:00-16:00
Description
  • Overview: Hands-on workshop demonstrating the ICS4ICS framework for managing cyber incident responses.
  • Key Features:
    • Learn by performing key roles on the ICS4ICS team.
    • Earn ICS4ICS Credentials with required pre-training.
  • What You’ll Gain:
    • Understanding of how ICS4ICS expedites cyber incident resolution.
    • Access to free resources, including:
      • Process templates (e.g., ransomware, government reporting).
      • Guides for deploying ICS4ICS programs and training staff.
  • External Resources:
    • Leverage FEMA NIMS/Incident Command System.
    • Utilize DHS CISA materials and NIST Computer Incident Response Guide.
  • Workforce Development:
    • Tools for self-assessment to improve organizational capabilities.
    • Strategies for engaging vendors, consultants, and mutual aid resources.

Join us to enhance your skills and network with fellow professionals dedicated to effective cyber incident management!


Brian Peterson
Instructor:
Brian Peterson
ICS4ICS Program Manager
ISA