ISA Training at the OT Cybersecurity Summit
Take advantage of ISA's most popular industrial cybersecurity training at this event!
The International Society of Automation (ISA) offers the most comprehensive set of industrial cybersecurity certificate training courses in the market—covering the complete lifecycle of industrial automation and control system (IACS) assessment, design, implementation, operations and maintenance.
This ISA industrial cybersecurity training and its knowledge-based certificate program are based on ISA/ IEC 62443—the world’s only consensus-based series of IACS standards and a key component of government cybersecurity plans.
Select the course you want to take on the "Training Registration Options" drop-down list within the event registration form. Conference registration is not required to take a training course. Training fees are in addition to conference fees.
Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
Separate registration fee applies. To register, select this course on the event registration form.
- Onsite/in-person delivery
- Course Dates: 20-21 June 2025, 08:00-16:00
- CEU Credits: 1.4
- A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course
Description
This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.
With the move to using open standards, such as Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP), and web technologies, in supervisory control and data acquisition (SCADA) and process control networks (PCN), systems are being exposed to the same cyberattacks facing corporate information systems, protecting control systems is more important than ever.
Certificate Program
This is a preparatory class for the ISA/IEC 62443 Cybersecurity Certificate Program. The course registration includes the fee for one exam.
Learning Objectives
- Discuss the principles behind creating an effective long-term program security
- Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
- Define the basics of risk and vulnerability analysis methodologies
- Describe the principles of security policy development
- Explain the concepts of defense in depth and zone/conduit models of security
- Analyze the current trends in industrial security incidents and methods hackers use to attack a systemDefine the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls and virtual private networks
Topics Covered
- Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
- How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
- Creating A Security Program: Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- Risk Analysis: Business Rationale | Risk Identification, Classification, and Assessment
- Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
- Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
- Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
- Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
- Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems
Classroom/Laboratory Demo
- PCAP Live Capture Analysis
Includes ISA Standards
- ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
- ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels
Instructor:
Marco Ayala
President, InfraGard Houston,
ISA Fellow

Marco (Marc) brings decades of expertise in process automation, safety systems and industrial control networks with an extensive focus on securing the energy, oil and gas, maritime, offshore and chemical sectors. A seasoned ISA leader, cybersecurity advocate, InfraGard Houston President, and USCG AMSC Cyber Chair for the Gulf of Mexico. He is highly active in the International Society of Automation and is a longtime member and newly elected to the Executive Board. He is an ISA Fellow and a certified cyber instructor for ISA (62443).
Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
Separate registration fee applies. To register, select this course on the event registration form.
- Onsite/in-person delivery
- Course Dates: 20-21 June 2025, 08:00-16:00
- CEU Credits: 1.4
- A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course
Description
This course provides students with the information and skills to assess the cybersecurity of a new or existing industrial automation and control system (IACS); and to develop a cybersecurity requirements specification (CRS) that can be used to document the cybersecurity requirements of the project.
IC33 focuses on the first phase of the IACS Cybersecurity Lifecycle, as defined in ISA/IEC 62443-1-1 standard. Students learn to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA/IEC 62443-2-1, these assessments need to be performed on both new (i.e., greenfield) and existing (i.e., brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system, identifying security level targets, and documenting the cybersecurity requirements in a CRS.
Certificate Program
IC33 is the second course in the ISA/IEC 62443 Cybersecurity Certificate Program. Pass the exam to earn the ISA/IEC 62443 Cybersecurity Risk Assessment Specialist certificate. Course registration includes one exam fee.
Learning Objectives
- Identify and document the scope of the IACS under assessment
- Specify, gather, or generate the cybersecurity information required to perform the assessment
- Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design
- Interpret the results of a Process Hazard Analysis (PHA)
- Organize and facilitate a cybersecurity risk assessment for an IACS
- Identify and evaluate realistic threat scenarios
- Identify and assess the effectiveness of existing countermeasures
- Identify gaps in existing policies, procedures, and standards
- Evaluate the cost, complexity, and effectiveness of new countermeasures to make meaningful recommendations
- Establish and document security zones and conduits
- Develop a Cybersecurity Requirements Specification (CRS)
Topics Covered
- Preparing for an Assessment
- Security lifecycle
- Scope
- System architecture diagrams
- Network diagrams
- Asset inventory
- Cyber criticality assessment
Cybersecurity Vulnerability Assessment
- Risk
- Types of cybersecurity vulnerability assessments
- High-level assessments
- Passive and active assessments
- Penetration testing
- Conducting high-level assessments
- Assessment tools
- Cyber Security Evaluation Tool (CSET)
Instructor:
Steve Mustard
President, Au2mate

Steve, PE, CAP, GISP, CMCP, has over 35 years of experience in the automation industry. He has developed embedded software and hardware for military applications and created products for industrial automation and control systems. Currently, much of his work focuses on assessing the cybersecurity readiness of organizations in critical infrastructure.
In addition to being the former 2021 ISA President, Steve holds multiple certifications and professional engineering licenses. These include being a licensed Professional Engineer (PE), an ISA Certified Automation Professional (CAP), a UK-registered Chartered Engineer (CEng), a Fellow of the International Society of Automation (ISA), a Fellow of the Institution of Engineering & Technology, a European-registered Engineer (EUR Ing), a Global Industrial Cyber Security Professional (GICSP) and a Certified Mission Critical Professional (CMCP).
Incident Command System for Industrial Control Systems (ICS4ICS) Workshop
Separate registration fee applies. To register, select this workshop on the event registration form.
- Onsite/in-person delivery
- Course Dates: 20 June 2025, 08:00-16:00
Description
The ICS4ICS exercise will demonstrate how the framework manages cyber incident response efforts. We will also coordinate physical response activities performed by the business. The exercise will enable players to learn by performing key roles on the ICS4ICS team. It will also demonstrate how ICS4ICS templates can be used to perform critical functions required during a cyber incident. Players who complete the required training before the exercise can obtain their ICS4ICS Credentials.
ICS4ICS leverages the Incident Command System to improve cyber incident management capabilities. We will demonstrate how ICS4ICS can be used to expedite the resolution of cyber incidents. We will also share resources that are used as part of an ICS4ICS program, including process templates, such as ransomware, government reporting, etc. We will also review ICS4ICS Guides describing the deployment of an ICS4ICS program, hosting an exercise, and training ICS4ICS staff with role guides. All materials and resources are free when used by an individual company.
ICS4ICS leverages external resources, including the FEMA NIMS/Incident Command System, DHS CISA cyber incident response materials, and the NIST Computer Incident Response Guide. ICS4ICS uniquely separates technical cyber incident response work from incident management and administrative activities so the right people are working on the right tasks. We will review the Computer Incident Response Plan template developed to compliment the ICS4ICS Plan template so you can deploy these processes at your company.
We will demonstrate how you can improve organization capabilities through Workforce Development (WFD) self-assessment tools created by the ICS4ICS team. We will also share information on leveraging vendors, consultants/MSPs, high-tech companies and mutual aid resources to ensure sufficient staffing to manage cyber incidents.
