We were thrilled with the overwhelmingly enthusiastic response we had for these aeSolutions hosted classes which were taught by 3 different instructors. The original post with event details is archived below.
“Thanks to the students whose active participation in the class made it successful! I thoroughly enjoyed teaching the class and was pleasantly surprised how engaged the students were and keen to apply risk analysis concepts to ICS cybersecurity. There were also good discussions around Cyber Requirement Specifications, cyber FAT and ICS Pen Testing (controlled environment) .” Krish Sridhar, Instructor for the IC33 training
Photos by Marco Ayala
Interested in attending a future aeSolutions training? Check out our website at https://www.aesolns.com/training/ for the latest information about upcoming dates or email us at firstname.lastname@example.org.
#cybersecurity #training #ISA
The follow is the original post:
Next month aeSolutions’ Houston office will be hosting 4 different ISA courses held over 3 weeks in May! All courses are part of the ISA/IEC 62443 Cybersecurity Certificate Program and each course registration includes your registration for the corresponding exams.
Enter the referral code “AES2019” when you register for a thank you gift from aeSolutions!
The training courses being offered are as follows:
05/6 – 05/7 IC32 – Using the ISA/IEC 62443 Standards to Secure Your Control Systems : This course provides a detailed look at how the ANSI/ISA99 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.
Instructor: John Cusimano, CISSP, GICSP, CFSE
John Cusimano is the Vice President of Industrial Cybersecurity with aeSolutions. He has over 20 years of experience and has performed countless control system cybersecurity vulnerability and cyber risk assessments in the process industries. John has also overseen and participated in the security testing and certification of several control and safety systems. He is a leader in the development of ICS cybersecurity standards and best practices, is chairman of the ISA 99 zones & conduits committee, and co-chair of the ISA 99 product development committee. John was instrumental in the development of the ISASecure certification scheme and is a US expert to the IEC TC65 WG10 committee. He is a Certified Functional Safety Expert (CFSE), a Certified Information Systems Security Professional (CISSP), and a Global Industrial Cyber Security Professional (GICSP). John has a B.S. in Electrical and Computer Engineering from Clarkson University in New York. He is the lead course developer and instructor for the ISA series of cybersecurity training courses and has been teaching the ISA courses since 2012.
05/8 – 05/10 IC33 – Assessing the Cybersecurity of New or Existing IACS Systems : The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. This course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a CRS that can be used to document the cybersecurity requirements for a project.
Instructor: Krish Sridhar
Krish Sridhar is a subject matter expert on cybersecurity solutions applied to industrial control systems. He brings over 20 years of industry experience with process automation, high availability architectures, industrial networks and application software. Krish has executed many cybersecurity risk and vulnerability assessment projects for chemical, specialty chemical, life sciences and CFATS compliant companies per the NIST framework and ISA 99/IEC 62443 standards. His particular expertise and experience is to develop and design holistic cybersecurity program for industrial control systems leveraging proven IT technologies, ICS security tools and products and industry best practices. Krish works closely with various stakeholders within an organization to develop detailed implementation protocols, procedures, guidelines and help manage the lifecycle of a cybersecurity program.
05/14 – 05/16 IC34 – IACS Cybersecurity Design & Implementation : The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new and existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification (CRS).
Instructor: Marco (Marc) Ayala
Marc Ayala is a Senior Project Manager with aeSolutions. Marc has been involved in process automation and safety and is active in the chemical sector cybersecurity effort working alongside the Department of Homeland Security (DHS) for securing the private sector. Marc has trained extensively with Idaho National Labs with colleagues focusing on ICS-CERT. He has worked as an end user from I&E and I&C throughout his career handling advanced process control, maintenance and design of enterprise historians, and has worked with enterprise-IT to perfect a direct balance of ICS/SCADA Industrial-IT and demarcation with Enterprise-IT. Marc has secured multiple chemical plant processes in the US for CFATS (Chemical Facility Anti-Terrorism Standards) and has secured facilities in the Netherlands creating the first global ICS/SCADA security operations center (SOC) based in Houston Texas. He has been teaching ISA courses since 2015.
05/21-05/23 IC37 – IACS Cybersecurity Operations & Maintenance : The third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an ever-changing threat environment.
Instructor: Marco (Marc) Ayala – see bio above