ISA Cybersecurity Standards Implementation Conference

Wednesday, October 26, 2022, 8:00 am – 17:00 CT


Wednesday, October 26, 2022, 8:00 am – 17:00 CT

Add to Calendar 10/26/2022 08:00 AM 10/26/2022 04:00 PM America/Chicago ISA Cybersecurity Standards Implementation Conference The 2022 ISA CSIC Conference will focus on the growing adoption of ISA/IEC Cyber Security Standards across various industries.




About the Event

The 2022 ISA CSIC Conference will focus on the growing adoption of ISA/IEC Cyber Security Standards across various industries.

This program will identify the current themes and threat landscape unfolding in various industries including energy, manufacturing, building automation, and water handling. With this broader application comes increased alignment with safety concerns. These will be addressed through expert panels discussing the work-force development opportunities for cybersecurity education, end-user case studies will highlight real-world adoption of cybersecurity standards and best practice applications to streamline processes and reduce costs, while protecting people and property from increased cyber threats.


Wednesday, 26 October, 2022

time iconOctober 26, 2022 08:00

Exhibit Hall Opens (08:00 CT)

time iconOctober 26, 2022 09:00

Keynote: Correlating Standards and How to Deploy into a Successful Program (09:00 CT)

speaker headshot

Captain Keith Donohue
Deputy Sector Commander, US Coast Guard Houston-Galveston

time iconOctober 26, 2022 09:30

Break (09:30 CT)

time iconOctober 26, 2022 09:45

Mapping the IIC IoT Security Maturity Model to ISA/IEC 62443 (10:00 CT)

speaker headshot

Jim Gilsinn
Technical Leader, Dragos

Organizations looking to utilize and/or build Industrial Internet of Things (IIoT) devices have to contend with numerous overlapping and interrelated standards and requirements from the information technology (IT), operational technology (OT), and industrial control system (ICS) environments. The Industry IoT Consortium (IoT) approached the International Society of Automation (ISA) to see how they could work together to understand these areas of overlap and relationship. The result is a mapping document that brings together the IIC’s IoT Security Maturity Model (SMM) and the ISA/IEC 62443 series for asset owners, product suppliers, and service providers.

time iconOctober 26, 2022 10:30

Break (10:30 CT)

time iconOctober 26, 2022 10:45

Panel Discussion: Understanding and Developing 62443, Parts 2-1 and 2-4 (10:45 CT)

speaker headshot

Moderator: Scott Reynolds
Johns Manville

speaker headshot

Jim Gilsinn

speaker headshot

Patrick O’Brien

speaker headshot

Josh Carlson

speaker headshot

Greg Houser
Senior Cybersecurity Engineer, Exida

time iconOctober 26, 2022 11:15

Break (11:15 CT)

time iconOctober 26, 2022 11:30

Technology Demonstration (11:30 CT)

speaker headshot

Nick Bartosh
Solutions Architect, Finite State

Sponsored by Finite State

time iconOctober 26, 2022 12:00

Break (12:00 CT)

time iconOctober 26, 2022 12:15

Prediction of Fluid and Transport Properties for Flow in Porous Media Using Hybrid Approaches (12:15 CT)

speaker headshot

Birol Dindorik
University of Houston

time iconOctober 26, 2022 12:45

Lunch and Learn with Wood (12:45 CT)

speaker headshot

German Carmona
Global President of Applied Intelligence, Wood

time iconOctober 26, 2022 13:45

Dazed and Confused: The Risk of Conflating Threat, Vulnerabilities, and Tactics (13:45 CT)

speaker headshot

Garrett Myler
Enclave Defense

Most know that threats and vulnerabilities are fundamental aspects of determining cyber risk. But some may be using an outdated "threat" model that conflates threats with attack tactics. For others, a lack of clarity between a threat source and a threat event may lead to a risk assessment that isn't appropriately tailored to their organization. Getting one variable wrong can corrupt your entire risk assessment. In this presentation, Garrett will use real-world mistakes to make sure you're not left dazed and confused about these aspects of a 63443 risk assessment

time iconOctober 26, 2022 14:15

Break (14:15 CT)

time iconOctober 26, 2022 14:30

Achieving and Maintaining your ISA/IEC62443 Security Level Targets (14:30 CT)

speaker headshot

Rick Kaun
VP Solutions, Verve

Sponsored by Verve Industrial Protection

ISA/IEC 62443 has created a robust and effective ICS cybersecurity framework that provides a great roadmap for many organizations to establish a set of prioritized objectives.  Verve’s been working with industrial control systems for 30 years and have been working with dozens of organizations over the past few years trying to adapt security to new guidelines such as 62443. One of the largest challenges we have seen and addressed is how to ensure you achieve and then maintain the targets. Over the past 15 years, we have helped dozens of clients efficiently, effectively, and safely achieve their SL-Ts as well as maintain them. We’ll describe some of these learnings and how you can practically improve and maintain your security levels.

time iconOctober 26, 2022 15:00

Break (15:00 CT)

time iconOctober 26, 2022 15:15

Deploying IoT Devices into Oil & Gas Fields (15:15 CT)

speaker headshot

Philippe Flichy
Fractional Chief Information Security Officer, Cykur

This presentation describes the steps taken by a company to deploy IoT devices to Oil & Gas fields. As the installation of the devices were to be conducted by third parties, the challenge was to make sure that a device would be properly identified and deployed where it was intended to be deployed and by the right installer. The reporting of the data had to clearly identify each IoT device paired with a specific tool on a specific pump. We will review how keys and geolocation was used to ensure the veracity of the data.

time iconOctober 26, 2022 15:45

Break (15:45 CT)

time iconOctober 26, 2022 16:00

6 Months to 6 Minutes - Real World Incident Response Strategies to Reduce OT Cyber Impacts (16:00 CT)

speaker headshot

Bryan Singer
Industrial Cybersecurity Innovation Executive - OT Incident Response at Accenture

Overnight, 10 plants rapidly decelerated, and dozens more were shut down out of an abundance of caution. A threat actor is persistent in the environment and has deployed ransomware.  Plants across multiple geographies are struggling to return to operations while simultaneously Incident Response (IR) teams work across both IT and OT to expel the threat actor and safely return to normal operations.

Recent public cyber events in OT show that companies often struggle
for many months to fully return to normal operations.   These highly
public events create significant strain for companies as they deal with multiple priorities from dealing with regulatory obligations around data links to whether or not to pay ransoms, and returning safety to operations.

From real world examples of complex OT IR engagements and readiness exercises, this session will answer a basic question:  How can we reduce these impacts through readiness and resilience?  The goal? 6 months to 6 minutes...

time iconOctober 26, 2022 16:30

Networking Happy Hour (16:30 CT)

Thank You to Our Sponsors

Platinum Sponsors

Technology Demonstration Sponsor

Silver Sponsor

Media Partners

Frequently Asked Questions

  • Watch a full-day of online presentations from top industry experts/speakers
  • Participate in live Q&A dialogue with the presenters following each session
  • Download presentation materials to use as a resource/reference long after the live event
  • Visit virtual exhibits and engage with sponsors to find information on products and solutions to your most pressing industry concerns
  • Chat live with Presenters, Sponsors and Attendees at networking breaks, lunch and happy hour
Registration for the virtual conference is complimentary. However, there is an additional registration fee to join us live and in-person at the Wood, Houston, TX, USA location with additional speakers, live exhibit booths, networking opportunities and lunch provided for: $100 USD members, $150 USD nonmembers.
You do not have to be an ISA member to attend, and it is open to the general public. However, for more information on ISA membership, visit:
Through your participation in both the live conference sessions in the Auditorium, and the interactive virtual kiosks in the Exhibit Hall, you have the opportunity to engage with a wealth of ISA subject matter experts, ISA staff, Event Speakers, Event Sponsors and Exhibitors to create a network, gain valuable information, answer questions or find solutions.
Yes. Please contact Cybersecurity Standards Implementation Conference Events Manager, Morgan Foor ( ) or at 919.990.9267 for more information or details.
Yes. Like any in-person event, we will have a swag bag for you to collect valuable information and giveaways! By visiting the online Resource Center and each sponsored virtual exhibit booth, you can choose from an array of available documents. You just add the selection to your online swag bag and email them to yourself, or you can forward resources with friends and colleagues by simply entering their email address.
No. You do not need to download or install any software to participate in the virtual event. You only need to have good quality internet access.
Yes, you will be provided login credentials ahead of the live event to test the system, ensure the appropriate requirements, and get familiar with the interface, so that you are ready for maximum participation.
Your login instructions will be emailed to you ahead of the event with all the details you need for access on the day of the live event.
No, it is not required in order to participate as an attendee. Some speakers may use webcams for their presentations, in addition to their audio and visual presentations.
Google Chrome and/or Firefox are the recommended browsers.
Good quality internet connectivity will ensure high quality video streaming. An unstable internet connection may hinder viewing of certain portions of presentations, where applicable.
For technical assistance or trouble accessing on the day of the event, please email:
Yes, the conference recordings will be available to all registered attendees following the live event, so you can still listen to content on-demand, have access to the platform and not miss a beat. However, you must register ahead of time.
The on-demand content will be hosted for 30 days following the live event to all registered attendees. You just login with your same credentials from the live event until the deadline.
Participants can obtain certificate of completion with PDH credit for each session attended. You must fully attend each session to be able to download your individual certificates in your event profile.

We look forward to having you with us VIRTUALLY or IN-PERSON this October!