ISA Cybersecurity Standards Implementation Conference

Wednesday, October 26, 2022, 8:00 am – 17:00 CT


Wednesday, October 26, 2022, 8:00 am – 17:00 CT

Add to Calendar 10/26/2022 08:00 AM 10/26/2022 04:00 PM America/Chicago ISA Cybersecurity Standards Implementation Conference The 2022 ISA CSIC Conference will focus on the growing adoption of ISA/IEC Cyber Security Standards across various industries.




About the Event

The 2022 ISA CSIC Conference will focus on the growing adoption of ISA/IEC Cyber Security Standards across various industries.

This program will identify the current themes and threat landscape unfolding in various industries including energy, manufacturing, building automation, and water handling. With this broader application comes increased alignment with safety concerns. These will be addressed through expert panels discussing the work-force development opportunities for cybersecurity education, end-user case studies will highlight real-world adoption of cybersecurity standards and best practice applications to streamline processes and reduce costs, while protecting people and property from increased cyber threats.


Tuesday, 26 October, 2022

October 26, 2022 08:00

Exhibit Hall Opens

October 26, 2022 09:00

Keynote: Correlating Standards and How to Deploy into a Successful Program

Klint Walker
Cybersecurity Advisor, US Department of Homeland Security

Don Bartusiak
President, Collaborative Systems Integration

Explore technology trends in automation with emphasis on cybersecurity and IEC 62443 with Don Bartusiak. Then allow Klint Walker to follow with a big picture of current cybersecurity threats and best practice recommendations coming from his broad industry perspective.


October 26, 2022 09:45


October 26, 2022 10:00

IoT Security Maturity Model: 62443 Mappings for Asset Owners, and Product Suppliers, and Service Providers

October 26, 2022 10:30


October 26, 2022 10:45

Panel Discussion: Understanding and Developing 62443, Parts 2-1 and 2-4

Moderator: Scott Reynolds
Johns Manville

John Cusimano

Patrick O’Brien

Josh Carlson

October 26, 2022 11:00


October 26, 2022 11:30

Technology Demonstration

Sponsored by Finite State

October 26, 2022 11:45


October 26, 2022 12:15

Cybersecurity issues in Remote monitoring on mutil-phase oil and gas flow

Birol Dindorik
University of Houston

October 26, 2022 12:30


October 26, 2022 12:45

Lunch and Learn

Sponsored by Wood

October 26, 2022 13:45

Threat Actor vs Threat Event and Vulnerability vs Tactic. Where is 62443 being deployed?

Garrett Myler
Enclave Defense

October 26, 2022 14:00


October 26, 2022 14:15

Achieving and Maintaining your ISA/IEC62443 Security Level Targets

Rick Kaun
VP Solutions, Verve

Sponsored by Verve Industrial Protection

ISA/IEC 62443 has created a robust and effective ICS cybersecurity framework that provides a great roadmap for many organizations to establish a set of prioritized objectives.  Verve’s been working with industrial control systems for 30 years and have been working with dozens of organizations over the past few years trying to adapt security to new guidelines such as 62443. One of the largest challenges we have seen and addressed is how to ensure you achieve and then maintain the targets. Over the past 15 years, we have helped dozens of clients efficiently, effectively, and safely achieve their SL-Ts as well as maintain them. We’ll describe some of these learnings and how you can practically improve and maintain your security levels.

October 26, 2022 14:45


October 26, 2022 15:15

Risk Assessment Case Study

Philipppe Flichy
Fractional Chief Information Security Officer, Cykur


October 26, 2022 15:30


October 26, 2022 16:00

6 Months to 6 Minutes - Real World Incident Response Strategies to Reduce OT Cyber Impacts

Bryan Singer
Industrial Cybersecurity Innovation Executive - OT Incident Response at Accenture

Overnight, 10 plants rapidly decelerated, and dozens more were shut down out of an abundance of caution. A threat actor is persistent in the environment and has deployed ransomware.  Plants across multiple geographies are struggling to return to operations while simultaneously Incident Response (IR) teams work across both IT and OT to expel the threat actor and safely return to normal operations.

Recent public cyber events in OT show that companies often struggle
for many months to fully return to normal operations.   These highly
public events create significant strain for companies as they deal with multiple priorities from dealing with regulatory obligations around data links to whether or not to pay ransoms, and returning safety to operations.

From real world examples of complex OT IR engagements and readiness exercises, this session will answer a basic question:  How can we reduce these impacts through readiness and resilience?  The goal? 6 months to 6 minutes...

October 26, 2022 16:15


October 26, 2022 16:00

Networking Happy Hour

Thank You to Our Sponsors

Platinum Sponsors

Technology Demonstration Sponsor

Silver Sponsor

Media Partners

Frequently Asked Questions

  • Watch a full-day of online presentations from top industry experts/speakers
  • Participate in live Q&A dialogue with the presenters following each session
  • Download presentation materials to use as a resource/reference long after the live event
  • Visit virtual exhibits and engage with sponsors to find information on products and solutions to your most pressing industry concerns
  • Chat live with Presenters, Sponsors and Attendees at networking breaks, lunch and happy hour
Registration for the virtual conference is complimentary. However, there is an additional registration fee to join us live and in-person at the Wood, Houston, TX, USA location with additional speakers, live exhibit booths, networking opportunities and lunch provided for: $100 USD members, $150 USD nonmembers.
You do not have to be an ISA member to attend, and it is open to the general public. However, for more information on ISA membership, visit:
Through your participation in both the live conference sessions in the Auditorium, and the interactive virtual kiosks in the Exhibit Hall, you have the opportunity to engage with a wealth of ISA subject matter experts, ISA staff, Event Speakers, Event Sponsors and Exhibitors to create a network, gain valuable information, answer questions or find solutions.
Yes. Please contact Cybersecurity Standards Implementation Conference Events Manager, Morgan Foor ( ) or at 919.990.9267 for more information or details.
Yes. Like any in-person event, we will have a swag bag for you to collect valuable information and giveaways! By visiting the online Resource Center and each sponsored virtual exhibit booth, you can choose from an array of available documents. You just add the selection to your online swag bag and email them to yourself, or you can forward resources with friends and colleagues by simply entering their email address.
No. You do not need to download or install any software to participate in the virtual event. You only need to have good quality internet access.
Yes, you will be provided login credentials ahead of the live event to test the system, ensure the appropriate requirements, and get familiar with the interface, so that you are ready for maximum participation.
Your login instructions will be emailed to you ahead of the event with all the details you need for access on the day of the live event.
No, it is not required in order to participate as an attendee. Some speakers may use webcams for their presentations, in addition to their audio and visual presentations.
Google Chrome and/or Firefox are the recommended browsers.
Good quality internet connectivity will ensure high quality video streaming. An unstable internet connection may hinder viewing of certain portions of presentations, where applicable.
For technical assistance or trouble accessing on the day of the event, please email:
Yes, the conference recordings will be available to all registered attendees following the live event, so you can still listen to content on-demand, have access to the platform and not miss a beat. However, you must register ahead of time.
The on-demand content will be hosted for 30 days following the live event to all registered attendees. You just login with your same credentials from the live event until the deadline.
Participants can obtain certificate of completion with PDH credit for each session attended. You must fully attend each session to be able to download your individual certificates in your event profile.

We look forward to having you with us VIRTUALLY or IN-PERSON this October!