September

Wednesday-Friday,
October 4-6, 2023

NO TRAVEL NEEDED

Cheyenne Mountain Resort, 3225 Broadmoor Valley Road, Colorado Springs, CO 80906

GUEST EXPERTS

Technical Content and Training Courses

LEARN & NETWORK

Learn & Network

AboutThe Event intro

ISA’s second annual Automation & Leadership Conference (ALC) continues to be the automation event of the year! ALC combines ISA’s leadership conference with the best technical presentations from its automation event series into an unparalleled conference experience.

ALC will bring together a global audience of automation managers, engineers and technicians who want to stay abreast of trending industry topics focused on digital transformation, cybersecurity, IIoT, smart manufacturing and process automation.

This multi-day technical and leadership conference and exhibition will provide access to an array of subject matter experts from the US, Middle East, Brazil, Malaysia, Spain and India—and will offer best-of-the-best content and ultimate networking opportunities—in a fun, interactive format.

LIVEIn-person venue with virtual option

Continuing Our Safe, Staged Return to Live Events
Location: Cheyenne Mountain Resort, 3225 Broadmoor Valley Rd, Colorado Springs, CO

In addition to our virtual conference component, a live, hybrid audience location will also be available. Local attendees and those choosing to travel will be able to participate in face-to-face, live sessions, breaks, lunch, reception and tabletop exhibits. Limited space and attendance on a first-come, first-serve basis. Separate registration fee required. Simultaneously, virtual attendees will be able to experience the same scheduled speaker sessions, along with opportunities to interact with online attendees and visit our virtual exhibit hall.

AgendaPreliminary Programschedule

Agenda

time icon3 October, 2023 07:30

ISA Training: Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) - Day 1 of 2

speaker headshot Glenn Merrell
ISA Instructor
Gunnison | Cheyenne Mountain Resort

NOTE:  Onsite/In-person delivery (Separate Registration Fees Apply)

  • CEU Credits: 1.4
  • Course Hours: 7:30 a.m - 3:30 p.m.
  • Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course.

Description:

The move to using Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has exposed these systems to the same cyberattacks that have wreaked havoc on corporate information systems. This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.

 

You will be able to:

  • Discuss the principles behind creating an effective long term program security
  • Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
  • Define the basics of risk and vulnerability analysis methodologies
  • Describe the principles of security policy development
  • Explain the concepts of defense in depth and zone/conduit models of security
  • Analyze the current trends in industrial security incidents and methods hackers use to attack a system
  • Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks

 

You will cover:

  • Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
  • How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
  • Creating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • Risk Analysis:  Business Rationale | Risk Identification, Classification, and Assessment 
  • Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
  • Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
  • Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
  • Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
  • Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems

 

Classroom/Laboratory Demo:

  • PCAP Live Capture Analysis

 

Includes ISA Standards:

  • ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
  • ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels
time icon4 October, 2023 07:30

ISA Training: Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) - Day 2 of 2

speaker headshot Glenn Merrell
ISA Instructor
Gunnison | Cheyenne Mountain Resort

NOTE:  Onsite/In-person delivery (Separate Registration Fees Apply)

  • CEU Credits: 1.4
  • Course Hours: 7:30 a.m - 3:30 p.m.
  • Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course

Description:

The move to using Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has exposed these systems to the same cyberattacks that have wreaked havoc on corporate information systems. This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.

 

You will be able to:

  • Discuss the principles behind creating an effective long term program security
  • Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
  • Define the basics of risk and vulnerability analysis methodologies
  • Describe the principles of security policy development
  • Explain the concepts of defense in depth and zone/conduit models of security
  • Analyze the current trends in industrial security incidents and methods hackers use to attack a system
  • Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks

 

You will cover:

  • Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
  • How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
  • Creating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • Risk Analysis:  Business Rationale | Risk Identification, Classification, and Assessment 
  • Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
  • Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
  • Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
  • Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
  • Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems

 

Classroom/Laboratory Demo:

  • PCAP Live Capture Analysis

 

Includes ISA Standards:

  • ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
  • ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels
time icon4 October, 2023 07:30

ISA Training: Introduction to Data Visualization (DT103)

speaker headshot Dave Lafferty
President, Scientific Technical Services
Rio Grande | Cheyenne Mountain Resort

NOTE:  Onsite/In-person delivery (Separate Registration Fees Apply)

  • CEU Credits: 0.7
  • Course Hours: 7:30 a.m - 3:30 p.m.
  • Certification of Completion: A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the course.

Description:

Visualization is an important technique allowing valuable information to be received and translated visually in the appropriate format for a particular use case. This course explores the various forms of visualization that enable data to become valuable information. 

The course will begin with an overview of visualization by covering the different types of analytics used for visualization, including descriptive and diagnostic portals.    

Students will learn the various types of digital twins and how digital twins are used for visualization. Essential considerations for successful digital twin implementations will also be presented.

Students will learn how extended reality is used for visualization, including augmented virtual, and mixed reality. Specific examples of how the various forms of extended reality are used will be presented.   

The course will also explain mobility and wearable devices for visualization. Students will explore the use of these devices and learn why they are essential for visualization.

Finally, the course will present successful visualization project use cases and the associated business value generated.

Upon completion of this course, you will be able to:

  • List the various types of visualization
  • Explain why visualization is important
  • Compare and contrast the various forms of visualization and where organizations can best use each type of visualization
  • Define what a digital twin is
  • List the various types of digital twins
  • Explain why digital twins are important
  • Explain the various digital twin design considerations and why they are essential to a successful digital twin implementation
  • Apply the various implementation tips to your organization
  • List the various forms of extended reality
  • Explain why extended reality is a vital visualization tool
  • Explain the main characteristics of VR and the main barriers to the adoption of VR
  • Explain the main aspects of AR and the main barriers to adopting AR
  • List some real-world industrial applications of AR
  • Explain what MR is and the main barriers to adopting MR
  • Distinguish the main differences between VR, AR, and MR
  • Explain what mobility is and why it is important for the visualization of data
  • List some mobile devices and the main functions of mobile device management
  • Identify the key characteristics of mobile sensors
  • Differentiate the three types of mobile development
  • Explain what is occasionally disconnected and why it is important in the industrial environment
  • Appraise how mobility could be used in an industrial environment
  • Explain what wearables are and why they are important
  • Differentiate between mobility and wearables
  • List different wearable devices and the various barriers to adopting wearables
  • Explain the value of the excursion management portal
  • Explain the value of industrial AR with wearables
  • Explain the value of the risk dashboards
  • Explain the value of the digital twin for corrosion management

Course Prerequisites:

There are no prerequisites; however, general knowledge of communication essentials for industrial automation systems may be helpful. In addition, the course developer also recommends the ISA Introduction to IIoT – the Industrial Internet of Things (DT101) course.

time icon4 October, 2023 08:00

District Leader Training

Arkansas | Cheyenne Mountain Resort
time icon4 October, 2023 12:30

Geographic Assembly Meeting

Arkansas | Cheyenne Mountain Resort
time icon4 October, 2023 12:30

Technical Assembly Meeting

Platte | Cheyenne Mountain Resort
time icon4 October, 2023 13:00

Division Meeting: Chemical & Petroleum Industries

Kiowa | Cheyenne Mountain Resort
time icon4 October, 2023 14:00

Division Meeting: Process Measurement and Control

Kiowa | Cheyenne Mountain Resort
time icon4 October, 2023 14:00

District Meeting: Eastern North America

Arapaho | Cheyenne Mountain Resort
time icon4 October, 2023 14:00

District Meeting: Midwest North America

Ute | Cheyenne Mountain Resort
time icon4 October, 2023 14:00

District Meeting: Southern North America

Comanche | Cheyenne Mountain Resort
time icon4 October, 2023 14:00

District Meeting: Asia-Pacific

Cheyenne I | Cheyenne Mountain Resort
time icon4 October, 2023 14:15

Executive Board Meeting

Arkansas | Cheyenne Mountain Resort
time icon4 October, 2023 15:00

District Meeting: Western North America

Arapaho | Cheyenne Mountain Resort
time icon4 October, 2023 15:00

District Meeting: Latin America & the Caribbean

Ute | Cheyenne Mountain Resort
time icon4 October, 2023 15:00

District Meeting: Brazil

Comanche | Cheyenne Mountain Resort
time icon4 October, 2023 15:00

District Meeting: Europe, Middle East & Africa

Cheyenne I | Cheyenne Mountain Resort
time icon4 October, 2023 16:15

S.W.A.P. Social With A Purpose - YP and Student Mixer

Hospitality Suite | Cheyenne Mountain Resort

Come out and network with ISA Young Professionals and learn all about their endeavors into the world of automation!

The S.W.A.P. – Social with a Purpose, is a Young Professional and Student Mixer, this is the perfect opportunity to learn from others, ask questions, and have some fun while connecting!

time icon4 October, 2023 17:00

Welcome Reception

Courtyard Patio | Cheyenne Mountain Resort

Join us on the courtyard patio of the Cheyenne Mountain Resort to network with your peers and kick off the conference!

time icon5 October, 2023 08:00

Networking Breakfast

Centennial Ballroom | Cheyenne Mountain Resort

Enjoy breakfast and network with ISA leaders and automation professionals from around the world.

time icon5 October, 2023 08:45

Keynote Speaker - Mark Weatherford

speaker headshot Mark Weatherford
CSO at the National Cybersecurity Center
Centennial Ballroom | Cheyenne Mountain Resort

Mark will provide a presentation on National Cybersecurity Issues and Workforce Development.

time icon5 October, 2023 09:30

Digital Transformation Technology Demonstration - SDI | Progress Over Perfection: Harnessing Existing Data in the Age of IoT

speaker headshot John Delligatti
Director, Digital Supply Chain Transformation
Centennial Ballroom | Cheyenne Mountain Resort

In a world increasingly influenced by the allure of the Internet of Things (IoT), many organizations face challenges in adopting and fully integrating this technology into their systems. John Delligatti, the Director of Digital Supply Chain Transformation at SDI, presents a compelling argument for focusing on the resources at hand rather than waiting for the ideal conditions fostered by a complete IoT overhaul.

 

This session illuminates the idea that while IoT offers a promising future, it's essential to avoid being paralyzed by its complexities. John emphasizes the importance of harnessing currently available data, showcasing how tagging work order data with relevant asset and purchase order information can significantly transform maintenance processes, even without the full embrace of IoT.

 

Attendees will get a comprehensive understanding of the power that lies in their existing data. John will present data visualization dashboards that reveal how this data can be employed to predict demand and forecast service needs effectively. By embracing the "progress over perfection" mantra, organizations can optimize their operations, reduce downtime, and ensure smoother maintenance processes, without waiting for the perfect IoT infrastructure.

 

Join this enlightening session to uncover the vast potential in your data, proving that in the journey of digital transformation, every step forward counts.

time icon5 October, 2023 09:30

Cybersecurity Technology Demonstration - Fortinet | Threat Intelligence Roundup: Emerging Threats Impacting Operational Technology

speaker headshot Rod Locke
Senior Director of Product Management - OT, Fortinet
Remington I | Cheyenne Mountain Resort

Industrial organizations are on alert as bad actors see critical infrastructure as low-hanging fruit for attack. Ransomware variants, phishing emails, wiper malware, and more show up as tactics used to disrupt operational environments. As digital transformation grows, so does the number of users, devices, and applications connecting to the network. This increases the number of remote staff accessing critical infrastructure like meters, sensors, and control systems. For many organizations, this positively affects efficiency. It has also increased risk and expanded the attack surface for industrial organizations. During this session, we will look at the changing threat landscape for industrial environments. The session will also explore the use of artificial intelligence (AI) and machine learning (ML) backed by telemetry data, like that used by FortiGuard Labs to gather insights across threat vectors and use them to inform protections across the Fortinet Security Fabric to protect your OT environment.

time icon5 October, 2023 10:00

Digital Transformation Track - Session 1: ISA100 Wireless Excellence in Automation Award: OMV PETROM OT Pilot Project Utilizing ISA100 Wireless for Real-Time Oil Field Monitoring

speaker headshot Sorin-Lucian Dobrescu
Automation Engineer, OMV PETROM
Centennial Ballroom | Cheyenne Mountain Resort

The International Society of Automation (ISA) and the ISA100 Wireless Compliance Institute (WCI) will present the 2023 ISA100 Wireless Excellence in Automation Award to Sorin-Lucian Dobrescu for OMV PETROM Pilot Projects in Offshore Oilfields.

 

The pilot project addresses one of the challenges in mature onshore oilfields:  balance the need to reduce OpEx using the most advanced OT solutions and AI apps to real-time optimization for a whole production system (from wells to delivery point), yet keeping CapEx as low as possible. This is part of OMV PETROM’s ambition to have “Assets run autonomously 24/7 backed by adaptive digital workforce”

time icon5 October, 2023 10:00

Cybersecurity Track - Session 1: Artificial Intelligence and Autonomy Instruction

speaker headshot Lt Col James I. Maher
Deputy Head and Assistant Professor of Computer and Cyber Sciences (DFCS) United States Air Force Academy
Remington I | Cheyenne Mountain Resort

In order to prepare our cadets for future conflict, the United States Air Force Academy has included artificial intelligence and autonomy instruction across their curriculum (for all, many, and few). In this discussion, they will brief the importance of addressing these concepts at the undergraduate level, what they are doing at USAFA including some incredible work completed by the cadets, and where they plan to continue building these capabilities in the near future. 

time icon5 October, 2023 10:00

Career Skills Track - Session 1: Deep Dive with Mark Weatherford

speaker headshot Mark Weatherford
CSO at the National Cybersecurity Center
Remington II | Cheyenne Mountain Resort
time icon5 October, 2023 10:45

Digital Transformation Track - Session 2: Selling Your Digital Transformation Value Proposition to Management

speaker headshot David Lafferty
President, Scientific Technical Services
Centennial Ballroom | Cheyenne Mountain Resort

Unlock the secrets to becoming an advocate for your organization’s digital future!  In this session, you will learn the art of crafting a compelling business case that resonates with decision-makers and will discover how to align your vision with corporate goals.  We’ll explore strategies to communicate the ROI, strategic advantages and benefits, and competitive edge that digital transformation offers. 

time icon5 October, 2023 10:45

Cybersecurity Track - Session 2: Deep Dive into Threat Landscape

speaker headshot Chris McLaughlin
CISO, Johns Manville
Remington I | Cheyenne Mountain Resort

Join us for a deep dive into the ever-evolving cybersecurity threat landscape.  In this session, we will navigate the intricacies of modern cyber threats, from emerging attack vectors to the evolving tactics of threat actors.  Explore real-world case studies, gain insights into threat intelligence, and learn proactive strategies to safeguard your digital assets in an increasingly complex digital world.

time icon5 October, 2023 10:45

Career Skills Track - Session 2: Council of Society Delegates Informational Session

Remington II | Cheyenne Mountain Resort

Information Meeting for Society Delegates (please note that all voting will be done via electronic ballot).

time icon5 October, 2023 11:15

Digital Transformation Track - Session 3: Modernization, Optimization & Transformation Panel

speaker headshot Moderator: Jeff Winter
Sr. Director of Industry Strategy, Manufacturing, Hitachi Solutions America
speaker headshot David Lafferty
President, Scientific Technical Services
speaker headshot Arvind Tilak
Ascent Intellimation Pvt. Ltd.
Centennial Ballroom | Cheyenne Mountain Resort

Do you differentiate between modernization, optimization and transformation? Most companies label their digital projects under the umbrella of “Industry 4.0” or “Digital Transformation” when in reality there are 3 very distinct types of projects that all support these initiatives: Modernization, Optimization, and Transformation. Although they can be combined into one, they are often distinct and sequential projects, each building upon the previous, guiding a company through its digital evolution. In this panel, gain valuable insights from industry leaders and experts as they share their experiences and strategies for navigating the dynamic landscape of digital transformation.  

Session Themes:

  • The Journey Between Modernization, Optimization, and Transformation
  • KPIs: How You Grade Success
  • Best Practices
  • Challenges
time icon5 October, 2023 11:15

Cybersecurity Track - Session 3: Navigating The Maze of Pipeline Cybersecurity Guidance

speaker headshot Dereck Stubbs
Director, Industrial Cybersecurity Consulting at ABS Group
Remington I | Cheyenne Mountain Resort

Navigating the maze of Pipeline Cybersecurity Guidance (TSA, API 1164, NIST CSF, ISA 62443) can be a daunting task for pipeline operators and can result in a lot of time and money lost without achieving a lot of risk reduction. This presentation intends to highlight a clear path through the maze, provide some logic to the different layers of Cybersecurity Guidance, and demonstrate what key areas from those layers of guidance will result in the greatest risk reduction value for pipeline operations.

time icon5 October, 2023 12:00

Networking Lunch & State of the Society Address

Centennial Ballroom | Cheyenne Mountain Resort

Join us for lunch and a State of the Society update from ISA's 2023 Officers.

time icon5 October, 2023 13:00

Digital Transformation Track - Session 4: Harmonizing Digitalization and Environmental Stewardship: Ambyint's Approach to Reducing Carbon Emissions in O&G Production

speaker headshot Ferdinand Hingerl
Ambyint
Centennial Ballroom | Cheyenne Mountain Resort

In this presentation, we delineate Ambyint's pioneering approach aimed at assisting Oil & Gas (O&G) companies in significantly reducing their greenhouse gas emissions during oil and gas production phases. Our discourse underscores the reduction of venting events, on-site field visits, and windshield time, alongside minimizing electricity consumption for pumping units. Unique to Ambyint's strategy for process automation ( closed-loop setpoint optimization and predictive maintenance) is the fusion of Subject Matter Expert (SME) knowledge, profound understanding of underlying physics, and Artificial Intelligence algorithms (AI). This holistic approach not only facilitates a marked reduction in emissions but also augments operational efficiency and compliance with evolving environmental mandates. Through a blend of empirical analysis and practical case studies, we aim to shed light on how Ambyint's synthesis of human expertise and advanced automation technologies is propelling the O&G sector towards a more sustainable and economically viable operational framework.

time icon5 October, 2023 13:00

Cybersecurity Track - Session 4: Introducing MITRE D3FEND: A Knowledge Graph of Cyber Countermeasures

speaker headshot Peter Kaloroumakis
D3FEND Lead, Cybersecurity Engineer, Principal, The MITRE Corporation
Remington I | Cheyenne Mountain Resort

D3FEND, a research project funded by the National Security Agency, provides a common language for cybersecurity architects to describe specific countermeasure techniques in networked systems. This open-source knowledge graph aims to simplify the understanding of how countermeasures work, enabling more effective design and deployment of cyber defenses. The graph's ontology is grounded in extensive cybersecurity technical literature.  Through inferential mapping, D3FEND connects architectural elements to both cybersecurity countermeasures and offensive TTPs, revolutionizing the way we defend networked systems.

time icon5 October, 2023 13:00

Career Skills Track - Session 3: Understanding Personality Types in the Workplace

speaker headshot Chris McLaughlin
CISO, Johns Manville
Remington II | Cheyenne Mountain Resort

Taking a page from Myers-Briggs, this session will cover the basics of MBTI and, more importantly, how you can apply this when presenting to managers and executives. This session will serve as a guide to understanding what different personality types may expect so you can better engage executives when asking them to make a decision.

time icon5 October, 2023 13:30

Digital Transformation Track - Session 5: Digitalization Culture: Influencing Behavior is 90% of the Journey

speaker headshot Andrew McDonald
Principal Consultant and Owner, FutureofManufacturing LLC
Centennial Ballroom | Cheyenne Mountain Resort

Successful, digitally enabled, business transformation hinges on clearly defined, integrated, business, automation technology and people strategies. Discover learnings from digital transformation program delivery including models that support strategy definition.  Learn how the automation professional community can better articulate the value of automation to appropriate stakeholders through the automation brand.

time icon5 October, 2023 13:30

Cybersecurity Track - Session 5: Cyber Informed Engineering

speaker headshot Maurice Martin
Researcher, National Renewable Energy Laboratory
Remington I | Cheyenne Mountain Resort

Gain valuable insights on how to design, develop, and maintain systems that are not only efficient but also resilient against cyberattacks.  This session will provide the knowledge and strategies needed to navigate the complex landscape of cyber-informed engineering.

time icon5 October, 2023 13:30

Career Skills Track - Session 4: Accelerating Your Career Using Creativity Skills

speaker headshot Bill Lydon
Digital Manufacturing Transformation Industry 4.0 Consultant, AutomationFocus
Remington II | Cheyenne Mountain Resort

This session will demonstrate how to use group creativity and problem solving in value engineering. Learn how to apply proven techniques in facilitating groups through a process aimed at improving products and projects.

time icon5 October, 2023 14:15

Digital Transformation Track - Session 6: Open Process Automation: Evolving Marketplace

speaker headshot Moderator: Mohan Kalyanaraman
Technology Acquisition Advisor, ExxonMobil
speaker headshot Ryan Smeltzer
Open Process Automation Program Lead, ExxonMobil
speaker headshot Soloman Almadi
Senior Engineering Consultant, Saudi Aramco
speaker headshot Brad Mozisek
Open Process Automation Program Manager, Wood
speaker headshot Kirk Smith
Director & Principal Engineer, Industrial Standards & Systems Architecture, IIoT Group, Intel
speaker headshot Pal Roach
Senior Principal Industry Consultant, Oil & Gas, Rockwell Automation
speaker headshot Steve Bitar
Collaborative Systems Inc.
speaker headshot Chris Mutchler
Senior Staff Cloud Architecht, AMER Globals, VMWare
speaker headshot Ricardo Mazer
Project Technology Specialist, SMAR
Centennial Ballroom | Cheyenne Mountain Resort

Unlocking innovation and implementing digital transformation strategies successfully in the manufacturing floor requires full access to data from all operational levels.  This includes the highest levels of business systems down to the edge(or front lines). Recognizing the need for innovation and competition, leading global industrial and chemical companies are collaborating with leading process automation vendors and system integrators to bring a change in automation through the adoption of standards for Open Process Automation. The vision of the OPA Forum is the development of an open, standards-based, secure, and interoperable process automation architecture. 

 Concurrent with the standard, a marketplace is taking shape with increasing number of test beds, demonstration systems, and concepts, prototypes, and products starting to make their way into the marketplace. A panel featuring both end users, system integrators, and suppliers will discuss market needs, supplier and SI capabilities and drivers. In addition, a number of suppliers are bringing OPA aligned products to meet the open automation standard O-PAS™.   We will discuss how the ecosystem is taking shape and the opportunities for new suppliers and SI in this market.

Session Themes:

  • The Market
  • Business Challenges & Opportunities
  • How OPA Influences Workforce Dynamics
time icon5 October, 2023 14:15

Cybersecurity Track - Session 6: Cybersecurity Insurance Panel

speaker headshot Moderator: Patrick O'Brien
Senior Safety and Cybersecurity Engineer, exida
speaker headshot Mark Weatherford
CSO at the National Cybersecurity Center
speaker headshot John Morrow
APV - Cyber Security Consultant, FM Global
speaker headshot Steve Mustard
Digital Security and Risk Consultant, BP
Remington I | Cheyenne Mountain Resort

In this session, our panel of industry experts will tackle the complexities of cybersecurity insurance, offering insights into risk assessment and the evolving threat landscape.  Discover key considerations for businesses seeking to protect their digital assets and operations, and gain a deeper understanding of the role of insurance in managing cyber risks.  This panel promises valuable perspectives on the vital intersections of cybersecurity and insurance.

time icon5 October, 2023 15:00

Career Skills Track - Session 5: Agile Project Management in Automation Projects

speaker headshot Steve Mustard
Digital Security and Risk Consultant, BP
Remington II | Cheyenne Mountain Resort

Agile is a flexible and iterative approach to project management that focuses on collaboration, adaptability, and delivering value to customers in small, incremental increments Agile project management is now routinely used in automation related projects in many organizations. This session will introduce the key elements of the agile project management methodology, including the Agile Manifesto, Scrum, Kanban, Product Owner, Scrum Master, User Stories, Backlog, and Sprints.

time icon5 October, 2023 15:00

Cybersecurity Track - Session 7: ISA/IEC 62443 – An Asset Owner’s Perspective

speaker headshot Brandon Price
Chairman, The ISASecure Program, Senior Principal Engineer for ICS Cybersecurity, ExxonMobil
Remington I | Cheyenne Mountain Resort

This presentation will provide a high level overview ExxonMobil's journey toward utilization of industry standards as a foundation of its cybersecurity program for industrial control systems.  It will include a summary of our historical approach and current state, how standards such as ISA/IEC 62443 are used, how we are advocating utilization of 62443 and ISASecure in the industry and supporting ongoing efforts to further mature and sustain them consistent with changes in the technology and threat landscape.  Additionally, insights will be provided with respect to how companies can begin to develop a 62443 conformant cybersecurity program, the benefits of doing so, challenges that may be encountered along the way, and lessons learned.

time icon5 October, 2023 15:00

Digital Transformation Track - Session 7: Innovation in Sports

speaker headshot Boyd Smith
Curator, US Olympic & Paralympic Museum
Centennial Ballroom | Cheyenne Mountain Resort

Join us for a captivating look at the world of intelligent manufacturing and its transformative impact on Olympic & Paralympic uniforms and equipment. In this engaging session, we will explore cutting-edge technologies and innovative processes that have revolutionized the creation of athletics for Olympian and Paralympian athletes worldwide.

Images in presentation are credited to the International Olympic Committeee (IOC).

time icon5 October, 2023 17:00

Rodeo and Recognition—ISA Honors and Awards Gala

Location: Flying W Ranch

Ticket required | Fee: 125 USD

The Gala is the Society's opportunity to formally showcase and celebrate the remarkable achievements and contributions of its members, partners, and other automation professionals.

Attire: Dress to impress - business/cocktail preferably with closed-toe shoes, maybe even some cowboy boots.

time icon6 October, 2023 08:00

Networking Breakfast

Centennial Ballroom | Cheyenne Mountain Resort
time icon6 October, 2023 08:45

Keynote: Unleashing the Potential of Carbon Credits: Strategy Monetization of Sustainability Initiatives, and How Automation Plays a Pivotal Role in SafeguarIing the Integrity of the Carbon Credit Market.

speaker headshot Ru Schaefferkoetter
President and CEO, Trido Solutions
Centennial Ballroom | Cheyenne Mountain Resort

The speaker will explore the fascinating world of carbon and tax credits, which incentivize emission reduction efforts. She will give a brief overview of current market trends and strategic monetization options for sustainability, emphasizing their role in advancing energy transition and emission reduction. Additionally, she will highlight the indispensable role of automation technologies in the realm of emission reduction projects, which serves as the cornerstone for the monitoring, measurement, quantification, and reporting of these projects. The speaker will delve deeper into the significance of comprehending the critical function of automation technology in upholding the integrity of emission reduction data, thereby ensuring the trustworthiness of carbon credit and tax credit reporting.

time icon6 October, 2023 09:30

Cybersecurity Technology Demonstration - Control Station | State-Based Analytics: Assessing Multi-State Production Processes

speaker headshot Dennis Nash
President & CEO, Control Station
Remington I | Cheyenne Mountain Resort

While the economic benefits of improved PID control have been touted for decades, control loop performance monitoring (CLPM) technologies have often equipped practitioners with muddled intelligence. Production processes typically operate across a range of conditions. However, traditional CLPM solutions assess a process’ performance without distinguishing between its many and different operational states. This presentation covers the economic benefits of improved regulatory performance and showcases how innovations in state-based analytics allows process manufacturers to more fully realize those benefits.

time icon6 October, 2023 10:00

Digital Transformation Track - Session 1: Digital Transformation Risk Creation - Changes in Ways of Doing Business (an AI Use Case)

speaker headshot Chris Monchinski
Chief Technology Officer, Automated Control Concepts, LLC
Centennial Ballroom | Cheyenne Mountain Resort

Explore the fascinating intersection of innovation and risk management as we dissect how digital transformation can both create and mitigate risks. Through a real-world AI use case, we will unravel the complexities of transforming business operations while safeguarding against potential pitfalls.  Don’t miss this opportunity to gain a deeper understanding of the dynamic relationship between digitalization, risk, an strategic decision-making.

time icon6 October, 2023 10:00

Cybersecurity Track - Session 1: Security Assessment Update

speaker headshot Andre Ristaino
Managing Director, Conformity Assessment Programs and Global Consortia, International Society of Automation
Remington I | Cheyenne Mountain Resort

In the ever-evolving landscape of cybersecurity threats, staying ahead of potential risks is crucial.  In this session, we will explore the latest developments in cybersecurity assessment techniques and best practices.  Discover how organizations are adapting to emerging threats, enhancing their defense strategies, and ensuring the protection of sensitive data.  Our expert speaker will provide valuable insights and practical advice to help you assess and fortify your organization’s cybersecurity posture.  Whether you are a cybersecurity professional, IT manager, or business leader, this session will equip you with the knowledge and tools needed to safeguard your digital assets in today’s dynamic threat environment.

time icon6 October, 2023 10:30

Digital Transformation Track - Session 2: Digital Transformation Implementation Perspectives Panel

speaker headshot Moderator: Sujata Tilak
Founder & Managing Director, Ascent Intellimation
speaker headshot Rohan Khare
Sr. Manufacturing Development Manager, Johns Manville
speaker headshot Andrew McDonald
Principal Consultant and Owner, FutureofManufacturing LLC
speaker headshot Brian Romano
Director Of Technology Development, The Arthur G. Russell Co., Inc.
Centennial Ballroom | Cheyenne Mountain Resort

There are many stakeholders in a digital transformation project. Join us for an insightful deep dive into stakeholder perspectives as it relates to digital transformation implementation. Our expert panelists will look at diverse perspectives of C-Suite executives, OT and IT folks and OEMs. Further they will discuss how all this ties together to deliver value to the organization.

Session Themes:

  • Stakeholder Engagement in Change Management
  • Case Study: OT Perspective
  • Case Study: IT Perspective
time icon6 October, 2023 10:30

Cybersecurity Track - Session 2: IT v OT Security Similarities Panel

speaker headshot Moderator: Scott Reynolds
Security Engineering Manager - ITD, Johns Manville
speaker headshot Marty Edwards
Deputy CTO - OT/IoT, Tenable
speaker headshot Glenn Merrell
ISA Instructor
speaker headshot Patrick O'Brien
Senior Safety and Cybersecurity Engineer, exida
Remington I | Cheyenne Mountain Resort

As the worlds of Information Technology (IT) and Operational Technology (OT) converge, understanding the commonalities in their security challenges is essential.  Join our expert panel for a thought-provoking discussion that will take a look into the overlapping vulnerabilities, threat landscapes, and risk mitigation strategies that apply to both IT and OT environments.  Explore how bridging the gap between these traditionally distinct domains can lead to more robust and resilient security measures. 

time icon6 October, 2023 11:30

Digital Transformation Track - Session 3: Automation & Digitalization in Meeting ESG Goals

speaker headshot Vivek Gupta
Joint Vice President & Head of the Department - Instrumentation & Digitalization, DCM Shriram Ltd.
Centennial Ballroom | Cheyenne Mountain Resort

To make our planet Earth a better place to Live, need of the hour is to seriously look into Environment, Social & Governance (ESG) aspects. How Automation & Digitalization helps is meeting the ESG Goals shall be discussed in my presentation as what process industries are doing and can do more. Vision of ISA is also Create a better world through Automation.

Business benefits are getting translated into ESG benefits. Hence, business targets and ESG goals go hand in hand. The 2030 Agenda for Sustainable Development, adopted by all United Nations Member States in 2015, provides a shared blueprint for peace and prosperity for people and the planet, now and into the future. Saving Environment, keeping people safe & also help Decision Makers to take informed & right decisions are highlighted in my presentation. Some Use Cases shall also be discussed which has helped in meeting ESG Goals.

time icon6 October, 2023 11:30

Cybersecurity Track - Session 3: Cyber-Safety is Essential for Cyber-Physical Systems

speaker headshot John Cusimano
Vice President of OT Cybersecurity, Armexa
Remington I | Cheyenne Mountain Resort

There are several formal definitions for cyber-physical systems (CPS) but, in general, they all describe CPS as computer systems (e.g., processors, networks, software) integrated with mechanical systems for the purpose of monitoring and controlling a physical process.  Certainly, industrial automation and control systems (IACS) fall under this definition, but the term goes beyond industrial applications and encompasses commercial and consumer applications such building automation systems, medical devices, automotive systems, and any “smart” or IoT device. 

 

What most CPS systems have in common is, if compromised, the consequences could result in sickness, injury, or death.  Take something as innocuous as a smart thermostat.  Under the right (or wrong) circumstances a person or animal could be harmed if it failed or was tampered with in a way that resulted in prolonged extreme temperatures and the occupant was unable to escape. 

 

Safety-engineering is a mature discipline with proven techniques, such as failure mode and effects analysis (FMEA), fault tree analysis (FTA), hazard and operability studies (HAZOPS), that are tools safety engineers use to study failure modes and to design systems that are fault-tolerant and failsafe.  When dealing with CPS, safety-engineers need to consider cybersecurity implications.  In other words, they need to consider the possibility and likelihood that a malicious actor or malicious software could intentionally or unintentionally manipulate the system using cyber means to either initiate an unsafe condition or disable/bypass safeguards that intended to protect the system. 

 

The challenge is that safety engineers are typically not cybersecurity experts and cybersecurity experts are typically not experts in electro-mechanical systems.  One solution is to cross-train and develop people who are versed in both fields (i.e., a new discipline called cyber-safety engineering).  True OT security experts fall into this category, but people with these unique skills and experience are rare and take years to develop.  Another solution is to apply methodologies that encourage/enforce collaboration between cybersecurity and safety engineers.  One such method, based on the ISA/IEC 62443-3-2 standard “Risk Assessment for Design”, is commonly referred to as Cyber PHA or Cyber HAZOP.  The method integrates input from experts in their discipline (i.e., automation engineers, process engineers, operators, IT and IT security, health & safety) to produce a cross-functional study of the true cyber-safety risks. Armed with this information, engineers and cyber-security professionals can work together to mitigate these risks.  

 

This presentation will provide an overview of the ISA/IEC 62443-3-2 standard and the Cyber PHA / Cyber HAZOP methodology and demonstrate how it can and has been applied to all forms of CPS, not just IACS.  It will also touch on the ISASecure certification program and how it ensures cyber-safety is designed into products and systems. 

time icon6 October, 2023 11:30

Career Skills Track - Session 1: Set Goals All the Time

speaker headshot Jeremy Wall
Co-Founder and CEO, Goalmakers
Remington II | Cheyenne Mountain Resort

Do you come to work, every day, knowing what your personal goals are? More so, could you or others on your team tell me what the company’s goals are for this year?  In this session we will focus on where to start and how to continually improve your own goalsetting process, both for short and long-term goals. Learn how effective leaders use goals to align the entire team around a shared vision of the future, and as a tool to empower those around them to focus on the daily actions and decisions that move the entire organization toward defining and achieving success.    

 

Learning Outcomes: 

- Learn the 5 parts of your long-term goal, aka your vision, that moves everyone together toward a shared future. 

- Understand the 3 fundamental types of organization-wide goals (financial, customer, & employee) and how to measure and manage each.  

- Establish the frameworks that must be in place to create ‘good goals’ for the company, departments, and individuals.

time icon6 October, 2023 12:00

Career Skills Track - Session 2: Serve the Right Customer

speaker headshot Jeremy Wall
Co-Founder and CEO, Goalmakers
Remington II | Cheyenne Mountain Resort

You need customers to survive, but the right customer helps your business thrive. In this session we will discuss the 5 Steps to Serving the Right Customer. Stop wasting time, energy, and money on the wrong customers. In this session you will define who the right customer is for your business and use that information to then determine your strategies that help you stand out in the market. Then we’ll discuss how you can improve your sales process to get more good customers and optimize your operations process to serve those good customers. It all comes together with actionable discussions that help you build a culture that is focused on serving the right customer.

 

Learning Outcomes: 

- Define the characteristics of the right customer for you (and the red flags you’d look to avoid). 

- Determine your north star strategy, there are only three options, so choose wisely!

- Refine your processes to first find more of the right customer and second to serve their needs.

time icon6 October, 2023 12:00

Cybersecurity Track - Session 4: Fundamentals of ISA/IEC 62443 and IIoT

speaker headshot Felipe Sabino Costa
Product Marketing Manager - Americas, Moxa
Remington I | Cheyenne Mountain Resort

In the realm of Industrial Internet of Things (IIoT), cybersecurity is paramount, and the ISA/IEC 62443 series of standards serves as a crucial guide. In this session we will unravel the core principles and practical applications of these standards.  Our expert presenter will provide an in-depth exploration of ISA/IEC 62443, offering insights into its relevance and significance in safeguarding industrial control systems and critical infrastructure.  Discover how IIoT technologies intersect with these standards and learn how to implement robust cybersecurity strategies for your industrial operations.

time icon6 October, 2023 12:00

Digital Transformation Track - Session 4: Digitization in Oil & Gas Projects

speaker headshot Steve Mustard
Digital Security and Risk Consultant, BP
Centennial Ballroom | Cheyenne Mountain Resort

This presentation will present a case study of the application of Industry 4.0 technologies on a recent mega project developing a new oil and gas production field. The discussion will cover digital twin, augmented reality, machine learning, and robotics, among others.

time icon6 October, 2023 12:45

Digital Transformation Track - Session 5: Where Are You On Your Digitization Journey?

speaker headshot Chris Monchinski
Chief Technology Officer, Automated Control Concepts, LLC
Centennial Ballroom | Cheyenne Mountain Resort

Most industrial enterprises have begun their digitization journey, often referred to as a "transformation" because of the expected change and desired positive impact we seek.  A well-organized approach to digital transformation for any industrial enterprise requires an organized and focused series of iterative improvements that are realized through the deployment of both cultural and technological changes that drive identified, key business values.  The level of long-term disciple and investment required along this journey can be a daunting challenge.   In this presentation, let's review a report card on what has succeeded and what has been challenging along this journey.  Let's summarize our learnings and discuss how we can put these into practice and improve our success rate along this journey. 

time icon6 October, 2023 12:45

Cybersecurity Track - Session 5: Robotics & Cybersecurity: Emerging Trends & Synergy

speaker headshot Dr. Jayesh Barve
Principal Engineer, Digital, Controls & Optimization, GE Global Research
Remington I | Cheyenne Mountain Resort

With the significant advances in multiple technologies like sensing, embedded electronics, communication, computing, image processing, analytics, AI/ML and internet; there has been a faster and deeper penetration of CPS (cyber physical systems) and IIOT (Industrial Internet of Things) happening across industrial applications, domains --- process & manufacturing industry, power & energy, utility, healthcare, mobility, transportation, aerospace etc. In fact, these technological advances greatly help make human lives in industry and society more efficient & better; via wide-spread use of advanced automation solutions enabling to perform many complex tasks easily with reduced human-interventions across many industrial & non-industrial applications. Hence, the embedded industrial edge-computing devices, connected with the wide-spread internet, have started to show-up right on the industrial production-manufacturing shop-floors. These advanced intelligent, flexible, mobile robotic automation machines & solutions have slowly started replacing (or sometimes even leap-frogging) the traditional popular PLC-based fixed task-oriented automatic manufacturing machines & programmable CNC machines. They involve more flexible, intelligent robotics automation solutions using (single or connected) stationary robotic-manipulators, (one or multiple) mobile-robots working collaboratively amongst themselves OR with the human-operators (via intelligent human-robot integration). They bring intelligent algorithms, computing and software applications providing better sensing, estimation, sensor-fusion, perception, navigation, guidance and controls functionalities & capabilities in machines, processes, systems working right on/near the operational shop-floor. Thus, with the increasing IT-OT convergence in such advanced fixed/mobile robotics; AND with wide-spread applications of such advanced robotics solutions across manufacturing, healthcare, non-industrial & societal applications; also fast-raising are the concerns of data-security breaches & cyber-attacks; & particularly more so due to their higher probability of occurrence, severity & impact.

time icon6 October, 2023 13:15

Lunch Break

Centennial Ballroom | Cheyenne Mountain Resort
time icon6 October, 2023 13:30

Cyber Incident Response (ICS4ICS) Workshop

speaker headshot Mark Boddy
ISAGCA
Remington II | Cheyenne Mountain Resort

NOTE:  Onsite/In-person delivery

Incident Command System for Industrial Control Systems (ICS4ICS) is designed to improve global Industrial Control System cybersecurity incident management capabilities. ICS4ICS will leverage the Incident Command System, as outlined by FEMA, for response structure, roles, and interoperability. The Incident Command System is used by First Responders globally every day when responding to motor vehicle accidents, small and large fires, hurricanes, floods, earthquakes, industrial accidents, and other high impact situations. The Incident Command System has been tested for more than 30 years of emergency and non-emergency applications, throughout all levels of government and within the private sector.

time icon6 October, 2023 14:00

Section and Division Volunteer Workshop

White River | Cheyenne Mountain Resort

Sections and Divisions exist because of the dedicated volunteers who stand up. Those who want to thrive should come workshop with us. Together, we will craft plans to be mission-focused, vibrant, and successful. This is NOT training. I repeat, this is NOT training. You will leave this workshop with a plan, with energy, with knowledge, and with an expanded network of other volunteers who believe in and want to shape ISA’s future. JOIN US!

time icon7 October, 2023 08:00

ISA101 HMI WG4 Standards Committee Meeting

Comanche | Cheyenne Mountain Resort

Location: Comanche | Cheyenne Mountain Resort

time icon7 October, 2023 12:00

ISA Golf Outing

Location: The Country Club of Colorado at The Cheyenne Mountain Resort

Join your fellow automation friends and colleagues for this ultimate sky-high networking activity, right in the mountains of Colorado!

Individual Play/Registration:

  • Single Golfer: $150.00 (own clubs) or $170.00 (with club rental). Registration fee does include grab-n-golf lunch and golf cart.      

THANK YOUTO OUR SPONSORS

Gala Sponsor

Silver Sponsors

Break Sponsor

Booth Sponsor

Open Process Automation Pavilion Partners

FAQsFrequently Asked Questions inquire


You will have the opportunity to network with ISA leaders and automation professionals from around the world—including managers, engineers, technicians, and subject matter experts.

  • Attend society meetings and leadership presentations
  • Attend vital technical sessions and access an array of technical subject matter experts from all over the world including the US, Canada, Middle East, Brazil, Malaysia, Spain, and India.
  • Interact with other conference attendees—in person or virtually
  • Visit exhibitor booths to gain insight and information on the latest industry technology products and solutions
  • Participate as an individual, team or sponsor at the ISA ALC Golf Outing
  • Attend the ISA Honors and Awards Gala

We look forward to having you with us in this October in Colorado Springs!