Skip to content
CSIC-logo-600

Wednesday, 26 October 2022 | 8:00 a.m. - 5:00 p.m. CT

Virtual Attendee Instructions

Note: If you've registered in advance, you will not be able to login until the day of the live event.

1. Log in to the Cybersecurity Standards Implementation Conference:

  • Visit https://csic.isa.org/
  • Log in with the email you used to register. You will not need a password.
  • Update your profile information and add a picture to help other attendees find you. Also, please update your ISA member or non-member designation! 
  • Your unique email is tied to your access, so only one user can log in per email address (sorry, no sharing)!
  • See FAQs on the login page for additional details

2. Make the most out of your exhibit hall experience!

  • On Wednesday at 8:00 a.m. CT, log in to https://csic.isa.org/ and head over to the Exhibit Hall. Click on the sign for the Exhibit Hall or use the Exhibit Hall tab on the Toolbar. 
  • Visit our exhibitors and sponsors, grab information for your briefcase, watch videos on new products or services, and network.
  • Use the chat box in the exhibit booths to have one-on-one conversations about your specific needs.
  • View exhibitor profiles by clicking on their names and copy their email into your briefcase for later. This process beats exchanging business cards!

3. Get ready for live Zoom webinar sessions!

  • These topic groups led by industry experts occur in special Zoom video calls launched from inside the virtual conference platform.
  • You won't need a Zoom meeting ID/Pin, but you will need to have the latest version of ZOOM downloaded. Click HERE to download. 

4. Get ready to make the most out of your virtual conference experience!

  • On Wednesday at 9:00 a.m. CT, head on over to the Auditorium.
  • Click on the play button on the auditorium screen, which will direct you to the available Zoom webinars for the day.
  • Review the summaries and bios for the presenters, download handouts, and choose the session you would like to attend.
  • When the session is set to begin, a join button will appear by the speaker name. Click to join the meeting. 
  • During sessions, submit questions into the Q&A box. ISA staff moderators will read questions to the presenters in the order in which they are received.
  • Check out the full agenda by visiting https://csic.isa.org/.

5. Look out for the recordings!

  • Can't attend the live event? With your ticket, you will have access to the session videos for up to thirty days after the event by using your same login from the live program!

Attending LIVE?

Attendees registered to attend the live event should arrive at the location below and head to the registration desk to then be directed to the location of the opening session.

Location: Wood
Address: 17420 Katy Fwy, Houston, TX 77084 United States

How to access the recorded sessions:

  • Login to the conference website (https://csic.isa.org) using the same email you used to register and attend the event.
  • Click on 'Auditorium.'
  • Click on the screen to access the recorded presentations from the schedule. 
  • Click on the 'Play' button to access the select recordings.

Thank You to Our Sponsors!

Take Advantage of Cybersecurity Month!

This October, take 300 USD off ISA cybersecurity training by using promo code ISACYBER300.

International Society of Automation

The International Society of Automation (ISA) is a non-profit professional association of engineers, technicians, and management engaged in industrial automation. We have 75 years of history developing standards, education, and resources about automation systems and processes—we understand the complexity of your business, and we can help you develop strategies to harness new technology and drive performance improvements.

ISA is the author of the ISA/IEC 62443 Industrial Automation and Control Systems Security series of standards, the world’s only consensus-based cybersecurity standards for automation and control system applications.

Developed by a cross-section of international cybersecurity subject-matter experts from industry, government, and academia, the evolving standards represent a comprehensive approach to cybersecurity.

Sign Up for ISA Events Emails

Get the latest updates and information about ISA conferences and events. Subscribe to our email list now! 

To view ISA's data collection privacy policy and further details on how we use your data, please click here.