Access Water | What Every Water Utility Should Know About CyberSecurity: Minutes Matter,...
lastID = -10116313
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: WEFTEC 2024 PROCEEDINGS
What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2024-09-30 15:34:50 Adam Phillips Continuous release
  • 2024-09-26 15:15:24 Adam Phillips
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: WEFTEC 2024 PROCEEDINGS
What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count

What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count

What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: WEFTEC 2024 PROCEEDINGS
What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count
Abstract
This year, cybersecurity attacks against our nation's critical infrastructure sectors have continued to challenge the operational integrity of our manufacturing environments and threaten our way of life. Cybercrime is an economic and national security sustainability threat. As we know, threat actor motives are often rooted in financial gain, as well as ideological differences. In short cybercrime is here to stay. Minutes matter, seconds count and the only control we have as people are over the decisions we choose to make to better protect our communities. As a result of consistently high cyber-attack attempts and incidents, recent changes to Federal and State administrative and civil laws have evolved to drive cyber risk management accountability. The time to act as a collective in the Water and Wastewater community is now because the quantifiable risk and liability associated with cyber-attack incidents has grown to an unsustainable level. To further contextualize, several states have waived sovereign immunity privileges relative to risk management, which directly places municipalities at risk from a Civil-tort liability perspective. Our goal as an organization is to help our customers on three fronts: fiduciary risk quantification, OT risk identification, and the development of a feasible OT system hardening roadmap that is tailored to your organizational needs. In this session, we will review the tactics, techniques, and procedures that every utility should know to protect themselves and build a comprehensive, unified IT/OT cyber resilience plan accounting for all potential security risk before, during, or after a cyber event. Additionally, a detailed explanation of next-generation OT networks and describe why traditional network isolation cyber defenses are no longer adequate for these mission-critical environments. We will offer a detailed cyber strategy and architecture to protect these networks' enhanced capabilities, along with common pitfalls and lessons learned. It is no surprise — Industrial Control Systems (ICS) are in the crosshairs of opposing nations and criminal organizations. Water and Wastewater facilities specifically need a heightened awareness due to their key role in the global supply chain. In addition to known bad actors, the modern facility is connecting to the outside world at an exponential pace and with greater connectivity comes greater security risk. Even well-intentioned actions can mistakenly impact network availability, interrupt operations, and halt productivity. Water and Wastewater organizations need a— including (but not limited to):

*Asset Inventory / Installed Base Identification

*Vulnerability & Risk Analysis

*Qualified Patch Management

*Cybersecurity Policy Development

*Endpoint Protection

*Perimeter Hardening (IDMZ) & Microsegmentation Deployment

*Zero-trust & Secure Remote Access

*Real-time Threat Detection

*Disaster Recovery Planning & Incident Response The best approach is risk-based in alignment with industry best practices with complete organizational adoption. Unfortunately, even the most sophisticated organizations can't manage all aspects of IT/OT cybersecurity alone — you need an ecosystem of trusted experts and partners by your side to extend your protection against next-gen security threats. To secure modern operational equipment — Computer OS Security, Network Security, Endpoint Protection, and continuous Security Monitoring. We will also review the emerging Managed Security Services leading the industry in data-driven cyber protection and response so that you can have confidence running a world-class ICS cybersecurity program.
This paper breaks down global and domestic efforts intended to align critical infrastructure with principles of Industry 5.0. Federal and State policy efforts underpin the rising financial liability that tolerated cyber risk now represents for water municipalities. The risk that is tolerated is the risk that is shared with your consumers. The time for transparency and alignment with standards is now and this paper guides you towards the true north for your OT-IACS environment to avoid liability.
SpeakerHumphries, Chad
Presentation time
08:30:00
08:40:00
Session time
08:30:00
10:00:00
SessionCybersecurity Threats: Managing Your Facility's Risk
Session number514
Session locationRoom 356
TopicAsset Management, Business Organization and Technology Transformation, Facility Operations and Maintenance, Fundamental Level, Utility Management and Leadership
TopicAsset Management, Business Organization and Technology Transformation, Facility Operations and Maintenance, Fundamental Level, Utility Management and Leadership
Author(s)
Humphries, Chad
Author(s)C.C. Humphries1
Author affiliation(s)1Rockwell Automation, MN
SourceProceedings of the Water Environment Federation
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Oct 2024
DOI10.2175/193864718825159660
Volume / Issue
Content sourceWEFTEC
Copyright2024
Word count13

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WEFTEC 2024 PROCEEDINGS
What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count
Pricing
Non-member price: $11.50
Member price:
-10116313
Get access
-10116313
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: WEFTEC 2024 PROCEEDINGS
What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count
Abstract
This year, cybersecurity attacks against our nation's critical infrastructure sectors have continued to challenge the operational integrity of our manufacturing environments and threaten our way of life. Cybercrime is an economic and national security sustainability threat. As we know, threat actor motives are often rooted in financial gain, as well as ideological differences. In short cybercrime is here to stay. Minutes matter, seconds count and the only control we have as people are over the decisions we choose to make to better protect our communities. As a result of consistently high cyber-attack attempts and incidents, recent changes to Federal and State administrative and civil laws have evolved to drive cyber risk management accountability. The time to act as a collective in the Water and Wastewater community is now because the quantifiable risk and liability associated with cyber-attack incidents has grown to an unsustainable level. To further contextualize, several states have waived sovereign immunity privileges relative to risk management, which directly places municipalities at risk from a Civil-tort liability perspective. Our goal as an organization is to help our customers on three fronts: fiduciary risk quantification, OT risk identification, and the development of a feasible OT system hardening roadmap that is tailored to your organizational needs. In this session, we will review the tactics, techniques, and procedures that every utility should know to protect themselves and build a comprehensive, unified IT/OT cyber resilience plan accounting for all potential security risk before, during, or after a cyber event. Additionally, a detailed explanation of next-generation OT networks and describe why traditional network isolation cyber defenses are no longer adequate for these mission-critical environments. We will offer a detailed cyber strategy and architecture to protect these networks' enhanced capabilities, along with common pitfalls and lessons learned. It is no surprise — Industrial Control Systems (ICS) are in the crosshairs of opposing nations and criminal organizations. Water and Wastewater facilities specifically need a heightened awareness due to their key role in the global supply chain. In addition to known bad actors, the modern facility is connecting to the outside world at an exponential pace and with greater connectivity comes greater security risk. Even well-intentioned actions can mistakenly impact network availability, interrupt operations, and halt productivity. Water and Wastewater organizations need a— including (but not limited to):

*Asset Inventory / Installed Base Identification

*Vulnerability & Risk Analysis

*Qualified Patch Management

*Cybersecurity Policy Development

*Endpoint Protection

*Perimeter Hardening (IDMZ) & Microsegmentation Deployment

*Zero-trust & Secure Remote Access

*Real-time Threat Detection

*Disaster Recovery Planning & Incident Response The best approach is risk-based in alignment with industry best practices with complete organizational adoption. Unfortunately, even the most sophisticated organizations can't manage all aspects of IT/OT cybersecurity alone — you need an ecosystem of trusted experts and partners by your side to extend your protection against next-gen security threats. To secure modern operational equipment — Computer OS Security, Network Security, Endpoint Protection, and continuous Security Monitoring. We will also review the emerging Managed Security Services leading the industry in data-driven cyber protection and response so that you can have confidence running a world-class ICS cybersecurity program.
This paper breaks down global and domestic efforts intended to align critical infrastructure with principles of Industry 5.0. Federal and State policy efforts underpin the rising financial liability that tolerated cyber risk now represents for water municipalities. The risk that is tolerated is the risk that is shared with your consumers. The time for transparency and alignment with standards is now and this paper guides you towards the true north for your OT-IACS environment to avoid liability.
SpeakerHumphries, Chad
Presentation time
08:30:00
08:40:00
Session time
08:30:00
10:00:00
SessionCybersecurity Threats: Managing Your Facility's Risk
Session number514
Session locationRoom 356
TopicAsset Management, Business Organization and Technology Transformation, Facility Operations and Maintenance, Fundamental Level, Utility Management and Leadership
TopicAsset Management, Business Organization and Technology Transformation, Facility Operations and Maintenance, Fundamental Level, Utility Management and Leadership
Author(s)
Humphries, Chad
Author(s)C.C. Humphries1
Author affiliation(s)1Rockwell Automation, MN
SourceProceedings of the Water Environment Federation
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Oct 2024
DOI10.2175/193864718825159660
Volume / Issue
Content sourceWEFTEC
Copyright2024
Word count13

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Humphries, Chad. What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count. Water Environment Federation, 2024. Web. 31 Aug. 2025. <https://www.accesswater.org?id=-10116313CITANCHOR>.
Humphries, Chad. What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count. Water Environment Federation, 2024. Accessed August 31, 2025. https://www.accesswater.org/?id=-10116313CITANCHOR.
Humphries, Chad
What Every Water Utility Should Know About CyberSecurity: Minutes Matter, Seconds Count
Access Water
Water Environment Federation
October 9, 2024
August 31, 2025
https://www.accesswater.org/?id=-10116313CITANCHOR