Access Water | From Compliance to Confidence: Quantifying Water Utility Cyber Risk
lastID = -10122194
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Loading icon
Description: Access Water
Context Menu
Description: From Compliance to Confidence: Quantifying Water Utility Cyber Risk
From Compliance to Confidence: Quantifying Water Utility Cyber Risk
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2026-03-26 09:47:07 Adam Phillips
  • 2026-03-23 18:26:18 Adam Phillips Continuous release
  • 2026-03-23 15:37:08 Adam Phillips
  • 2026-03-23 10:13:03 Adam Phillips
  • 2026-03-23 07:42:45 Adam Phillips
  • 2026-03-12 14:17:53 Adam Phillips
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: From Compliance to Confidence: Quantifying Water Utility Cyber Risk
From Compliance to Confidence: Quantifying Water Utility Cyber Risk

From Compliance to Confidence: Quantifying Water Utility Cyber Risk

From Compliance to Confidence: Quantifying Water Utility Cyber Risk

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: From Compliance to Confidence: Quantifying Water Utility Cyber Risk
From Compliance to Confidence: Quantifying Water Utility Cyber Risk
Abstract
Water utility executives face increasing pressure to strengthen cybersecurity resilience, yet lack practical frameworks to translate technical threats into business terms. For over thirty years, cyber risk analysis has relied on qualitative methods and subjective judgment rather than measurable data. To manage cyber risk effectively, utilities must shift from compliance-driven practices to data-driven frameworks that quantify cyber exposure in financial terms and enable strategic decision-making. This presentation examines how integrating the National Institute of Standards & Technology (NIST) Cybersecurity Framework (CSF) with the Factor Analysis of Information Risk (FAIR) model creates a comprehensive Cyber Risk Management Program tailored for the Water and Wastewater Systems sector. [b]Regulatory Landscape[/b] Federal and state cybersecurity regulations are grounded in the NIST CSF, developed in response to Executive Order 13636 and expanded through the Cybersecurity Enhancement Act of 2014 to provide voluntary risk frameworks for critical infrastructure operators. The Cybersecurity and Infrastructure Security Agency (CISA) established the Cross-Sector Cybersecurity Performance Goals (CPGs) under National Security Memorandum 5, defining baseline security requirements for all critical infrastructure entities. The EPA has adopted these CPGs to evaluate water utility compliance with the America's Water Infrastructure Act (Section 2013) and Safe Drinking Water Act (Section 1433). States have followed suit, incorporating EPA guidance and Water ISAC recommendations that align with NIST CSF. Despite this regulatory alignment, the NIST CSF's reliance on qualitative, expert-led analysis creates inherent limitations. Risk assessments vary significantly based on individual practitioner judgment, often resulting in an incomplete understanding of actual threats and their business consequences. The regulatory environment continues to evolve. Congressional bill HR 2594 proposes establishing the Water Risk and Resilience Organization (WRRO) to develop additional cybersecurity guidance based on NIST CSF, with EPA oversight authority. This underscores the urgent need for water utilities to adopt quantifiable, defensible risk management approaches. [b]The Case for Quantified Risk Management[/b] While NIST CSF adoption simplifies regulatory compliance and provides a proven structure for identifying, protecting, detecting, responding to, and recovering from cyber threats, it does not address a critical gap: translating technical controls into quantifiable business risk. Water utilities face unique complexity in managing dual environments. Information Technology (IT) systems support customer services and financial operations where breaches trigger immediate financial and reputational damage. Operational Technology (OT) systems control water treatment processes using aging, proprietary components with extended lifecycles that lack modern security controls and prioritize safety and availability over confidentiality. This creates significant blind spots in asset visibility and vulnerability management across both domains. The FAIR model bridges this gap by replacing subjective 'high/medium/low' ratings with financial quantification. Executives can evaluate risk exposure through metrics such as Annualized Loss Expectancy (ALE), enabling data-driven investment decisions. By combining NIST CSF's control assessment framework with FAIR's financial modeling of credible threat scenarios-including SCADA system compromise or contamination events-utilities transform cyber risk from technical abstraction into prioritized business risk. [b]Executive Decision-Making Benefits[/b] Quantification establishes a common language between security and business functions, empowering leadership to make strategic decisions on:
Probability and cost of loss events
Critical asset prioritization
# Optimal security investment levels
Cost-benefit analysis of competing solutions
Vulnerability remediation sequencing
Resource allocation efficiency
Return on security investments This approach transforms cybersecurity from a compliance cost center into a strategic business enabler, allowing utilities to implement targeted measures that demonstrably reduce risk. [b]Implementation Realities[/b] While the benefits of integrating NIST CSF with Factor Analysis of Information Risk (FAIR) are compelling, successful implementation requires addressing significant practical challenges. FAIR-based quantification demands comprehensive data on assets, threat actors, vulnerabilities, and existing controls. For water utilities with limited IT/OT asset visibility and incomplete cybersecurity program documentation, this creates substantial barriers. Manual data collection is labor-intensive and often reveals gaps in fundamental asset management – a challenge that must be addressed before meaningful quantification can occur. Organizations accustomed to qualitative assessments must adopt structured, analytical methodologies. This cultural transformative shift requires executive sponsorship, staff training, and patience as teams develop new competencies. Security professionals must evolve from technical specialists to business translators capable of communicating risk in financial terms. Cyber risk quantification remains an emerging discipline with fragmented tooling and limited standardization. While demand for measurable risk assessment has grown alongside digital transformation pressures, most CISOs continue relying on traditional qualitative methods. The market maturity gap between stakeholder expectations and available methodologies underscores the need for practical frameworks like FAIR. FAIR is probabilistic, not predictive. It defines risk as the probable frequency and magnitude of future loss events relative to critical assets-not as certainty about specific incidents. This approach acknowledges the inherent uncertainty in cybersecurity while providing structured methods to estimate likelihood and impact ranges. Rather than attempting exhaustive coverage, FAIR focuses analytical resources on the assets most vital to operational continuity, enabling organizations to make rational trade-offs under uncertainty. [b]Conclusion[/b] Effective cybersecurity governance requires translating technical threats into business language that enables strategic decision-making. Integrating NIST CSF with FAIR creates this translation layer, bridging the gap between security operations and executive leadership. NIST CSF provides the structural foundation for assessing security posture and maturity across the identify, protect, detect, respond, and recover functions. FAIR quantifies this posture in financial terms, enabling leaders to model probable loss scenarios and prioritize mitigations through rigorous cost-benefit analysis. This integrated framework elevates cyber risk from an isolated technical concern to a component of enterprise risk management. Executives can compare cyber threats against other operational and strategic risks, allocate resources rationally, and safeguard security investments that align with broader business objectives. By combining NIST CSF's qualitative structure with FAIR's quantitative rigor, water utilities gain a comprehensive approach to understanding, communicating, and governing cyber risk at the leadership level-transforming cybersecurity from a compliance obligation into a strategic business capability.
This paper was presented at the WEF/AWWA Utility Management Conference in Charlotte, NC, March 24-27, 2026.
Presentation time
09:30:00
09:50:00
Session time
08:30:00
10:00:00
SessionStrengthening Water Systems: Crisis Management and Emergency Preparedness
Session locationCharlotte Convention Center
TopicEmergency Planning and Response
TopicEmergency Planning and Response
Author(s)
Espy, David
Author(s)D. Espy1
SourceProceedings of the Water Environment Federation
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Mar 2026
DOI10.2175/193864718825160182
Volume / Issue
Content sourceUtility Management Conference
Copyright2026
Word count10

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'From Compliance to Confidence: Quantifying Water Utility Cyber Risk'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: From Compliance to Confidence: Quantifying Water Utility Cyber Risk
From Compliance to Confidence: Quantifying Water Utility Cyber Risk
Pricing
Non-member price: $11.50
Member price:
-10122194
Get access
-10122194
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'From Compliance to Confidence: Quantifying Water Utility Cyber Risk'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: From Compliance to Confidence: Quantifying Water Utility Cyber Risk
From Compliance to Confidence: Quantifying Water Utility Cyber Risk
Abstract
Water utility executives face increasing pressure to strengthen cybersecurity resilience, yet lack practical frameworks to translate technical threats into business terms. For over thirty years, cyber risk analysis has relied on qualitative methods and subjective judgment rather than measurable data. To manage cyber risk effectively, utilities must shift from compliance-driven practices to data-driven frameworks that quantify cyber exposure in financial terms and enable strategic decision-making. This presentation examines how integrating the National Institute of Standards & Technology (NIST) Cybersecurity Framework (CSF) with the Factor Analysis of Information Risk (FAIR) model creates a comprehensive Cyber Risk Management Program tailored for the Water and Wastewater Systems sector. [b]Regulatory Landscape[/b] Federal and state cybersecurity regulations are grounded in the NIST CSF, developed in response to Executive Order 13636 and expanded through the Cybersecurity Enhancement Act of 2014 to provide voluntary risk frameworks for critical infrastructure operators. The Cybersecurity and Infrastructure Security Agency (CISA) established the Cross-Sector Cybersecurity Performance Goals (CPGs) under National Security Memorandum 5, defining baseline security requirements for all critical infrastructure entities. The EPA has adopted these CPGs to evaluate water utility compliance with the America's Water Infrastructure Act (Section 2013) and Safe Drinking Water Act (Section 1433). States have followed suit, incorporating EPA guidance and Water ISAC recommendations that align with NIST CSF. Despite this regulatory alignment, the NIST CSF's reliance on qualitative, expert-led analysis creates inherent limitations. Risk assessments vary significantly based on individual practitioner judgment, often resulting in an incomplete understanding of actual threats and their business consequences. The regulatory environment continues to evolve. Congressional bill HR 2594 proposes establishing the Water Risk and Resilience Organization (WRRO) to develop additional cybersecurity guidance based on NIST CSF, with EPA oversight authority. This underscores the urgent need for water utilities to adopt quantifiable, defensible risk management approaches. [b]The Case for Quantified Risk Management[/b] While NIST CSF adoption simplifies regulatory compliance and provides a proven structure for identifying, protecting, detecting, responding to, and recovering from cyber threats, it does not address a critical gap: translating technical controls into quantifiable business risk. Water utilities face unique complexity in managing dual environments. Information Technology (IT) systems support customer services and financial operations where breaches trigger immediate financial and reputational damage. Operational Technology (OT) systems control water treatment processes using aging, proprietary components with extended lifecycles that lack modern security controls and prioritize safety and availability over confidentiality. This creates significant blind spots in asset visibility and vulnerability management across both domains. The FAIR model bridges this gap by replacing subjective 'high/medium/low' ratings with financial quantification. Executives can evaluate risk exposure through metrics such as Annualized Loss Expectancy (ALE), enabling data-driven investment decisions. By combining NIST CSF's control assessment framework with FAIR's financial modeling of credible threat scenarios-including SCADA system compromise or contamination events-utilities transform cyber risk from technical abstraction into prioritized business risk. [b]Executive Decision-Making Benefits[/b] Quantification establishes a common language between security and business functions, empowering leadership to make strategic decisions on:
Probability and cost of loss events
Critical asset prioritization
# Optimal security investment levels
Cost-benefit analysis of competing solutions
Vulnerability remediation sequencing
Resource allocation efficiency
Return on security investments This approach transforms cybersecurity from a compliance cost center into a strategic business enabler, allowing utilities to implement targeted measures that demonstrably reduce risk. [b]Implementation Realities[/b] While the benefits of integrating NIST CSF with Factor Analysis of Information Risk (FAIR) are compelling, successful implementation requires addressing significant practical challenges. FAIR-based quantification demands comprehensive data on assets, threat actors, vulnerabilities, and existing controls. For water utilities with limited IT/OT asset visibility and incomplete cybersecurity program documentation, this creates substantial barriers. Manual data collection is labor-intensive and often reveals gaps in fundamental asset management – a challenge that must be addressed before meaningful quantification can occur. Organizations accustomed to qualitative assessments must adopt structured, analytical methodologies. This cultural transformative shift requires executive sponsorship, staff training, and patience as teams develop new competencies. Security professionals must evolve from technical specialists to business translators capable of communicating risk in financial terms. Cyber risk quantification remains an emerging discipline with fragmented tooling and limited standardization. While demand for measurable risk assessment has grown alongside digital transformation pressures, most CISOs continue relying on traditional qualitative methods. The market maturity gap between stakeholder expectations and available methodologies underscores the need for practical frameworks like FAIR. FAIR is probabilistic, not predictive. It defines risk as the probable frequency and magnitude of future loss events relative to critical assets-not as certainty about specific incidents. This approach acknowledges the inherent uncertainty in cybersecurity while providing structured methods to estimate likelihood and impact ranges. Rather than attempting exhaustive coverage, FAIR focuses analytical resources on the assets most vital to operational continuity, enabling organizations to make rational trade-offs under uncertainty. [b]Conclusion[/b] Effective cybersecurity governance requires translating technical threats into business language that enables strategic decision-making. Integrating NIST CSF with FAIR creates this translation layer, bridging the gap between security operations and executive leadership. NIST CSF provides the structural foundation for assessing security posture and maturity across the identify, protect, detect, respond, and recover functions. FAIR quantifies this posture in financial terms, enabling leaders to model probable loss scenarios and prioritize mitigations through rigorous cost-benefit analysis. This integrated framework elevates cyber risk from an isolated technical concern to a component of enterprise risk management. Executives can compare cyber threats against other operational and strategic risks, allocate resources rationally, and safeguard security investments that align with broader business objectives. By combining NIST CSF's qualitative structure with FAIR's quantitative rigor, water utilities gain a comprehensive approach to understanding, communicating, and governing cyber risk at the leadership level-transforming cybersecurity from a compliance obligation into a strategic business capability.
This paper was presented at the WEF/AWWA Utility Management Conference in Charlotte, NC, March 24-27, 2026.
Presentation time
09:30:00
09:50:00
Session time
08:30:00
10:00:00
SessionStrengthening Water Systems: Crisis Management and Emergency Preparedness
Session locationCharlotte Convention Center
TopicEmergency Planning and Response
TopicEmergency Planning and Response
Author(s)
Espy, David
Author(s)D. Espy1
SourceProceedings of the Water Environment Federation
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Mar 2026
DOI10.2175/193864718825160182
Volume / Issue
Content sourceUtility Management Conference
Copyright2026
Word count10

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2026 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Espy, David. From Compliance to Confidence: Quantifying Water Utility Cyber Risk. Water Environment Federation, 2026. Web. 20 May. 2026. <https://www.accesswater.org?id=-10122194CITANCHOR>.
Espy, David. From Compliance to Confidence: Quantifying Water Utility Cyber Risk. Water Environment Federation, 2026. Accessed May 20, 2026. https://www.accesswater.org/?id=-10122194CITANCHOR.
Espy, David
From Compliance to Confidence: Quantifying Water Utility Cyber Risk
Access Water
Water Environment Federation
March 26, 2026
May 20, 2026
https://www.accesswater.org/?id=-10122194CITANCHOR