{"id":3328,"date":"2022-04-04T14:53:18","date_gmt":"2022-04-04T14:53:18","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3328"},"modified":"2022-09-12T14:12:45","modified_gmt":"2022-09-12T14:12:45","slug":"essential-frameworks-for-the-water-industry-water-isac","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/","title":{"rendered":"Essential Frameworks for the Water Industry: Water ISAC"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p>Protecting our nation\u2019s water supply is vital. It falls under the category of Critical National Infrastructure (CNI), and represents a resource so necessary to the United States \u201cthat [its] incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.\u201d However, at this point, there are not strong Federal guidelines surrounding cybersecurity for the water industry.<\/p>\n<p>In comes WaterISAC, a nonprofit dedicated to keeping the nation\u2019s water and wastewater plants cyber secure. <a href=\"https:\/\/www.waterisac.org\/\" target=\"_blank\" rel=\"noopener\">WaterISAC<\/a>, is a \u201ccomprehensive and targeted single point source for data, facts, case studies, and analysis on water security and threats from intentional contamination, terrorism, and cybercrime.\u201d In the words of the <a href=\"https:\/\/www.isao.org\/information-sharing-group\/sector\/water-isac\/\" target=\"_blank\" rel=\"noopener\">ISAO Standards Organization,<\/a> \u201cWaterISAC helps members strengthen their physical and cyber security, recover from natural and man-made disasters and improve overall preparedness and resilience.\u201d In 2019 they released their <a href=\"https:\/\/www.waterisac.org\/system\/files\/articles\/15%20Cybersecurity%20Fundamentals%20%28WaterISAC%29.pdf\" target=\"_blank\" rel=\"noopener\">15 Cybersecurity Fundamentals for Water and Wastewater Facilities<\/a>, a set of benchmarks designed to \u201cbe helpful to utilities preparing risk and resilience assessments required by America\u2019s Water Infrastructure Act, or AWIA.\u201d More on the act, later.<\/p>\n<p>To understand the context of these frameworks, it\u2019s necessary to understand the state of the industry, the threats being faced and how policy can help.<\/p>\n<h2><strong>Threats to US Water Supply<\/strong><\/h2>\n<p>In <a href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA21-287A-Ongoing_Cyber_Threats_to_U.S._Water_and_Wastewater_Systems.pdf\" target=\"_blank\" rel=\"noopener\">October,<\/a> the FBI, Environmental Protection Agency, National Security Agency and Cybersecurity and Infrastructure Security Agency (CISA) issued a joint advisory <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-287a\" target=\"_blank\" rel=\"noopener\">warning that<\/a> U.S. water and wastewater systems are being targeted by \u201cknown and unknown\u201d malicious actors. And, we see it happening.<\/p>\n<p>\u201cIt&#8217;s the kind of breach that has been warned about for years but is rarely seen,\u201d reads the <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/lye-poisoning-attack-florida-shows-cybersecurity-gaps-water-systems-n1257173\" target=\"_blank\" rel=\"noopener\">headline.<\/a> In February of last year, bad actors compromised a TeamViewer account, infiltrating the water supply in Oldsmar, Florida and nearly succeeding at raising the chemical levels to toxic amounts.<\/p>\n<p>In May of last year, two Pennsylvania water plants were<a href=\"https:\/\/www.wtae.com\/article\/fbi-investigating-hacking-threats-at-pennsylvania-water-systems\/36386504\" target=\"_blank\" rel=\"noopener\"> victims of attempted hacking<\/a>. The attacks were thwarted, but the superintendent of the Municipal Authority over the water supply revealed &#8221; it is alarming and it is a very vulnerable business.\u201d<\/p>\n<p>And the Metropolitan Water District experienced its own water scare, showing us that those looking to undermine the sector are not only going for small municipal facilities, but big game. The <a href=\"https:\/\/www.latimes.com\/world-nation\/story\/2021-06-15\/critical-entities-targeted-suspected-chinese-cyber-espionage\" target=\"_blank\" rel=\"noopener\">Pulse Secure hack<\/a> compromised a device meant to boost internet security and was thought to be a nation-state attack. According to experts, \u201c[S]ophisticated hackers exploited never-before-seen vulnerabilities to break in and were hyper-diligent in trying to cover their tracks once inside.\u201d<strong>\u00a0<\/strong><\/p>\n<h2><strong>Cybersecurity in the Water Sector<\/strong><\/h2>\n<p>Among the nations over 54,000 water facilities, there is little in the way of mandated cybersecurity policy. A mere 444 systems serve over half the population, while <a href=\"https:\/\/thehill.com\/opinion\/cybersecurity\/594125-water-companies-must-step-up-on-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">85% are municipally owned<\/a>, with 90% of wastewater plants under local jurisdiction as well. <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/lye-poisoning-attack-florida-shows-cybersecurity-gaps-water-systems-n1257173\" target=\"_blank\" rel=\"noopener\">Noted Suzanne Spaulding<\/a>, chief cybersecurity official at the Department of Homeland Security under the Obama administration, &#8220;When I first came into DHS and started getting the sector-specific briefings, my team said, &#8216;Here&#8217;s what you&#8217;ve got to know about water facilities: When you&#8217;ve seen one water facility, you&#8217;ve seen one water facility.'&#8221;<\/p>\n<p>According to the <a href=\"https:\/\/www.waterisac.org\/system\/files\/articles\/FINAL_2021_WaterSectorCoordinatingCouncil_Cybersecurity_State_of_the_Industry-17-JUN-2021.pdf\" target=\"_blank\" rel=\"noopener\">WaterISAC survey \u201cWater and Wastewater Systems Cybersecurity State of the Sector 2021\u201d<\/a>, \u201c60% of water utilities say they have not fully identified IT-networked assets in their networks, and only a little more than 21% of those utilities said they are working to do so.\u201d Add to that the fact that \u201croughly 70% said they have not fully identified all operational technology networked assets\u201d and the case can seem pretty dismal. Meanwhile, other CNI sectors like <a href=\"https:\/\/www.tdworld.com\/smart-utility\/grid-security\/article\/21216782\/nerc-focuses-on-the-future-enhancements-to-stay-ahead-of-urgent-risks\" target=\"_blank\" rel=\"noopener\">electricity<\/a> continue to expand and improve unifying cybersecurity standards.<\/p>\n<p>However, good moves are being made. According to a 2018 survey of these independent water facilities, <a href=\"https:\/\/nawc.org\/wp-content\/uploads\/2021\/04\/NAWC-2021-Safety-Benchmarking-Executive-Summary-Report.pdf\" target=\"_blank\" rel=\"noopener\">91 percent<\/a> have active cybersecurity programs. That\u2019s a great start. The White House hosted a <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/08\/25\/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Cyber Security Summit<\/a> back in August, and earlier this year, the <a href=\"https:\/\/thehill.com\/homenews\/administration\/591616-biden-administration-moves-to-boost-cybersecurity-of-water-systems\" target=\"_blank\" rel=\"noopener\">Biden administration<\/a> announced plans to address the cybersecurity of water and wastewater systems.<\/p>\n<p>Already in place is <a href=\"https:\/\/www.congress.gov\/bill\/115th-congress\/senate-bill\/3021\/text\" target=\"_blank\" rel=\"noopener\">America\u2019s Water Infrastructure Act, or AWIA<\/a>. Passed in 2018, it \u201cdeepens infrastructure investments\u201d and provides \u201cthe most far-reaching changes to the Safe Drinking Water Act since the 1996 Amendments.\u201d It claims over 30 mandated programs, and underpins cybersecurity frameworks established for the water industry, such as the one developed by WaterISAC.<strong>\u00a0<\/strong><\/p>\n<h2><strong>Essential Frameworks for Water Cybersecurity<\/strong><\/h2>\n<p>In an effort to strengthen the security posture of our nation\u2019s water utilities, and compliant with the standards in the AWIA, WaterISAC released their <a href=\"https:\/\/www.waterisac.org\/system\/files\/articles\/15%20Cybersecurity%20Fundamentals%20%28WaterISAC%29.pdf\" target=\"_blank\" rel=\"noopener\">15 Cybersecurity Fundamentals for Water and Wastewater Facilities<\/a>. These practices secure the information technology (IT) and operational technology (OT) systems that support national water and wastewater management. A summary can be <a href=\"https:\/\/www.cwea.org\/news\/cybersecurity-fundamentals-guide-for-water-and-wastewater-utilities-now-available\/\" target=\"_blank\" rel=\"noopener\">found here<\/a>, and recommendations include:<\/p>\n<ul>\n<li>Perform Asset Inventories<\/li>\n<li>Assess Risks<\/li>\n<li>Minimize Control System Exposure<\/li>\n<li>Enforce User Access Controls<\/li>\n<li>Safeguard from Unauthorized Physical Access<\/li>\n<li>Install Independent Cyber-Physical Safety Systems<\/li>\n<li>Embrace Vulnerability Management<\/li>\n<li>Create a Cybersecurity Culture<\/li>\n<li>Develop and Enforce Cybersecurity Policies and Procedures (Governance)<\/li>\n<li>Implement Threat Detection and Monitoring<\/li>\n<li>Plan for Incidents, Emergencies, and Disasters<\/li>\n<li>Tackle Insider Threats<\/li>\n<li>Secure the Supply Chain<\/li>\n<li>Address all Smart Devices (IoT, IIoT, Mobile, etc.)<\/li>\n<li>Participate in Information Sharing and Collaboration Communities<\/li>\n<\/ul>\n<p>\u201c<a href=\"https:\/\/www.waterisac.org\/\" target=\"_blank\" rel=\"noopener\">WaterISAC<\/a>&#8230; provides analysis and resources to support response, mitigation, and resilience initiatives,&#8221; and this 15-step framework is designed to prepare utilities for the risk and resilience assessments required by America\u2019s Water Infrastructure Act, or AWIA. The more the water sector adheres to essential cybersecurity frameworks, the better it will be able to defend against the advanced and persistent threats it has already begun to face.<\/p>\n<p>The water industry is in a unique position as a part of CNI because there is very little mandated security. If you are looking for help with securing such business, ITEGRITI has a team of <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\">dedicated professionals who can help navigate<\/a> you through various applicable frameworks.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":53,"featured_media":3330,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[2188,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essential Frameworks for the Water Industry: Water ISAC<\/title>\n<meta name=\"description\" content=\"WaterISAC, is a \u201ccomprehensive single point source for data and analysis on water security and threats from terrorism and cybercrime.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Frameworks for the Water Industry: Water ISAC\" \/>\n<meta property=\"og:description\" content=\"WaterISAC, is a \u201ccomprehensive single point source for data and analysis on water security and threats from terrorism and cybercrime.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-04T14:53:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-12T14:12:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katrina Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrina Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\"},\"author\":{\"name\":\"Katrina Thompson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\"},\"headline\":\"Essential Frameworks for the Water Industry: Water ISAC\",\"datePublished\":\"2022-04-04T14:53:18+00:00\",\"dateModified\":\"2022-09-12T14:12:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\"},\"wordCount\":1218,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg\",\"keywords\":[\"Cybersecurity\",\"Water Sector\"],\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\",\"name\":\"Essential Frameworks for the Water Industry: Water ISAC\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg\",\"datePublished\":\"2022-04-04T14:53:18+00:00\",\"dateModified\":\"2022-09-12T14:12:45+00:00\",\"description\":\"WaterISAC, is a \u201ccomprehensive single point source for data and analysis on water security and threats from terrorism and cybercrime.\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg\",\"width\":800,\"height\":450,\"caption\":\"water treatment facility\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential Frameworks for the Water Industry: Water ISAC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\",\"name\":\"Katrina Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"caption\":\"Katrina Thompson\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Essential Frameworks for the Water Industry: Water ISAC","description":"WaterISAC, is a \u201ccomprehensive single point source for data and analysis on water security and threats from terrorism and cybercrime.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/","og_locale":"en_US","og_type":"article","og_title":"Essential Frameworks for the Water Industry: Water ISAC","og_description":"WaterISAC, is a \u201ccomprehensive single point source for data and analysis on water security and threats from terrorism and cybercrime.\u201d","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-04-04T14:53:18+00:00","article_modified_time":"2022-09-12T14:12:45+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg","type":"image\/jpeg"}],"author":"Katrina Thompson","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Katrina Thompson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/"},"author":{"name":"Katrina Thompson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136"},"headline":"Essential Frameworks for the Water Industry: Water ISAC","datePublished":"2022-04-04T14:53:18+00:00","dateModified":"2022-09-12T14:12:45+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/"},"wordCount":1218,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg","keywords":["Cybersecurity","Water Sector"],"articleSection":["Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/","name":"Essential Frameworks for the Water Industry: Water ISAC","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg","datePublished":"2022-04-04T14:53:18+00:00","dateModified":"2022-09-12T14:12:45+00:00","description":"WaterISAC, is a \u201ccomprehensive single point source for data and analysis on water security and threats from terrorism and cybercrime.\u201d","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_90_WaterISAC.jpg","width":800,"height":450,"caption":"water treatment facility"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Essential Frameworks for the Water Industry: Water ISAC"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136","name":"Katrina Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","caption":"Katrina Thompson"},"url":"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3328"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3328"}],"version-history":[{"count":2,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3328\/revisions"}],"predecessor-version":[{"id":3331,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3328\/revisions\/3331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3330"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}