WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Proactive Response and Recovery for OT
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Proactive Response and Recovery for OT

Author: Jennifer Walker

Created: Tuesday, September 22, 2020 - 18:16

Categories: Cybersecurity, General Security and Resilience

Whether consistently performed and maintained or not, there is little argument on the importance of being proactive with the NIST Cybersecurity Framework’s first 2 core principles of identification and protection. The OT integrity company PAS Global makes an interesting observation that the importance of proactive detection, response, and recovery are not as well-discussed or practiced in OT environments. PAS explains this assertion by highlighting a recent case that illustrates some failures and opportunities associated with being reactive vs. proactive – regardless if the incident is caused by an attack or something else like a configuration change. According to PAS, in what was believed to be a seemingly harmless IT change (updating a static IP address on an engineering workstation that was hosting the distributed control system configuration), an organization lost their entire control strategy information along with tag references and programs. PAS explains that because no one had anticipated an IP address change could have such a negative impact, no backup of the workstation and configuration files were proactively performed prior to the change. And, to make matters worse, there was no other good back up available from an earlier time.

PAS points out two lessons learned from this incident:

  • Taking the time to produce a backup before undertaking maintenance tasks, even when they do not have expected risks, should not be overlooked.
  • Having another source of your OT configuration data is a must have for business resiliency – whether that is to recover from human error, as in this case, or a cyber attack.

Lessons learned from others are a great way to be proactive in your strategy to avoid similar outcomes. Read more at PAS.

Related Resources

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Claude Mythos Preview: The AI Inflection Point in Vulnerability Management

Apr 16, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar