WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Cyber Resilience – Asset Visibility is Key First Step in Overall Cybersecurity
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partnerships
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Cyber Resilience – Asset Visibility is Key First Step in Overall Cybersecurity

Author: Alec Davison

Created: Thursday, September 8, 2022 - 19:34

Categories: Cybersecurity

Understanding all the systems and devices that make up your organization’s network is a critical first step in establishing a cyber risk management strategy. Since you cannot defend or secure what you do not know you have, performing asset inventories to gain network visibility is critical for all organizations large and small. According to Tenable, organizations that have full network visibility “are better positioned to understand where the greatest risks are within their environment and start taking the necessary steps to mitigate risk where it matters most.”

Consequently, WaterISAC’s number one fundamental from its 15 Cybersecurity Fundamentals for Water and Wastewater Utilities is to Perform Asset Inventories. An asset inventory involves compiling a database of an organization’s devices, data, processes, personnel, and supporting infrastructure and dependencies to other systems, incorporating both OT and IT components. Conducting a physical inspection of your asset inventory is also a key requirement. Additionally, an asset inventory can help organizations identify exposed ports and services, servers, and outdated and end-of-life systems and applications. There are many resources and solutions for assisting organizations in conducting asset inventories, the CISA Cyber Essentials Toolkit 3 – Protect Critical Assets and Applications includes resources to help you learn what is on your network. Additionally, smaller utilities may wish to consider subscribing to Dragos’ new OT-CERT for free resources, including an Asset Management Toolkit to help build or refresh your asset inventory. Read more at Tenable.

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar