WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Cyber Resilience – Asset Visibility is Key First Step in Overall Cybersecurity
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Cyber Resilience – Asset Visibility is Key First Step in Overall Cybersecurity

Author: Alec Davison

Created: Thursday, September 8, 2022 - 19:34

Categories: Cybersecurity

Understanding all the systems and devices that make up your organization’s network is a critical first step in establishing a cyber risk management strategy. Since you cannot defend or secure what you do not know you have, performing asset inventories to gain network visibility is critical for all organizations large and small. According to Tenable, organizations that have full network visibility “are better positioned to understand where the greatest risks are within their environment and start taking the necessary steps to mitigate risk where it matters most.”

Consequently, WaterISAC’s number one fundamental from its 15 Cybersecurity Fundamentals for Water and Wastewater Utilities is to Perform Asset Inventories. An asset inventory involves compiling a database of an organization’s devices, data, processes, personnel, and supporting infrastructure and dependencies to other systems, incorporating both OT and IT components. Conducting a physical inspection of your asset inventory is also a key requirement. Additionally, an asset inventory can help organizations identify exposed ports and services, servers, and outdated and end-of-life systems and applications. There are many resources and solutions for assisting organizations in conducting asset inventories, the CISA Cyber Essentials Toolkit 3 – Protect Critical Assets and Applications includes resources to help you learn what is on your network. Additionally, smaller utilities may wish to consider subscribing to Dragos’ new OT-CERT for free resources, including an Asset Management Toolkit to help build or refresh your asset inventory. Read more at Tenable.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar