WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships How are you Managing Transient and Other Portable Devices?
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

How are you Managing Transient and Other Portable Devices?

Author: Jennifer Walker

Created: Thursday, September 3, 2020 - 18:24

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

While properly securing devices like laptops and USBs that are not perpetually connected to the network is not a new problem, that endeavor became exponentially more complicated in light of the current pandemic. Prior to the pandemic, some organizations were able to greatly restrict transient devices in their environment; now, not so much. This means that controls, policies, and procedures for securing these ephemeral devices can no longer be deferred. Critical infrastructure security firm Applied Risk shares its view on some of the challenges OT environments face in securing transient assets and other portable media. It probably comes as no surprise that an accurate and up-to-date asset inventory tops the list. However, Applied Risk offers a reminder on the importance of identifying and managing other physical ports of entry such as plug-ins, remote workers, scheduled vendor visits, portable electronic devices, and the ever-perilous personal-and-business use consumer electronics (BYOD). The referenced post has somewhat of a checklist of considerations for mitigating risk from these fleeting devices. Read more at Applied Risk.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar