WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships OT/ICS Cybersecurity – Vulnerability Management of Embedded Devices
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

OT/ICS Cybersecurity – Vulnerability Management of Embedded Devices

Author: Jennifer Walker

Created: Monday, November 16, 2020 - 22:19

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

After its recent webinar on Understanding Embedded Devices and Firmware in OT, Verve Industrial took to its blog to address many questions posed during the event. Verve responds in detail and provides “pro-tips” to six important questions for understanding cybersecurity and vulnerability management issues for embedded devices.

Questions answered in this post include:

  • Tracking vulnerabilities in firmware.
  • Identification of vulnerable devices.
  • Safe discovery and mitigation of legacy devices.
  • Built-in firmware configuration features to apply principle of least privilege.
  • “Patching” OT/ICS device firmware.
  • Positively impacting security culture, including influencing greater security of the supply chain from manufacturing to implementation.

Utilities continually challenged by vulnerability management in the OT/ICS environment may find this post useful. Access “Protecting Embedded Systems in OT Cybersecurity” at Verve Industrial.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar