WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Could your Asset Management Program be Hindering your OT Vulnerability Management Program?
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Could your Asset Management Program be Hindering your OT Vulnerability Management Program?

Author: Jennifer Walker

Created: Thursday, August 6, 2020 - 17:56

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities, #7 – Embrace Vulnerability Management discusses how vulnerability management is at the core of every cyber risk management strategy. It also highlights that only when you know what you have are you able to effectively discover, prioritize, and remediate vulnerabilities to any (IT or OT) system. Therefore, a comprehensive asset inventory is a foundational prerequisite for successful vulnerability management. Verve Industrial seems to agree with us. In its latest post Verve states, “a powerful asset inventory management solution is crucial for a successful vulnerability management program.” The value of asset inventory usually goes unchallenged, but too few organizations do it effectively, especially where OT devices are concerned. Don’t let the challenges of asset management contribute to the deficiencies of vulnerability management. Vulnerability management is a continuous process, completely intertwined with asset inventory. Together they contribute to the success of your overall cyber defense. For a quick reference and more resources on comprehensive asset management, review #1 – Perform Asset Inventories in WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities. See what else you might be holding back your vulnerability management at Verve

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar