WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Where Could We Be - Potential Societal Implications of Industrial Cyber Attacks in the Decade Ahead
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Where Could We Be – Potential Societal Implications of Industrial Cyber Attacks in the Decade Ahead

Author: Jennifer Walker

Created: Thursday, December 5, 2019 - 17:41

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

If you are reading this, you understand the devastation that can occur when critical infrastructure fails. Whether the compromise is due to a mechanical failure or a cyber attack, societal ramifications can be dire. In a recent post, Sergio Caltagirone, Vice President of Threat Intelligence at industrial cybersecurity firm Dragos, presents several interconnected reasons we may expect important humanitarian consequences from cyber operations over the next decade. As industrial-focused threat actors continue investing in offensive capabilities, it is reasonable to expect future attacks will become more widespread and cause significant suffering among populations and damage to economies. However, another notion not yet widely discussed is that industrial-focused cyber threat actors may be following their IT-focused counterparts by commoditizing their tactics, techniques, and procedures (TTPs). With exploit kits and “as-a-service” cybercrime offerings, cyber attacks such as phishing and ransomware are available for even novice actors to deploy for personal, criminal, or political gain. Sergio suggests that a commoditization of industrial attacks will be deployed on a whim with similar motives. Such an industrial cyber threat model might lead to a future underground marketing message like: “Tell us the water company’s name, and for only $100,000 we will shut down all pumps for one week.”

All critical infrastructure organizations have a duty to protect civilization. Without a substantial global investment in OT cyber defense, the next decade could experience significant unexpected loss to primary critical services, like power, drinking water, and wastewater management. Read the post at Dragos

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar