Impact of Increasing Cyber Threats on Urban Water Infrastructure

urban water institute increasing cyber threats n.w
1 / 5
Embed
Share

Explore the challenges posed by rising cyber threats to critical infrastructure, with insights on the need for proactive strategies in cybersecurity. Learn from expert recommendations on assessing risks, developing policies, and ensuring data protection to safeguard against potential vulnerabilities. Discover how innovative technologies can be leveraged to counter evolving threats and secure essential urban water systems effectively.

  • Cybersecurity
  • Critical Infrastructure
  • Urban Water
  • Cyber Threats
  • Risk Assessment

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Urban Water Institute Increasing Cyber Threats impacting Critical Infrastructure Frank Ury, September 2021

  2. The Problem Threats to critical infrastructure will only increase Adversaries move forward five times faster than we do Finding comparable cyber resources is expensive Complacencies All above average

  3. The Opportunity Sometimes you need technology to defeat technology Alan Turing, The Imitation Game The threat is growing faster than ever Not always about money Evaluate your risk From external threat actors From your own internal capabilities Never think your data is not valuable to someone

  4. Executive Decisions Determine if you have the resources to succeed in cyber security inhouse If yes, lay out a multi year strategy including funding, training, resourcing and policy development If not, work to create a partner model to include RFP Assessment of your environment Remediation plan Monitoring Incident Response Policy development Cost containment Physical security/background checks

  5. Thanks Frank Ury Director, Santa Margarita Water District frankury@cox.net

Related


More Related Content