search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Cybersecurity |


Protecting critical infrastructure


The Cybersecurity and Infrastructure Security Agency (CISA) leads national efforts to safeguard physical and cyber infrastructure in the US from evolving threats. Michelle Yezierski, Section Chief – Dams, and Kate Schwartzer, Program Analyst, explain how the CISA works with public and private partners to enhance security and resilience


Can you give a brief introduction to the agency and the work it carries out? The Cybersecurity and Infrastructure Security Agency Act of 2018 established the Cybersecurity and Infrastructure Security Agency (CISA) as America’s Cyber Defense Agency and directed the agency to serve as the National Coordinator for critical infrastructure security and resilience. In this role, CISA leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every hour of every day. We work with partners to defend against today’s threats and collaborate with industry to build more secure and resilient infrastructure for the future.


While the agency is new, the mission is not.


Through national doctrine – issued and updated since 2005 and supported in federal law – the US Department of Homeland Security has supported the nation’s 16 critical infrastructure sectors, championed public-private partnerships, and implemented collective actions to understand and manage risk. Established in 2003, the Dams Sector is one such critical infrastructure sector. We are focused on working with the sector to ensure the security and resilience of dams, navigation locks, levees, hydropower projects, dikes, storm surge barriers, tailings dams, and other industrial waste impoundments.


What are the potential risks facing US infrastructure? In today’s globally interconnected world, the understanding of the importance of CISA’s mission sharpens as the nation’s critical infrastructure and American way of life face a wide array of serious risks and challenges. These challenges come from Mother Nature; a varied group of threat actors including nation states; as well as cybercriminals, terrorist groups, and other nefarious actors seeking to take advantage of our open society and the proliferation of technology to do us harm. While these risks are daunting, working together


to strengthen existing partnerships, building new partnerships, establishing sound policies, and implementing baseline security practices within the critical infrastructure sectors positions us to be able to confront these challenges head on.


References


https://www.cisa.gov/cross-sector-cybersecurity-performance-goals https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/dams-sector


18 | March 2025 | www.waterpowermagazine.com Persistent risks in the Dams Sector include natural


disasters and deliberate attacks against physical or cyber infrastructure that can result in loss of life or property damage, economic damage, damaged or destroyed facilities or assets, and disrupted operations. Natural hazards may include drought, earthquakes, extreme rainfall events and flooding, tropical cyclones, and wildfires, depending on the location of the asset. Deliberate physical attacks of concern to owners may be armed attacks, attacks by use of vehicles and unmanned aircraft systems, explosives, the threat of malicious insiders, and criminal acts. Sophisticated cyber threat actors and nation-state actors seek to exploit vulnerabilities to steal information and disrupt, destroy, or threaten the delivery of essential services provided by critical infrastructure, including dams. Underpinning these risks are operational challenges influencing dam safety and security decision-making. Examples include the need to manage operations and maintenance programs, communicate and collaborate, understand and manage dependencies, mitigate aging infrastructure, and address population growth around sector assets.


Have such risks become more prominent over recent years? Current trends in operations and risk drivers are making some risks to Dams Sector assets more prominent. The cyber risk landscape is changing everyday on its own and those changes become more pronounced as some owners and operators upgrade to modern control systems with standardized hardware or transition to remote monitoring and control processes that make them more susceptible to broadly exploited vulnerabilities and attack vectors. Alternately, not upgrading technology presents the risk of obsolete technology that cannot be patched or upgraded. The commercialization and weaponization of certain capabilities –such as drones and artificial intelligence (AI) systems – may aid adversaries in attacking critical infrastructure. Population growth and development around dams and levees are increasing the consequences of failure, potentially reclassifying the hazard potential of some assets. Changing weather patterns may bring more extreme weather, including droughts that reduce


water availability and severe storms that increase flooding.


How can these risks be minimized? What role can utilities and dam owners play in this? Any other comments? Risk management in the Dams Sector focuses on owners and operators making risk-informed decisions that best allocate limited resources to the most effective activities to prevent or mitigate the effects of incidents, regardless the cause. The dam safety community leverages long-standing and well-established risk management programs and approaches to assess, mitigate, and respond to the potential damages caused by catastrophic dam and levee failures, particularly those induced by natural hazards. Many owners have extended their risk management programs to also understand and manage risk from human-caused, deliberate attacks.


Facilities follow established design and construction standards, operation and maintenance procedures, inspection schedules, and protective measures guidelines and best practices to minimize the risk of failure, disruption, or mis-operation. Such activities help owners and operators to enhance security and resilience through preparing for and responding to incidents and adapting to changing conditions. Examples include adhering to design standards; performing inspections, surveillance, and monitoring to detect potential problems; reporting suspicious activities and cyber issues (such as unauthorized access, disruption, or system abuse); implementing protective measures; and planning for emergency response.


Specifically for cyber risks, owners and operators can implement cyber controls, which are the managerial, operational, and technical safeguards or countermeasures employed within an organizational system to protect the availability and integrity of the system and its information. Controls are used to reduce incident likelihood through actions such as network segmentation, use of multi-factor authentication, and installing software patches; build resilience to a cyber incident through testing backup procedures and manual controls; and detect and respond to cyber incidents.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45