{"id":17787,"date":"2021-12-09T14:00:43","date_gmt":"2021-12-09T17:00:43","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=17787"},"modified":"2021-12-09T12:08:23","modified_gmt":"2021-12-09T15:08:23","slug":"cybersecurity-risk-responsibility-in-the-water-sector","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/cybersecurity-risk-responsibility-in-the-water-sector\/","title":{"rendered":"Cybersecurity Risk &#038; Responsibility in the Water Sector"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-17788\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/12\/cybersecurity-risk-responsibility-in-the-water-sector.jpg\" alt=\"Cybersecurity Risk &amp; Responsibility in the Water Sector\" width=\"145\" height=\"187\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/12\/cybersecurity-risk-responsibility-in-the-water-sector.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/12\/cybersecurity-risk-responsibility-in-the-water-sector-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Judith H. Germano<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>American Water Works Association (AWWA)<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Cybersecurity is a top priority for the water and wastewater sector. Entities, and the senior individuals who run them, must devote considerable attention and resources to cybersecurity preparedness and response, from both a technical and governance perspective. Cyber risk is the top threat facing business and critical infrastructure in the United States. Government intelligence confirms the water and wastewater sector is under a direct threat as part of a foreign government\u2019s multistage intrusion campaign, and individual criminal actors and groups threaten the security of our nation\u2019s water and wastewater systems\u2019 operations and data. Managing cybersecurity is a complex challenge that requires an interdisciplinary, risk-based approach, involving an organization\u2019s business leaders, as well as their technical and legal advisors.<br \/>\nA robust and tested cybersecurity program is critical to protect public health and safety, prevent service disruptions, and safeguard customer and employee personal and financial information. Inadequate cybersecurity measures\u00a0and flawed responses to cybersecurity incidents carry tremendous risk. In addition to serious threats to people, property, operations and data, cybersecurity incidents also can result in potential civil and regulatory liability, and reputational harm. Attacks will happen; do not be caught unprepared.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2021\/12\/cybersecurity-risk-responsibility-in-the-water-sector.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Judith H. Germano American Water Works Association (AWWA) R\u00e9sum\u00e9: Cybersecurity is a top priority for the water and wastewater sector. Entities, and the senior individuals who run them, must devote considerable attention and resources to cybersecurity preparedness and response, from both a technical and governance perspective. Cyber risk is the top threat facing business and critical infrastructure in the United States. Government intelligence confirms the water and wastewater sector is&hellip; <\/p>\n","protected":false},"author":3,"featured_media":17788,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20,112],"tags":[],"class_list":["post-17787","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao","category-download"],"views":552,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=17787"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17787\/revisions"}],"predecessor-version":[{"id":17789,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17787\/revisions\/17789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/17788"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=17787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=17787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=17787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}