What
is an ISAC?
Information
Sharing and Analysis Centers (ISACs) are confidential venues
for sharing security vulnerabilities and solutions within an
industry. Presidential Decision Directive (PDD) 63 and Executive
Order (EO) 13231 designated the water sector (and other industry
sectors) as critical to the nation’s wellbeing and called
for the establishment of ISACs to promote the flow of security
information. Additionally, Homeland Security Presidential Directive
(HSPD-7) encouraged the creation of private sector information
sharing and analysis mechanisms, such as the WaterISAC, to
protect drinking water and wastewater infrastructure from attack.
What
does WaterISAC do?
The WaterISAC
is an Internet-based, rapid notification system and information
resource about threats to America’s drinking water and
wastewater systems. It is the only centralized, up-to-the-minute
resource of its kind serving the water sector. The WaterISAC
functions as a highly secure, subscription service that gathers
and quickly disseminates alerts, expert analysis and other
information specific to the water community.
What
are the key benefits of subscribing to WaterISAC?
- ENHANCED
SECURITY
The WaterISAC’s unique position as the central clearinghouse for threats
to the water sector provides utilities with unparalleled added security and
therefore serves as a key component of due diligence for any drinking or
wastewater system. It is the one common link in the flow of information about
water security to and from utilities and federal homeland, intelligence,
law enforcement, public health and environmental agencies.
- REDUCED
INSURANCE COSTS
Subscribing to the WaterISAC may reduce a utility's liability for damages
in the event of an attack and, at a minimum, provides excellent arguments
for controlling insurance costs.
- RAPID
ALERT NOTIFICATIONS – 24/7
All government alerts about potential or real threats to the nation’s
water sector are quickly disseminated to WaterISAC subscribers around the
clock. Utilities no longer have to worry about experiencing a threat or an
actual incident that could have been avoided by more immediate notification.
- EXPERT,
WATER SECTOR-SPECIFIC ANALYSIS
Above and beyond gathering and distributing secure, time-sensitive information,
WaterISAC also provides immediate expert analysis of threats to the nation’s
water systems and identifies trends. Raw information about security threats
distributed by law enforcement and government agencies often fail to provide
comprehensive detail about how a threat may impact a drinking water or wastewater
system. The WaterISAC's analysts are intelligence gathering experts. They
rapidly produce valuable assessments of how a threat may specifically impact
the water community, identify trends and suggest mitigating actions.
- UNRIVALED
INFORMATION & RESEARCH SOURCE
The WaterISAC library (with a robust search capability) offers subscribers
a superlative compilation of data about vulnerabilities, emergency response,
training opportunities, security solutions, research and government policy.
Subscribers can rapidly study chemicals and potential contaminants, review
past and current threat information, utilize vulnerability assessment tools
and explore security solutions.
Who
runs WaterISAC?
The WaterISAC
is governed by a Board of Managers comprised of water utility
leaders who are appointed by eight major U.S. drinking water
and wastewater organizations.
How
long has WaterISAC existed?
It went online
at www.watersc.org in December 2002.
How
is WaterISAC funded?
With Congressional
support, the U.S. Environmental Protection Agency (EPA) provides
the WaterISAC with an annual grant. This is augmented by subscription
fees paid by drinking water and wastewater systems.
Who
subscribes to WaterISAC?
More than
1,000 individuals, including CEO's and General Managers with
security-related job responsibilities, at hundreds of drinking
water and wastewater systems – large and small nationwide.
What
are the technical requirements for obtaining electronic access
to WaterISAC’s secure portal system?
- 133 MHz
or higher CPU
- Windows
2000 or Windows XP operating system
- Minimum
64 MB of RAM (128 MB of RAM preferred)
- Minimum
2 GB hard disk (4 GB preferred) with 650 MB of free space
- An available
USP or PCMCIA port
- Internet
Explorer 6.x or higher (preferred), or Netscape version 7.x
or higher
- Floppy disk
drive to load card reader drivers (for USB only)
- Adobe Acrobat
Reader 5 or higher
How
much does it cost to become a subscriber?
Service*
Population |
Annual
Fees for Primary User |
Annual
Additional Fees per User |
Over
100,000 |
$1,000 |
$500 |
50,000-100,000 |
$500 |
$250 |
Less
than 50,000 |
$200 |
$100 |
*Fees for
joint wastewater and drinking water utilities are based on
the greater of the two service populations. Utilities owning
multiple systems subscribe based on population served per state.
Why
is there any subscription fee at all for WaterISAC?
Although
WaterISAC is a nonprofit organization, subscription fees help
to offset costs not covered by funding provided by the EPA
grant. Those costs include: hosting the secure portal; employing
administrative staff and specialists; maintaining and constantly
enhancing a vast library of water-related information and disseminating
alerts.
How
does my utility become a subscriber?
All U.S. drinking
and wastewater systems may subscribe to the WaterISAC. Water system
managers and security officers can speak with a WaterISAC customer
service agent by calling (toll-free) 1-866-H2OISAC (1-866-426-4722)
or download an application online.
After
application, how long does it take for activation?
New users
are equipped and activated within 2-3 weeks after WaterISAC
receives their completed application.
How
will any data or incident reports submitted to the WaterISAC
by my utility be shared or used?
Information
submitted by a utility will not be shared with any other subscribers
or intelligence gathering agencies without prior permission.
How
secure is WaterISAC portal and facility?
The portal
is VERY secure from any unauthorized access. The online operation
is hosted in a government designated “top secret” security
clearance facility. Additionally, the system is protected through
state-of-the-art, cyber security techniques. That also includes
constant monitoring for unauthorized attempts to use or alter
the system.
|