Thought Leadership

Securing the Flow: Building Cyber Resilience into Water’s Digital Future

Securing the flow
Authored by Jacobs' SVP of Operational Technology Cybersecurity John Karabias and Director of Operational Technology Cybersecurity Ben Stirling

In Virginia, where the James and York rivers spill into the Chesapeake Bay, a water utility is delivering a transformative modernization project.

Since 1940, Hampton Roads Sanitation District (HRSD) has been cleaning up what gets flushed away and returning it safely to the environment. But that mandate is evolving.

Like every water utility, HRSD serves a growing population, with nearly two million people across 20 cities and counties relying on its network of pipes, pumps and water treatment facilities. In response, HRSD is providing smart solutions like water reuse and energy recovery, underpinned by increasingly sophisticated digital operating systems. The utility is also investing in a less visible but no less critical area: strengthening cybersecurity protections that keep its network secure.

The move wasn’t prompted by a data breach — rather it’s recognition that the digital infrastructure that improves resilience can also introduce vulnerabilities.

In the Caribbean Sea, the Puerto Rico Aqueduct and Sewer Authority (PRASA) is also moving to tighten its cyber defenses.

As the sole provider of potable water and wastewater services for nearly the entire population of the archipelago, and with more than 4,000 assets spread along its network, the utility is building a digital system that provides real-time view of the network’s status. This will give PRASA a clearer read on vulnerabilities and help the utility respond more quickly in the face of catastrophic events, including cyberattacks.

Most water utilities remain less prepared.

“There are more than 55,000 water and wastewater utilities in the U.S. Most are small, serving fewer than 100,000 people, and they do not plan for cyber risks. They lack the right architecture, monitoring or controls to properly defend against modern cyber threats.”

Roger Caslow

Chief Information Security Officer, HRSD

Why are water utilities becoming a focal point of concern?

Water utilities are targets for cyberattacks for two reasons: their systemic vulnerabilities and the potentially widespread impact of a successful breach on large sections of the population. There’s also a deeper, societal dimension at play — water is universal and essential. Every successful defense or proactive investment in cybersecurity reinforces a simple but powerful promise: that the operating systems delivering safe, reliable water will function, no matter the threat.

The risk is real. Water utilities face threats from hostile states and terrorist organizations to criminal gangs and disgruntled insiders. The motives vary. Some want financial gain while others use cyber techniques to destabilize and promote military, political or social causes.

For example, the widely reported Volt Typhoon incursion saw a hostile state-sponsored group attempt to access U.S. water infrastructure now to impact the population during a potential future military conflict. What unites these malicious actors is their focus on control systems, confidential information and the critical digital infrastructure central to utility operations.

“For water utilities, cyber incidents mean more than data breaches — it can directly impact services, public health and safety.”

Monica Jorge

Specialist in Security Systems Operations, Puerto Rico Aqueduct and Sewer Authority

Digital progress triggers a cyber reaction

These incursions are taking place as digital tools are reshaping operations, with Supervisory Control and Data Acquisition (SCADA) upgrades, remote flood monitoring and cloud-connected assets making water utilities more efficient. Cyber resilience must move in lockstep with these system upgrades.

Engineers wouldn’t design a treatment plant without redundancy or resilience, yet cybersecurity is often an afterthought for water utilities. Making systems secure by design requires a rethink, one where engineering phases and cybersecurity requirements advance together. The integration of engineering and cyber thinking is at the heart of how teams need to approach digital transformation across all utilities and critical infrastructure. 

“Cyber-informed engineering — designing or upgrading a facility with cyber risk in mind — is essential. Security measures need to be built into engineering processes rather than added as an afterthought.”

Roger Caslow

Chief Information Security Officer, HRSD

Building resilience from day one

In the same way that facility design needs to embed cyber requirements, resilience must be built into the fabric of digital water infrastructure — but technology alone does not deliver resilience. It’s achieved by integrating cybersecurity thinking into how systems are engineered, operated and governed, aligning human, physical and digital systems to anticipate risk and disruption.

Best practice in delivering resilience from design through delivery centers on a collaborative approach, such as Jacobs’ partnership with PA Consulting, that blends deep operational technology knowledge with advanced cybersecurity, digital strategy and innovation capabilities.

An embedded approach to cyber defense

Among the risks facing water utilities are operating systems that are connected without formal inventories or visibility, and legacy components operating without modern safeguards.

Jacobs’ assessment of 35+ utilities identified other fundamental gaps such as a lack of operational technology (OT) incident response and business continuity plans, which increases the risk of prolonged disruptions. The study also shows a lack of asset visibility as problematic, and without a full inventory, utilities can struggle to apply security controls, detect anomalies or manage patches effectively.

The assessment also found silos between IT and OT, with unclear responsibilities and governance hindering monitoring, response and risk management. Flat networks — where most systems are connected without internal separation — underused firewalls and absent intrusion detection systems further exacerbated the risk, exposing critical infrastructure to lateral movement by malicious actors. The study shows that for many utilities, a shift towards a strategic and proactive cybersecurity approach is overdue.

Bringing IT and OT teams together

Many operators don’t have a clear view of what’s running, what’s connected or what’s critical. If a risk isn’t visible, it remains abstract until a breach makes it real. The convergence of IT and OT presents a considerable opportunity for progress — helping utilities move from reactive defenses to integrated, operational resilience. Security should align with utility priorities: resilience, regulation and customer trust.

“Planning for cyber risk means knowing your assets, understanding your systems’ interdependencies and building strong cross-functional collaboration between operations.”

Monica Jorge

Specialist in Security Systems Operations, Puerto Rico Aqueduct and Sewer Authority

Planning for risk how we plan for water

When it comes to operational excellence, best practice involves preventative, proactive maintenance — planning and testing for failure and maintaining infrastructure with care. 

Water utility operators need to treat cybersecurity with the same discipline. It’s about identifying what matters most, isolating critical systems and building security measures into project delivery. The alignment between physical and digital resilience has become a defining feature of modern critical infrastructure planning — ensuring that reliability, safety and security evolve together.

The thinking behind the Consequence-driven, Cyber-informed Engineering (CCE) approach developed by Idaho National Labs flips the conventional cyber-resilience playbook. Instead of focusing on tools, it starts with priorities and asks: what can’t afford to fail?

The process unfolds in four phases. First, utilities identify the most critical operations that, if disrupted, would cause the most harm. Then in phase two, they map the digital and physical interdependence surrounding those assets. Phase three analyzes how a malicious actor could reach those targets, and what information they would need to succeed. Only in phase four do mitigations come in: not generic defenses, but targeted actions that disrupt the attacker’s most likely path. It’s a shift from broad-based defense to consequence-driven design.

“It’s a very strong methodology — what stands out is the focus on consequence and protecting the most critical functions.”

Monica Jorge

Specialist in Security Systems Operations, Puerto Rico Aqueduct and Sewer Authority

About the authors

John Karabias – Senior Vice President for Cybersecurity and OT at Jacobs

John Karabias

John has more than 20 years of experience in cybersecurity and digital consulting in national security and critical infrastructure protection.  Over his career, he has held operations management, sales and corporate strategy leadership roles at multiple Fortune 500 companies. In his current position, he leads a global workforce of industrial cybersecurity professionals that protect Operational Technology (OT) in markets such as water, transportation and advanced manufacturing.   

In addition to his role at Jacobs, John is an adjunct professor of Information Systems at Loyola University of Maryland and serves on several for-profit and non-profit boards where he is committed to causes such as technology incubation, sustainable economic development and K-12 education. 

Ben Stirling – Director of Cybersecurity & OT at Jacobs

Ben Stirling

Ben has more than 18 years’ experience spanning information technology, physics and cybersecurity analysis. Ben identifies security and operational risks and implement practical mitigations that strengthen resilience for clients. He leads and supports secure system and network operations, from architecture and hardening through incident readiness and OT integration for connected assets and industrial networks, while providing project management to deliver complex work safely and on schedule.

Ben advises organizations across banking, publishing, energy and healthcare, as well as a range of commercial clients, translating technical findings into clear actions that protect critical operations.

Use this form to contact our team
CAPTCHA
Please confirm you are human to help us keep spam submissions under control.

Future Foundations

Co-creating the world to come

Woman looks toward the future

From developing climate resilience and transitioning to a low-carbon future, to modernizing and transforming infrastructure, governments and businesses face critical challenges. How they respond will define our future.

As our clients navigate these challenges, we help them think differently – working together to pioneer tomorrow's infrastructure solutions and build the foundations for a prosperous, secure future.

Dive into Future Foundations