News Feature | March 6, 2026

EPA Threat Briefing Highlights Expanding Cyber, Physical, And AI Risks For Water Utilities

cyber attack, malware, ransomware, data breach, system hacking, virus, spyware-GettyImages-1499410369

The U.S. Environmental Protection Agency (EPA) convened water-sector leaders on February 26, 2026, for a two‑hour Threat Briefing that underscored what many utilities already feel on the ground: cyber, physical, and operational risks are expanding, and attackers are becoming more opportunistic. Speakers from EPA, CISA, the FBI, NIST, AWWA, and WaterISAC offered a clear takeaway — utilities need to strengthen readiness now, not later.

Cyber Threats: More Attacks, Faster Response Needed

EPA’s Cole Dutton (Office of Water Emergency Response and Cybersecurity, OWERC) opened with the latest cyber threat activity, noting a continued increase in targeting of small and medium utilities. He urged systems to report anomalies quickly:

  • CISA 24/7 Operations Center: Report@cisa.gov
  • Local FBI field office
  • EPA Water Cyber Hotline: watercyberta@epa.gov

EPA’s Water Sector Cybersecurity portal provides ongoing alerts and tools:
https://www.epa.gov/cyberwater

Physical Threat Landscape: Utilities Still Face On‑Site Risks

Alec Davison of WaterISAC highlighted physical threat patterns and encouraged utilities to leverage WaterISAC’s resource center and reporting channels.
https://www.waterisac.org/resources

When An Intrusion Occurs, Speed Matters

Brian Kaiser (FBI) discussed immediate post‑incident steps, emphasizing staff safety, evidence preservation, and early notification to federal partners.

AI Risk Emerges As A New Operational Concern

NIST’s Martin Stanley warned that AI introduces its own vulnerabilities — including manipulated inputs and operational decision risks — and directed attendees to the following tools:

EPA And CISA Roll Out Expanded Support

EPA cybersecurity specialist Brandon Carter highlighted several free EPA programs:

EPA Case Studies:

Cybersecurity Exercises And Training:
https://www.epa.gov/waterresilience/cybersecurity-exercises-and-technical-assistance-courses

CISA’s Lauren Wisniewski highlighted additional support:

Industry Partners Offer Additional Tools

AWWA’s Kevin Morley shared resources including:

WaterISAC’s Chase Snow promoted several practical security tools:

What Utilities Should Do Now

Across agencies, the message was uniform: utilities have actionable steps they can take today:

  1. Report suspicious cyber or physical activity immediately.
  2. Adopt core cyber hygiene, including MFA, segmentation, and asset inventories.
  3. Use EPA and CISA no-cost assessments and training.
  4. Apply AI risk-management practices when integrating automation.
  5. Engage with WaterISAC and AWWA for best practices, intel, and training.

EPA emphasized that utilities — regardless of size — can dramatically improve resilience by tapping into the free resources already available to the sector.