ON-DEMAND Webinar: Security of the Election: Defending our Democracy against well-resourced opponents


Election safety is a scorching subject, particularly with the final election arising within the U.S. November. Final week, two excellent specialists mentioned present threats to election safety, adversary motivations, current makes an attempt to affect election outcomes, and the way everybody – from voters to marketing campaign and election officers – may help shield our democracy.

Meet the presenters:

  • Matt Ashburn — Former CIA cybersecurity officer and the Nationwide Safety CISO on the White Home Right this moment, Matt serves because the Head of strategic initiatives at Authentic8.
  • Mick Baccio — Former Chief Data Safety Officer at Pete for America, and White Home Menace Intelligence Department Chief. At present a Safety Advisor at Splunk.

Who’re the adversaries and what’s all this about?

It’s no secret that well-resourced adversaries, resembling nation-states, have a continued curiosity in influencing the U.S. electoral course of. China, Russia, Iran, and lots of others, together with a number of smaller states, all have curiosity within the consequence of the U.S. elections. What occurs in America impacts the political and financial local weather around the globe.

The elections are the mechanism for the American individuals to train their democratic rights to pick out their new leaders. Naturally, international powers attempt to use this chance to sway the general public opinion in favor of a frontrunner whose proposed insurance policies assist advance their very own pursuits.

It’s essential to keep in mind that “election interference” is just not solely about hacking into voting machines or interfering with the calculation of the votes. The majority of election meddling happens by Social Media and different channels, geared toward swaying the general public opinion, growing discord and division amongst American individuals, interfering with election campaigns, and attempting to form the picture of political figures.

What can we do about it?

In hindsight, we discovered lots from the revelations that got here after the 2016 elections:

  • We’ve improved our instruments and processes
  • Election campaigns have adopted higher cybersecurity practices
  • The U.S. has established many robust partnerships between the private and non-private sectors

However there’s nonetheless lots that must be achieved to verify our electoral course of going ahead is as robust as doable.

As voters, we have to assume critically, particularly once we see one thing on social media be alert and conscious of propaganda and disinformation; and most significantly – exit and vote. And for cybersecurity professionals who need to study extra about election infrastructure safety and monitoring practices, there are lots of accessible assets and alternatives to take part in election safety discussions and coverage shaping.

Election safety assets

Watch Election Safety: Defending our Democracy in opposition to Nicely-Resourced Adversaries now. If you wish to proceed the dialog with our specialists,  contact Authentic8.

*** It is a Safety Bloggers Community syndicated weblog from Authentic8 Weblog authored by A8 Workforce. Learn the unique publish at: https://weblog.authentic8.com/election-security-defending-our-democracy-against-well-resourced-adversaries/

election line jobs,election lines,election news online,mitre atarc,atarc ai working group,atarc federal cloud infrastructure summit,atarc virtual pandemic response conference,homeland security issues 2019,homeland security warning 2019,homeland security blog,national security today,homeland security publications,homeland security today,homeland security articles,homeland security news

You May Also Like
Read More

Samsung’s Drugmaking Future Includes a $2 Billion ‘Super Plant’ Bigger Than the PM Modi address US India forum global investors pitches Aatmanirbhar bharat self Delhi Meerut RRTS corridor Duhai Depot contract Vijay Nirman company KEC This S Facebook Announces Vulnerability Reporting and Disclosure Policy

  Fb is giving third-party software builders three weeks to reply to vulnerability experiences and three months to…
Read More