Sponsor of the Day:
Jerkmate
https://www.cisecurity.org/insights/spotlight/election-security-spotlight---prep-for-election-disruptions
Election Security Spotlight — Prep for Election Disruptions
In this Election Security Spotlight, a discussion on how election officials can prepare for election disruptions.
election security spotlightprepdisruptions
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-adversary-in-the-middle-aitm-attack
Election Security Spotlight — Adversary in the Middle Attack
In this Election Security Spotlight, the EI-ISAC® discusses an Adversary in the Middle attack. Learn how to mitigate the risk of this type of attack.
election security spotlightmiddle attackadversary
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-multidimensional-threats
Election Security Spotlight — Multidimensional Threats
This Election Security Spotlight discusses how multidimensional threats are fundamentally changing the threat landscape. Read now.
election security spotlightmultidimensionalthreats
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-supply-chain-management
Election Security Spotlight – Supply Chain Management
In this Election Security Spotlight, a discussion on the importance of supply chain management. Here's how you can plan for Election Day.
election security spotlightsupply chain management
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-ddos-attacks
Election Security Spotlight — DDoS Attacks
In this Election Security Spotlight, the CIS discusses Distributed Denial of Service attacks, otherwise known as DDoS attacks.
election security spotlightddos attacks
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-the-evolution-of-phishing
Election Security Spotlight — The Evolution of Phishing
In this Election Security Spotlight,we discuss the evolution of phishing.
election security spotlightevolutionphishing
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-swatting-registries
Election Security Spotlight — Swatting Registries
To help combat swatting, some jurisdictions at the local level are implementing swatting registries. Also known as anti-swatting registries or swatting concern...
election security spotlightswattingregistries
https://www.cisecurity.org/insights/spotlight/election-security-spotlight-risk-management
Election Security Spotlight — Risk Management
In this Election Security Spotlight, a discussion on the importance of election offices implementing risk management policies and procedures.
election security spotlightrisk management