CIS Logo
tagline: Confidence in the Connected World

The EI-ISAC consists of all 50 states and thousands of local election offices as members, allowing election officials to stay connected and manage risks.

Since the service went live in early August, 346 MS-ISAC and EI-ISAC members have blocked more than 10 million requests from malicious entities.

A new partnership has helped launch a malicious domain security service that is available to certain state, local and territorial governments.

The platform allows researchers to analyze cyber-attacks without sensitive information being released.

The election risk profile tool is designed only to review the components of election administration that are within officials’ control.

The Malicious Domain Blocking and Reporting service will be available at no cost to SLTT members of the CIS MS-ISAC and EI-ISAC.

DHS teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.

Increasing numbers of polling places use electronic devices to check in voters and verify eligibility, introducing new election security vulnerabilities.

As an election community, we are practiced and prepared to take these challenges head on and ensure American voters decide American elections.

Four states and a county government are taking part in an effort to deploy security orchestration, automation and response tools.

Ongoing revisions help organizations map the Controls in meaningful ways, pointing to the recent changes made to map the Sub-Controls to MITRE ATT&CK.

The community defense model highlights the safeguards that show up on any to-do list for cybersecurity and should be implemented by most organizations.

Almost all successful attacks take advantage of conditions that could reasonably be described by most as poor cyber hygiene.

With November right around the corner, state and local governments need to ensure the resilience and security of their election infrastructure.

Cybersecurity risk management depends upon a risk analysis that calculates cybersecurity risks as the consequence of attack times the likelihood of attack.

1 2 3 22