Showing results 1 - 20 of 59 for "elections, threats"
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-worldwide-threat-asse...
Election Security Spotlight – Worldwide Threat Assessment
What it is The “Worldwide Threat Assessment” is released annually by the Office of the Director of National Intelligence (ODNI) and provides an overvi...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-what-are-insider-...
Election Security Spotlight - What are Insider Threats?
The term “insider threats” describes individuals who are a part of an organization and use their access to steal information or otherwise cause damage...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-generative-ai-and...
Election Security Spotlight – Generative AI and Elections
In this Election Security Spotlight, the EI-ISAC explains the impact of generative AI on elections and why it matters....
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-the-evolution-of-...
Election Security Spotlight — The Evolution of Phishing
In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®) discusses the evolution of phish...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/edr-spotlight-module
EDR Spotlight Module
EDR is a no-cost, next-generation antivirus solution for election computers. CIS has introduced a new module to EDR called "Spotlight."...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-ei-isac-who-we-ar...
Election Security Spotlight - EI-ISAC: Who We Are, What We Do
The EI-ISAC is dedicated to improving the cybersecurity posture of election offices among U.S. SLTTs. Here's how it can help your U.S. SLTT election o...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-risk-management
Election Security Spotlight — Risk Management
In this Election Security Spotlight, the EI-ISAC discusses the importance of election offices implementing risk management policies and procedures....
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-cyber-threat-actors
Election Security Spotlight – Cyber Threat Actors
What it is: A Cyber Threat Actor (CTA) is a participant (person or group) in an action or process that is characterized by malice or hostile action (i...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-what-is-email-sec...
Election Security Spotlight – What Is Email Security?
In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) provides an overview of email secur...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-swatting
Election Security Spotlight – Swatting
In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) provides an overview of swatting....
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-verizon-data-breach-r...
Election Security Spotlight – Verizon Data Breach Report 2019
What it is The Verizon Data Breach Investigations Report (DBIR) is an annual report produced by the Verizon Threat Research Advisory Center (VTRAC). T...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-defense-in-depth-did
Election Security Spotlight – Defense in Depth (DiD)
What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfully l...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-election-technolo...
Election Security Spotlight – Election Technology Procurement Guide
In this Election Security Spotlight, the EI-ISAC discusses a new resource for navigating the election technology procurement process....
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-spoofing
Election Security Spotlight – Spoofing
What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick the...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-physical-security...
Election Security Spotlight – Physical Security Tips
In this Election Security Spotlight, the EI-ISAC provides some physical security tips for protecting the staff and equipment at your election office....
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-social-engineering
Election Security Spotlight – Social Engineering
What is it Social engineering is the use of deception to manipulate individuals into providing a particular response, generally for a fraudulent or ma...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight--what-is-maliciou...
Election Security Spotlight - What is Malicious Domain Blocking and Reporting
MDBR is an essential security tool for preventing cyber attacks, provided to EI-ISAC members and U.S. State, Local, Tribal, and Territorial Government...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-patching
Election Security Spotlight – Patching
What it is Patching is the process of applying available updates to an operating system, website, software, hardware, or plugin. In information securi...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-cia-triad
Election Security Spotlight – CIA Triad
What it is The CIA Triad is a benchmark model in information security designed to govern and evaluate how an organization handles data when it is stor...
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-multi-factor-...
Election Security Spotlight – Multi-Factor Authentication
In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) discusses multi-factor authenticat...