Filters

Filter By56 Results FoundClear Filters
Type

Topic

Showing results 1 - 20 of 56 for "elections, threats"

Election Security Spotlight – Worldwide Threat Assessment
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-worldwide-threat-asse...

Election Security Spotlight – Worldwide Threat Assessment

What it is The “Worldwide Threat Assessment” is released annually by the Office of the Director of National Intelligence (ODNI) and provides an overvi...

Overview of the Impact of Generative AI on Elections article
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-generative-ai-and...

Election Security Spotlight – Generative AI and Elections

In this Election Security Spotlight, the EI-ISAC explains the impact of generative AI on elections and why it matters....

election security spotlight ei-isac who we are what we do
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-ei-isac-who-we-ar...

Election Security Spotlight - EI-ISAC: Who We Are, What We Do

The EI-ISAC is dedicated to improving the cybersecurity posture of election offices among U.S. SLTTs. Here's how it can help your U.S. SLTT election o...

Election Security Spotlight – EDR Spotlight Module thumbnail
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/edr-spotlight-module

EDR Spotlight Module

EDR is a no-cost, next-generation antivirus solution for election computers. CIS has introduced a new module to EDR called "Spotlight."...

What are Insider Threats? Spotlight graphic
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-what-are-insider-...

Election Security Spotlight - What are Insider Threats?

The term “insider threats” describes individuals who are a part of an organization and use their access to steal information or otherwise cause damage...

Election Security Spotlight – Cyber Threat Actors
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-cyber-threat-actors

Election Security Spotlight – Cyber Threat Actors

What it is: A Cyber Threat Actor (CTA) is a participant (person or group) in an action or process that is characterized by malice or hostile action (i...

Election Security Spotlight  Swatting article
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-swatting

Election Security Spotlight – Swatting

In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) provides an overview of swatting....

An Overview of Email Security article
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-what-is-email-sec...

Election Security Spotlight – What Is Email Security?

In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) provides an overview of email secur...

Election Security Spotlight – Verizon Data Breach Report 2019
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-verizon-data-breach-r...

Election Security Spotlight – Verizon Data Breach Report 2019

What it is The Verizon Data Breach Investigations Report (DBIR) is an annual report produced by the Verizon Threat Research Advisory Center (VTRAC). T...

Election Security Spotlight – Defense in Depth (DiD)
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-defense-in-depth-did

Election Security Spotlight – Defense in Depth (DiD)

What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfully l...

Election Security Spotlight – Election Technology Procurement Guide
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-election-technolo...

Election Security Spotlight – Election Technology Procurement Guide

In this Election Security Spotlight, the EI-ISAC discusses a new resource for navigating the election technology procurement process....

eiisac-owner
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-spoofing

Election Security Spotlight – Spoofing

What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick the...

eiisac-owner
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-social-engineering

Election Security Spotlight – Social Engineering

What is it Social engineering is the use of deception to manipulate individuals into providing a particular response, generally for a fraudulent or ma...

Election Security Spotlight What is MDBR
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight--what-is-maliciou...

Election Security Spotlight - What is Malicious Domain Blocking and Reporting

MDBR is an essential security tool for preventing cyber attacks, provided to EI-ISAC members and U.S. State, Local, Tribal, and Territorial Government...

eiisac-owner
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-cia-triad

Election Security Spotlight – CIA Triad

What it is The CIA Triad is a benchmark model in information security designed to govern and evaluate how an organization handles data when it is stor...

Election Security Spotlight – Patching
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-patching

Election Security Spotlight – Patching

What it is Patching is the process of applying available updates to an operating system, website, software, hardware, or plugin. In information securi...

Overview of Enhancing Physical Security at Election Offices article
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/election-security-spotlight-physical-security...

Election Security Spotlight – Physical Security Tips

In this Election Security Spotlight, the EI-ISAC provides some physical security tips for protecting the staff and equipment at your election office....

Election Security Spotlight – Disaster Recovery Plan (DRP)
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-disaster-recovery-pla...

Election Security Spotlight – Disaster Recovery Plan (DRP)

What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a disaster...

eiisac-owner
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-ransomware

Election Security Spotlight – Ransomware

What it is Ransomware is a type of malware (malicious software) that blocks access to a, system, device, or file until a ransom is paid. Malicious act...

Election Security Spotlight – Multi-Factor Authentication
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-multi-factor-...

Election Security Spotlight – Multi-Factor Authentication

In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) discusses multi-factor authenticat...