How are we securing the election systems no one is talking about, yet are the most at risk components of our election infrastructure? Come hear from the Center for Internet Security on how their recommendations are being used to secure and verify America’s Internet-connected election technology. Results from their verification pilot project will be shared and discussed.
Pre-Requisites: General awareness of the security risks to democratic elections from nation state and other actors. General understanding of web application architecture concepts and the threats posed to various parts of the technology stack. General understanding of how system verification processes are typically structured and executed.
Technology Infrastructure & Operations Product Security
standards governance risk & compliance critical infrastructure audit
Share With Your Community