Posted on
in Presentations
How are we securing the election systems no one is talking about, yet are the most at risk components of our election infrastructure? Come hear from the Center for Internet Security on how their recommendations are being used to secure and verify America’s Internet-connected election technology. Results from their verification pilot project will be shared and discussed.
Pre-Requisites: General awareness of the security risks to democratic elections from nation state and other actors. General understanding of web application architecture concepts and the threats posed to various parts of the technology stack. General understanding of how system verification processes are typically structured and executed.
Pre-Requisites: General awareness of the security risks to democratic elections from nation state and other actors. General understanding of web application architecture concepts and the threats posed to various parts of the technology stack. General understanding of how system verification processes are typically structured and executed.
Share With Your Community