Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical yet often overlooked aspects of election security in this 27-minute RSA Conference talk. Delve into the Center for Internet Security's recommendations for securing and verifying America's Internet-connected election technology. Learn about the most vulnerable components of election infrastructure and gain insights from a verification pilot project. Discover security best practices, risk-based approaches, and rapid testing methods for election officials. Understand the challenges posed by ransomware and rapid product changes in the election technology landscape. Examine the process of architecture reviews, security claims validation, and the importance of built-in incentives for secure systems. Gain valuable knowledge on how to protect the supporting election technology that plays a crucial role in maintaining the integrity of democratic processes.
Syllabus
Intro
What is supporting election technology
Security best practices
Election officials
Ransomware
Rapid Product Changes
RiskBased Approach
Process Assessment
Architecture Review
Security Claims Validation
Testing Rules Determination
Rapid Testing
Builtin Incentives
Valid Artifacts
Whats Next
Main Questions
Architecture Reviews
Questions
Taught by
RSA Conference