Threat Intelligence, Critical Infrastructure Security
What security pros can learn from the bad information spread during this year’s election cycle

(Adobe Stock)
COMMENTARY: Cybersecurity leaders across all levels of government face new challenges as this year’s election approaches – hurdles that are substantially different than the ones they dealt with four years ago when the last presidential ballots were cast.Today, heightened domestic polarization has made physical threats to the safety of election officials and poll workers a greater concern. Fueling this polarization are foreign attempts to shape the public opinion of Americans, including perceptions about the fairness of the voting process and accuracy of election results. Even if officials run a secure election, they’ll still battle trust issues if there’s public perception that the voting process or election outcome is unfair.Implement cybersecurity measures that generate information organizations can use to refute MDM claims: Firewalls can capture all network traffic and generate activity logs that cannot be edited, offering solid evidence for addressing claims that an intrusion occurred and explaining why an attacker cannot evade detection by changing the contents of the log files. Use cybersecurity tools that integrate easily with the organization’s existing infrastructure: Implement a robust technology stack. Taking a platform approach to security can streamline daily operations, making it easier for leaders and their teams to manage and respond to threats. Look for products that offer automation, can easily integrate with existing technologies, and ingest multiple sources of threat intelligence. Focus on preventing non-recoverable errors: Security and IT teams have a lengthy list of daily responsibilities, often making it challenging to set priorities. In the case of elections, officials should focus on the greatest risks—in short, anything that directly impacts voter participation. This may mean assuring the availability and integrity of the voting rights database needed for local governments to create ballots tailored to the races happening in each precinct or ensuring that every polling station gets equipped to register walk-up voters. Of course, MDM represents just one of many cybersecurity risks that teams must work to manage. In the election process, it’s critical to secure everything from devices to databases, as MDM functions as just one of numerous digital threats. Activities that prevent citizens from voting are a concern: What if a ransomware attack locks the registration database in the months prior to election day? The inability to access it because the data has been encrypted could prevent local jurisdictions from pulling the data they need to create ballots for the registered voters in each precinct.These ongoing challenges underscore the importance of periodically reassessing security controls along with risk management policies and processes. Taking proactive measures now to enhance cybersecurity will go a long way in effectively protecting our organizations.Jim Richberg, head of cyber policy, global field chief information security officer, FortinetSC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds