Spotlights
Dive into cybersecurity topics for the election community
Filter by Topic
81 Results Found
1 - 10 of 81 results
Published on 06.20.2024
Election Security Spotlight — DDoS AttacksIn this Election Security Spotlight, the EI-ISAC discusses Distributed Denial of Service attacks, otherwise known as DDoS attacks.
Published on 05.07.2024
Election Security Spotlight — Risk ManagementIn this Election Security Spotlight, the EI-ISAC discusses the importance of election offices implementing risk management policies and procedure...
Published on 04.08.2024
Election Security Spotlight – Supply Chain ManagementIn this Election Security Spotlight, the EI-ISAC discusses the importance of supply chain management. Here's how you can plan for Election Day.
Published on 03.12.2024
Election Security Spotlight – Multi-Factor AuthenticationIn this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) discusses multi-factor authen...
Published on 02.16.2024
Election Security Spotlight - EI-ISAC: Who We Are, What We DoThe EI-ISAC is dedicated to improving the cybersecurity posture of election offices among U.S. SLTTs. Here's how it can help your U.S. SLTT elect...
Published on 01.09.2024
Election Security Spotlight – Dangers of QR CodesIn this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) discusses the dangers of QR c...
Published on 12.12.2023
Election Security Spotlight – Election Technology Procurement GuideIn this Election Security Spotlight, the EI-ISAC discusses a new resource for navigating the election technology procurement process.
Published on 10.13.2023
Election Security Spotlight – SwattingIn this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) provides an overview of swatt...
Published on 09.25.2023
Election Security Spotlight – Social Media SecurityIn this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) discusses social media securit...
Published on 09.25.2023
Election Security Spotlight – What Is Email Security?In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) provides an overview of email ...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More