Spotlights
Dive into cybersecurity topics for the election community
Filter by Topic
81 Results Found
11 - 20 of 81 results
Published on 09.25.2023
Election Security Spotlight – Physical Security TipsIn this Election Security Spotlight, the EI-ISAC provides some physical security tips for protecting the staff and equipment at your election off...
Published on 09.25.2023
Election Security Spotlight – Generative AI and ElectionsIn this Election Security Spotlight, the EI-ISAC explains the impact of generative AI on elections and why it matters.
Published on 06.16.2023
Election Security Spotlight – Why Use .gov with Your Website?In this Election Security Spotlight, the EI-ISAC explains the value of an election office using the .gov domain for its website.
Published on 03.17.2023
Election Security Spotlight – What is MDBR+?In this Election Security Spotlight, we provide an overview of the Malicious Domain Blocking and Reporting Plus (MDBR+) service.
Published on 02.17.2023
Election Security Spotlight – What Is Smishing?In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) answers the question: "What is...
Published on 02.17.2023
Election Security Spotlight – How Does EI-ISAC Help Members?In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) explains how it helps members.
Published on 02.17.2023
Election Security Spotlight – What Is Misinformation?In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center answers the question: "What is misinform...
Published on 02.17.2023
Election Security Spotlight – How Is Election Security Done?In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center discusses the Essential Guide to Electio...
Published on 02.17.2023
Election Security Spotlight – What Is Doxing?In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) answers the question: "What is...
Published on 02.15.2023
EDR Spotlight ModuleEDR is a no-cost, next-generation antivirus solution for election computers. CIS has introduced a new module to EDR called "Spotlight."
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More