What The States Are Doing on Election Security

Slides:



Advertisements
Similar presentations
DC Responses Received WA OR ID MT WY CA NV UT CO AZ NM AK HI TX ND SD NE KS OK MN IA MO AR LA WI IL MI IN OH KY TN MS AL GA FL SC NC VA WV PA NY VT NH.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Made Possible by the Broadband Technology Opportunities Program Funded by the American Recovery and Reinvestment Act of 2009 Made Possible by the Broadband.
EDUCATION SERVICE UPDATE
AASHTOWare Program Benefits Standing Committee on Highways October 18, 2013 Tom Cole, Idaho DOT AASHTO Special Committee on Joint Development.
Primary elections. Basics What is a primary? When did states start adopting primaries? Do all states use them today? What are some variations in primary.
1 State/EPA Environmental Information Exchange Network December 2004 Molly O’Neill State Director, Network Steering Board Environmental Council of the.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
National Incident Management System. Homeland Security Presidential Directive – 5 Directed the development of the National Incident Management System.
The Pew-MacArthur Results First Initiative: INVESTING IN PROGRAMS THAT WORK May 15, 2014 Sara Dube, Manager Ashleigh Holand, Manager-State Policy.
Pennsylvania Libraries. Introduction Many people, offices and governing bodies are involved in creating, maintaining and improving library service in.
National TIM Responder Training Program Implementation Progress - As of November 2, 2015 Train-the-Trainer Sessions 193 sessions with 7,115 participants.
1 The National Environmental Information Exchange Network History and Overview Office of Water National STORET/WQX User Meeting November 27, 2007.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
National TIM Responder Training Program Implementation Progress - As of February 8, 2016 Train-the-Trainer Sessions 203 sessions with 7,306 participants.
Agencies’ Participation in PBMS January 20, 2015 PA IL TX AZ CA Trained, Partial Data Entry (17) Required Characteristics & 75% of Key Indicators (8) OH.
Program Evaluation Key Informant Interview Themes Jack Thompson, Director Northwest Center for Public Health Practice University of Washington School of.
National Journal Presentation Credits Producers: Katharine Conlon Director: Afzal Bari House Committee Maps Updated: March 19, 2015.
State of the Ecosystem: Where We Are and Where We’re Going Gregory B. White, Ph.D. 1 September
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Annual Meeting Golf for Everyone
WHEN: March 5, 2016 from 9am until 1PM
Update on Mission: Lifeline Boston University Medical Center
Medicaid Eligibility for Working Parents by Income, January 2013
Ebola Virus Table Top Exercise
Kathleen Amos, MLIS & C. William Keck, MD, MPH
Train-the-Trainer Sessions 240 sessions with 8,187 participants
Joe, Larry, Josh, Susan, Mary, & Ken
Cybersecurity Education and Workforce Development Resources
Know Your Revised Alternate Security Program (ASP) Jen Wilk
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Build Your Cybersecurity Team:
Bipartisan Election Advisory Commission April 6, 2018
/ March 2015 Net Metering Note: Net Metering rules are being actively discussed in over a dozen state public service & utility commissions.
I have many checklists: how do I get started with cyber security?
Train-the-Trainer Sessions 384 sessions with 11,279 participants
Election Security Best Practices
Train-the-Trainer Sessions 379 sessions with 11,183 participants
Net Metering Note: Net Metering rules are being actively discussed in over a dozen state public service & utility commissions across the country.
Comprehensive Medicaid Managed Care Models in the States, 2014
Train-the-Trainer Sessions 386 sessions with 11,336 participants
By: Jihad and Qyashiny Chapter 14.
Coverage of Low-Income Adults by Scope of Coverage, January 2013
School Safety Resources
WY WI WV WA VA VT UT TX TN1 SD SC RI PA1 OR OK OH ND NC NY NM NJ NH2
WY WI WV WA VA VT UT TX TN1 SD SC RI PA OR OK OH1 ND NC NY NM NJ NH NV
Current Status of the Medicaid Expansion Decision, as of May 30, 2013
Connecting and Collaborating to Engage the Family Voice
WAHBE Brokers / QHPs across the country as of
Train-the-Trainer Sessions 362 sessions with 10,873 participants
Train-the-Trainer Sessions 386 sessions with 11,336 participants
Train-the-Trainer Sessions 394 sessions with 11,460 participants
Train-the-Trainer Sessions 392 sessions with 11,432 participants
Election Security Best Practices
(map is coded by CAE-CD region)
Train-the-Trainer Sessions 396 sessions with 11,504 participants
Train-the-Trainer Sessions 250 sessions with 8,352 participants
Train-the-Trainer Sessions 402 sessions with 11,649 participants
Train-the-Trainer Sessions 402 sessions with 11,649 participants
Government it and the new congress
Elections Systems: Designated Critical Infrastructure
Train-the-Trainer Sessions 401 sessions with 11,639 participants
Ashleigh Holand, Manager-State Policy
Train-the-Trainer Sessions 416 sessions with 11,878 participants
WY WI WV WA VA VT UT TX TN SD SC RI PA OR OK OH ND NC NY NM NJ NH NV
Train-the-Trainer Sessions 429 sessions with 12,141 participants
Train-the-Trainer Sessions 436 sessions with 12,254 participants
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Train-the-Trainer Sessions 386 sessions with 11,336 participants
Presentation transcript:

What The States Are Doing on Election Security Amy Cohen, Executive Director

What is NASED? NASED is the only professional organization for state election directors Members are from all 50 states, DC, and the territories

EI-ISAC Washington is among the top three states for local-level ISAC participation ISAC participation doesn’t just benefit you – you’re helping your colleagues at the state and local level across the country States are working with the ISAC to install ALBERT monitors as the state and local levels Mention suspicious email service Some states are doing top 5 counties, NJ and FL doing all counties

Working with the National Guard National Guard offers cybersecurity professionals trained by the National Guard States are taking advantage of the National Guard’s cybersecurity expertise in varying ways Analysis Running trainings Conducting assessments

In-State Resources Departments of technology/CIOs offer many services comparable to DHS services Working with universities to take advantage of expertise

Working Groups and Trainings County and state election officials and IT staff working together to develop guidelines and best practices for their colleagues Restricting access to necessary systems until users have taken cybersecurity trainings Table Top Exercises and statewide training opportunities Working groups - CT, IA, RI, AK, PA, KY Restricting access – UT

Two-Factor Authentication Something you know plus something you have

Phishing Exercises

Free Resources Athenian Project by Cloudflare Project Shield from Google Election Cyber Incident Communications Plan Template from the Belfer Center Elections Infrastructure Security Handbook from the Center for Internet Security

Questions? Amy Cohen | acohen@nased.org | @NASEDOrg | www.nased.org