Главная
Study mode:
on
1
Intro
2
MASLOW'S HIERARCHY OF NEEDS
3
WHERE DOES VOTING FIT?
4
PHYSIOLOGICAL NEEDS
5
SELF- ACTUALIZATION
6
VOTER HIERARCHY OF NEEDS
7
LAYERS FOR ATTACKERS TO TARGET
8
INFORMATION PLANE
9
INFRASTRUCTURE PLANE
10
And lets not forget 2016, when San Francisco's transit system was infected
11
WHERE DOES THAT LEAVE US?
12
HOW WOULD YOU ATTACK?
13
WHAT CAN WE DO TO PROTECT DEMOCRACY?
14
DOWNLOAD THE ELECTION SECURITY WHITE PAPER
Description:
Explore the complex landscape of election security and cyber threats in this 40-minute conference talk from the Hack In The Box Security Conference. Delve into the various methods nation-state actors employ to disrupt elections beyond simply hacking voting machines. Examine Russia's influence on worldwide elections through cyberwarfare and the evolving countermeasures implemented since 2016. Gain insights into the asymmetry between Russian tactics and international responses. Engage in a thought-provoking exercise to identify potential election disruption strategies that countries may be unprepared for. Learn from security strategist Allie Mellen's decade of experience in engineering, development, and technical consulting as she guides you through the intricacies of maintaining democracy in the face of информационные контрмеры (information countermeasures).

Trust, but Verify - Maintaining Democracy In Spite of Information Countermeasures

Hack In The Box Security Conference
Add to list
0:00 / 0:00