Advanced Masterclass in Cyber Electoral Security

Course Overview

This training course includes analysis of the strategies that can be employed to build secure & fair elections. By examining best practice case studies, participants will leave equipped to develop action plans that identify measures to address challenges of Election Security, including effective utilization of cyber technologies & frameworks, supported by interagency collaboration & stakeholder engagement.

  • C-level Geo-political Cyber View
  • Cyber Superpowers - World Balance
  • Role of Nation State Actors - Threats to Elections
  • Understanding the Cyber Hacker`s Mindset
  • Implementing Technology & Frameworks as measures to Secure Elections
  • Inter-Agency Co-ordination & Intelligence Sharing
  • Types Of Challenges & Threats Influencing Elections (Pre & During-Elections):
    1. Voter Data Manipulation: Access and change voter registration databases in advance.
    2. Misleading Voting Info: Spoofed web domains to distribute incorrect voting information.
    3. Voter Targeted Disinformation: Shape public discourse on topics using Deepfakes & social engineering.
    4. Messing with Reporting: Hijacking news websites or social media accounts & reporting false results.
    5. Ransomware: Attack that freezes up local voter databases.
    6. Day-of-Vote Interruption: problems with the devices` connectivity, underlying voter data & check-in challenges slowing vote count.
    7. Actual Vote Manipulation: Changing final digital vote counts.
    8. Social Media Threats: Creating paranoia and anarchy through false threats.
    9. Hack and Dump: Hack and weaponize information during elections.
    10. Infrastructure Attacks: Attacks on power grid, water, and prevent people from getting to the polls.
    11. Distributed Denial of Service Attacks: DDoS attacks on election infra.

Our Approach

The training includes practical experience of implementing strategies:

  1. Building a secured Election Infrastructure - Approach/Methodology & Best Practices.
  2. Technologies & Cyber Services for securing the National Infrastructure from adversaries (NIST Standards).
  3. Digital Forensics Investigation Capability.
  4. Cyber Training of National SOC Responders.
  5. Defend against Foreign Intervention:
    1. Social Media Monitoring & Sentiment Analysis
    2. Telecom Communication Protection
    3. Critical Infrastructure Security Monitoring
    4. Counter Social Media Communication Strategy

Agenda

Day 1

Day 2

Day 3