SBN

Midterm Elections, Hacking and Information Warfare — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, John Dickson, Principal at Denim Group and a security professional with nearly 20 years experience, talks about cybersecurity issues and information warfare related to the upcoming midterm elections.

In the podcast, Dickson and host Chris Sienko discuss:

  • When and where did electronic voting issues start appearing in the voting process? (1:15)
  • What are the practical security issues with this midterm election? (3:20)
  • What tactics should citizens and polling places use to combat these issues? (10:45)
  • How should people keep themselves protected from social engineering during the election season? (12:40)
  • What are the dangers around an all-electronic voting process? (15:40)
  • Will we ever get to a point where polling places become a thing of the past? (19:25)
  • Are there any safeguards in place that will be able to detect if tampering has taken place? (21:00)
  • Why was a teenager recently able to “easily” hack into a political party’s website? (22:40)
  • What types of education could be undertaken to bring voters up to speed? (25:15)
  • Where’s the balance between social engineering and direct fraud going forward? (27:00)
  • Should modifications be put in place to help discover and report cybercrime? (29:05)
  • If you could make a law to make voting safer from cyber-attacks what would that be? (31:15)

Learn more about security awareness: https://www2.infosecinstitute.com/security-awareness

See special offers for CyberSpeak with InfoSec Institute listeners: https://www.infosecinstitute.com/podcast

You can watch a video version of the discussion below:

About CyberSpeak with InfoSec Institute

Get security awareness and IT training insight direct from the trenches in this weekly podcast hosted by InfoSec Institute’s Chris Sienko. Each week on CyberSpeak with InfoSec Institute, IT and security practitioners share their (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Jeff Peters. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/U5zuR9gLhS4/