Election Cybersecurity Progress Report

Video thumbnail (Frame 0) Video thumbnail (Frame 1415) Video thumbnail (Frame 2610) Video thumbnail (Frame 4725) Video thumbnail (Frame 6037) Video thumbnail (Frame 7308) Video thumbnail (Frame 10393) Video thumbnail (Frame 12431) Video thumbnail (Frame 14192) Video thumbnail (Frame 16412) Video thumbnail (Frame 17853) Video thumbnail (Frame 19205) Video thumbnail (Frame 20911) Video thumbnail (Frame 22258) Video thumbnail (Frame 24622) Video thumbnail (Frame 26048) Video thumbnail (Frame 27281) Video thumbnail (Frame 28462) Video thumbnail (Frame 29600) Video thumbnail (Frame 31571) Video thumbnail (Frame 32846) Video thumbnail (Frame 34154) Video thumbnail (Frame 35616) Video thumbnail (Frame 37029) Video thumbnail (Frame 38193) Video thumbnail (Frame 39649) Video thumbnail (Frame 41302) Video thumbnail (Frame 42454) Video thumbnail (Frame 43761) Video thumbnail (Frame 44981) Video thumbnail (Frame 46634) Video thumbnail (Frame 47791) Video thumbnail (Frame 48987) Video thumbnail (Frame 50291) Video thumbnail (Frame 52172) Video thumbnail (Frame 53441) Video thumbnail (Frame 55819) Video thumbnail (Frame 57066) Video thumbnail (Frame 58536) Video thumbnail (Frame 59771) Video thumbnail (Frame 62121) Video thumbnail (Frame 63362) Video thumbnail (Frame 64794) Video thumbnail (Frame 66832) Video thumbnail (Frame 68627) Video thumbnail (Frame 70148) Video thumbnail (Frame 72938) Video thumbnail (Frame 74676) Video thumbnail (Frame 76937) Video thumbnail (Frame 78083) Video thumbnail (Frame 79447) Video thumbnail (Frame 81096) Video thumbnail (Frame 83421) Video thumbnail (Frame 86034) Video thumbnail (Frame 88195)
Video in TIB AV-Portal: Election Cybersecurity Progress Report

Formal Metadata

Election Cybersecurity Progress Report
Will the U.S. be ready for 2020?
Title of Series
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
Recent attacks against elections in the U.S. and Europe demonstrate that nation-state attackers are becoming more aggressive, even as campaigning and voting are becoming increasingly reliant on computers. How much has changed since 2016, when the U.S. experienced unprecedented attacks on its election infrastructure? What has to happen to ensure that the 2020 presidential election is secure? In this talk, I'll give a progress report on election security in the U.S. and around the world, informed by results from my own research and my work with legislators and election officials over the past two years. I'll also hold a mock election with a current U.S. voting machine to demonstrate how cyberattacks on election infrastructure could potentially change the results of national elections. Finally, I'll explain what everyone can do to get involved and help safeguard the foundations of democracy.
Keywords Ethics, Society, Politics

Related Material

The following resource is accompanying material for the video
Video is cited by the following resource
Beer stein
Operations research Non-standard analysis Process (computing)
Voting Server (computing) Denial-of-service attack Hacker (term) Leak
Email System programming Image registration Message passing Leak
Mathematics Link (knot theory) Googol Authentication Programmable read-only memory System programming Password Image registration Information security Message passing Leak
System programming Image registration Addressing mode Website Message passing Leak
Injektivität State of matter System programming Image registration Message passing Leak
Email Operations research Service (economics) Cybersex Non-standard analysis Image registration Instance (computer science) Power (physics) Product (business) Word Voting Phishing Military operation Computer hardware Software VisualBASIC Script Information Gastropod shell
Email Execution unit Building Image registration Computer Voting Tablet computer Whiteboard Object (grammar) Tower Software Hacker (term) Local ring Physical system
Operations research Voting Intel Explosion Hypermedia Inflection point
Sign (mathematics) Operations research Intel Voting Social software Estimation Port scanner Virtual machine
Operations research Intel Voting Social software Usability Mass Bit rate Capability Maturity Model Virtual machine
Operations research Intel Voting Number Social software Twin prime Whiteboard Usability Numbering scheme Virtual machine
Voting State of matter Maxima and minima Image registration
Voting Hacker (term)
Read-only memory Computer file Plastikkarte
Multiplication sign Tape drive Plastikkarte Computer programming Machine code Formal language Virtual machine Mechanism design Number Voting Malware Telecommunication Software Buffer overflow Data buffer
Memory card Computer-generated imagery Authentication Password Exploit (computer security) Database Plastikkarte Content (media) Machine code Voting Read-only memory Blog Interpreter (computing) Logic Smart card Reflektor <Informatik> Communications protocol Local ring Operations research Source code Vulnerability (computing) Public key certificate Computer file System administrator State of matter Menu (computing) Mereology Virtual machine Error message Malware Function (mathematics) Ubiquitous computing Key (cryptography) Information security Physical system Booting Address space Data buffer
Scale (map) Kolmogorov complexity State of matter Principle of locality
Touchscreen Maxima and minima Computer Smith chart Duality (mathematics) Voting Sample (statistics) Read-only memory Optics Telecommunication Endliche Modelltheorie Directed set Drum memory
Voting Purchasing Malware Plastikkarte Information security Virtual machine Independence (probability theory) Mach's principle
Voting Internetworking Hacker (term)
Mathematics Voting Internetworking State of matter Hacker (term)
Data management Service (economics) Read-only memory System programming Computer Plastikkarte Computer programming Staff (military)
Data management Email Computer Computer programming
Mathematics Data management Voting Malware State of matter Hacker (term) Computer
Voting Memory card
Constraint (mathematics) Statistics
Mathematics Data management Email Computer icon Voting Malware Read-only memory State of matter Hacker (term) Plastikkarte Computer
Voting Information security
Voting Cybersex State of matter System programming Implementation Physical system Address space
Malware Gradient Computer-generated imagery Papierloses Büro Digital signal Information security
Gradient Papierloses Büro
Voting Gradient Papierloses Büro Image registration
Reading (process) Uniform resource locator Voting Sample (statistics) Whiteboard Server (computing) Web page State of matter Office suite Image registration Entire function Physical system
Reading (process) Uniform resource locator Voting Server (computing) Web page State of matter Office suite Image registration Binary file Hacker (term) Entire function Physical system
Rounding Information Information security
Voting Trail Data recovery State of matter Software testing Row (database) Information security Proof theory
Sign (mathematics) Voting Building Digital signal Group action Hacker (term) Local ring Data integrity Similarity (geometry)
Execution unit Explosion
Explosion Computer cluster Cartesian closed category Computer worm Semiconductor memory