Listen

Description

Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed. These vulnerabilities, for the most part, are not ones that could be easily exploited by someone who walks in off the street, but they are things that we should worry could be exploited by sophisticated attackers, such as hostile nation states, or by election insiders, and they would carry very serious consequences. This interview session will align how the vulnerabilities exist and what security controls are required to remediate issues outlined by the U.S. Cybersecurity and Infrastructure Agency, or CISA