There are many excellent groups interested in and working on the cybersecurity of our elections. Below you will find organizations and links for your convenience. We encourage you to check out the following:
Belfer Center: Defending Digital Democracy Project
Starting with the “Top Five Checklist” and moving into more in depth breakdowns, the D3P resources below provide helpful, bite-sized information with easily digestible graphics & lists that help not only evaluate your cyber risk, but provide steps to securing your campaign moving forward.
Video: Five Things (practical, 3-minute training video for campaign staff and volunteers from all political parties) :
Cybersecurity Campaign Playbook
https://www.belfercenter.org/CyberPlaybook
The State and Local Election Cybersecurity Playbook
https://www.belfercenter.org/publication/state-and-local-election-cybersecurity-playbook
FBI: Protected Voices
The Protected Voices FBI initiative aims to mitigate the risk of cyber influence operations targeting U.S. elections. The link below provides informative videos crucial to campaigns. The topics range from protecting passwords to social engineering threats to what to do if you think you’ve been hacked.
National Governors Association: RESOURCE CENTER FOR STATE CYBERSECURITY
The NGA Resource Center provides a comprehensive list of resources, tools and recommendations to help craft and implement effective state cybersecurity policies and practices.
Center for Democracy and Technology
The CDT has written a helpful breakdown to compare “Traditional volunteers” with “Technical volunteers” while highlighting the importance of using civic-minded community members with technical skills to support experience both on Election Day and beyond.
Election Officials Toolkit for Technical Volunteers
https://cdt.org/insight/election-officials-toolkit-for-technical-volunteers/Infosec Toolkit for Election Volunteering
https://cdt.org/insight/infosec-toolkit/
Center for Internet Security
Through a best practices approach, the CIS aims to help organizations involved in elections better understand what to focus on, how to prioritize and parse the enormous amount of guidance available on protecting IT-related systems, and engage in additional collaboration to address common threats to this critical aspect of democracy.
Election Security Best Practices
https://www.cisecurity.org/elections-resources/A Handbook for Elections Infrastructure Security
https://www.cisecurity.org/wp-content/uploads/2018/02/CIS-Elections-eBook-15-Feb.pdfA Guide for Ensuring Security in Election Technology Procurements
https://www.cisecurity.org/wp-content/uploads/2019/05/CIS-Elections-Procurements-12-April.pdfElection Security Self-Assessments
https://www.cisecurity.org/elections-resources/election-security-self-assessments/Security Best Practices for Non-Voting Election Technology Guide
https://www.cisecurity.org/wp-content/themes/cis/assets/docs/Security_Best_Practices_Non-Voting-Tech_v1.1.pdf
Global Cyber Alliance
Use the GCA Cybersecurity Toolkit for Elections to help you implement the best practices from the CIS Handbook, find practical tips, and improve the security posture of your election office.
Cyber Security Toolkit for Elections
https://gcatoolkit.org/elections/
feedback
Do you have additional resources, ideas, stories, and comments? Share with us on Twitter @defendcampaigns or email us at info@defendcampaigns.org so we can continue to improve our resource list as the ever-changing digital landscape moves into 2020 and beyond.