1. The Election Influence Operations Playbook

    The threat of Influence Operations (IO) strikes the core of our democracy by seeking to influence hearts and minds with divisive and often false information. Although malicious actors are targeting the whole of society, the upcoming “The Election Influence Operations Playbook” focuses on a subset of influence operations—the types of disinformation attacks and misinformation incidents […]

    read more
  2. 20 Ways to Protect the 2020 Election

    Modifying election plans to account for coronavirus is understandable and essential. However, drawing on pre-existing election funding to address these modifications presents a particular dilemma: ahead of the presidential election, our nation’s election infrastructure is not yet fully secure, while America’s adversaries continue to possess the capabilities to exploit technical deficiencies and to try to […]

    read more
  3. The Election Official’s Handbook

    Foreign actors are increasingly sophisticated at using cyber tools and social media to probe and penetrate electoral infrastructure, manipulate public opinion, and cast doubt on the integrity of the election process. On the eve of another presidential election, vulnerabilities in our election systems remain unaddressed. This handbook provides a list of steps that local election […]

    read more
  4. Elections Cyber Tabletop Exercise Package

    CISA developed the Elections Cyber Tabletop Exercise Package (commonly referred to as “tabletop exercise in a box”) as a resource for state, local, and private sector partners. The package includes template exercise objectives, scenario, and discussion questions, as well as a collection of cybersecurity references and resources. Partners can use the exercise package to initiate […]

    read more
  5. Best Practices for Mail Screening and Handling Processes

    The Best Practices for Mail Screening and Handling guide is designed to provide mail center managers, their supervisors, and an organization’s security personnel a framework for understanding and mitigating risks posed to the organization by the mail and packages it receives and delivers on a daily basis. A wide range of potential threats can be […]

    read more
  6. Elections Industry-Special Interest Group Coordinated Vulnerability Disclosure Program White Paper

    This paper highlights the election systems manufacturer’s voluntary efforts to establish an industry framework that identifies, assesses, and mitigates potential vulnerabilities in election systems. This joint industry initiative will serve as the evolutionary basis for a Coordinated Vulnerability Disclosure (CVD) program, assuming that its goals can be adapted and synchronized with state and federal testing […]

    read more
  7. EI-ISAC 2018 Year in Review

    During 2018, the Elections Infrastructure Information Sharing & Analysis Center™ (EI-ISAC®) evolved from an idea to a formalized collective of dedicated election officials. Elections staff members, associations, technology vendors, federal partners, and cybersecurity experts worked tirelessly to help secure the U.S. elections infrastructure. From sharing information about the threat landscape to creating educational opportunities and […]

    read more