Black Hat 2018: 10 Execs On The Top Cybersecurity Threat America Faces Around The 2018 Midterm Elections

Manipulation Of Voting Machines

The collection of voting data is difficult to orchestrate and secure given its decentralized nature as well as the use of different technology in different places, according to Chad Holmes, Optiv's executive vice president, chief services and operations officer.

Voting machines can be manipulated in a manner similar to ATMs if a bad actor has direct access, Holmes said, and securing the infrastructure or network these machines connect with can be challenging. Physical access is the easiest way hackers can be disruptive since many poll workers know little to nothing about cybersecurity, according to Incident Response Practice Director Jeff Wichman.

Jurisdiction with quality analytics or data lake sophistication on the back end, though, should be able to figure out what's going on, detect the anomalies, and isolate the compromised voting machine fairly quickly, according to Holmes.