Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Biden campaign hires cybersecurity experts to defend against potential threats

election
July 13, 2020

The presidential campaign of former Vice President Joe Biden announced that it had filled the positions of chief information security officer (CISO) and chief technology officer (CTO) in order to address potential cybersecurity threats to the campaign. 

According to The Hill, the campaign hired Chris DeRusha to serve as CISO and Jacky Chang as CTO. DeRusha previously served as chief security officer for the state of Michigan, and previously served in the White House and the Department of Homeland Security, along with leading Ford Motor Company’s enterprise vulnerability management program, says the news report.

Chang currently is senior technologist at Schmidt Futures, but is taking unpaid leave to join the campaign. Previously, Chang worked as a senior engineer on the 2016 presidential campaign of former secretary of State Hillary Clinton, and is a former member of the Democratic National Committee’s (DNC) voter protection team during the 2018 midterm elections, notes The Hill. 

"Biden for President takes cybersecurity seriously and is proud to have hired high quality personnel with a diverse breadth of experience, knowledge, and expertise to ensure our campaign remains secure,” a Biden campaign spokesperson told The Hill. “Jacky and Chris will be central to strengthening the infrastructure we've built to mitigate cyber threats, bolster our voter protection efforts, and enhance the overall efficiency and security of the entire campaign."

“This is definitely a wise move given the interference that happened in 2016. With the emergence of deep fakes and  “fake news” on social media that can drive beliefs and voting choices, all campaigns should have a cyber Czar continuously monitoring not only the systems of the campaigns, but social media," says Terence Jackson, Chief Information Security Officer at Thycotic. Also with unknown variables such as COVID-19 that could affect how we vote in November , it is prudent to ensure our election infrastructure is not tampered with.”

Brandon Hoffman, CISO, Head of Security Strategy at Netenrich, a San Jose, Calif.-based provider of IT, cloud, and cybersecurity operations and services, notes the importance of having a dedicated focus on cybersecurity for something as important as the upcoming presidential election. "With so much focus on Russia, and other state sponsored cyber activity, much of the lower level activity can be ignored or overlooked. This activity can not only be just as damaging, but the same techniques can be used by those state sponsored adversaries. In today’s world, the attack surface of something, such as a campaign, is almost uncontrollable. This includes volume attacks such as phishing critical staff to mobile threats on the phones of volunteers. Keeping track of what devices join the networks and how to provide access control to critical assets, it appears to be a daunting task." 

There are several high focus areas for the cyber team, adds Hoffman. "The most important task is securing the critical data and assets with restrictions on who can access them. Subsequently, ensuring the shared platforms and networks across campaign locations and tiers of staff are appropriately monitored and controlled is also important," he says. "Another focus area would be messaging systems. Any system that can be compromised to send information to the public that is not legitimate will be a high value target for adversaries.”

Joseph Carson, chief security scientist and Advisory CISO at Thycotic, remarks that this is a critical step in acknowledging the importance that cyberattacks have on an election and a campaign, especially one as important as the presidential election. "All elections and campaigns will experience cyberattacks and it is important to have an experienced and knowledgeable expert providing direction and response when cyberattacks materialize," says Carson. "Unfortunately, most campaign staff are inexperienced when it comes to cybersecurity best practices and are very vulnerable to phishing attacks that attempt to steal their credentials enabling attackers to gain access to emails or even voter registration database which could provide an attacker intelligence on how to best target an election."

"I hope that Chris DeRusha will emphasize the importance of password hygiene and privileged access management (PAM) when it comes to protecting campaign staff’s credentials and access to voters information. PAM is a key cybersecurity strategy when it comes to protecting sensitive voting information and is a must have security to reduce the risks from becoming a cyber victim," adds Carson. "Appointing a cyber czar is the first step in acknowledging the important challenge that cybersecurity has on democracy. This includes upholding the US constitution along with raising the confidence of the citizens with their future government no matter who is the next president. Moving forward, cybersecurity must be a top priority. Citizens must have confidence in their democracy and cybersecurity must be addressed when voting.”

KEYWORDS: Chief Information Security Officer (CISO) Chief Technology Officer (CTO) cyber security information security presidential security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • voting election

    Potential voter privacy issues in Biden campaign app

    See More
  • hackers

    How to defend against human operated ransomware

    See More
  • cyber attack

    4 steps to defend against cyber attack risk

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing