Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

It’s time to modernize the voting process

By Josh Horwitz
voting election
December 15, 2020

We live in a digital age, yet voting remains woefully outdated. The nation’s recent experience holding a presidential election during a pandemic highlights how important it is to modernize the voting process. The benefits of transitioning to online voting are numerous, including easier access as voters would no longer be required to wait in long lines and greater efficiency as votes would be tabulated electronically. As a recent article in Foreign Policy put it, “At a time when many organizations are going through a digital transformation, it’s time for the United States itself to join in.”

As we consider how best to modernize the election process it’s imperative that we not overlook the inherent security concerns. Elections are a prime target for hackers for a variety of purposes--ranging from individual entities to sophisticated, state sponsored actors. That’s why it’s essential that the security community be included in all efforts to transform the election process. Only when technology providers and all levels of government collaborate to avail of the latest technologies can we effectively transform the voting process and, in so doing, further protect democracy.

Before we can usher elections into the modern age, however, there are a number of challenges that must be overcome. Among them:

  • Fragmented environments. By the Constitution itself, the power involved in controlling processes is typically pushed down from the federal government to individual states—and often then to the municipal level. This framework functions well for a variety of initiatives and ensures that programs and services align to the needs of local populations. However, when it comes to unifying processes and driving modernization efforts, this distributed approach comes up short. After all, you’d hardly expect a small municipality to spearhead a digital initiative with federal implications. Working as a collective group, government representatives and the technology community must address this unique challenge, and find a way to implement digital transformation at a macro level while also encouraging the flexibility needed at the state and local level.

It’s difficult enough for a typical corporation to go through a digital transformation exercise; the right mix of skills, funding and agility is required to do it effectively. The former are generally in short supply in the government sector, and agility is virtually impossible in such a fragmented environment. This is an area in which solution providers and other technology organizations could assist. The federal government is already working with numerous solution providers and integrators on digital transformation initiatives. Why not get creative and launch a competition that rewards joint collaborations and encourages these vendors to innovate in the pursuit of modernizing the election process? 

 

  • Resource constraints. As mentioned above, driving a large-scale modernization effort traditionally requires significant budget and resources, two things always in short supply in government. Recent innovations in the form of open source and blockchain could help both federal and local governments overcome these obstacles, however. Blockchain addresses many of the criteria essential to a fair and transparent election—accessibility, authentication and security. In theory, were blockchain in use during the 2020 presidential election, anyone from either campaign could check the vote count and audit anything that appeared suspicious. Of course, the industry is not quite mature enough for widespread adoption of a blockchain, though it has been used in regional elections in other countries. But the potential is certainly there, and with federal backing and partnerships throughout the technology community the U.S. could take a blockchain-based system from possibility to reality by the 2026 midterms.

 

  • Diverse population. The government has a very large and extremely diverse user base. The 2020 presidential election saw voters turn out in record numbers, comprising the Greatest Generation through to Generation Z. Just think about the vastly different levels of technology savvy, number of devices and comfort level interacting with digital technologies that exist amongst these demographics. To truly digitize the election process, government and technology providers must determine how to meet these divergent needs and preferences.

 

  • Secure authentication. Given the critical importance of authenticating individual votes, it’s no surprise that security is a prime consideration. Innovations like biometrics receive significant media and industry buzz, however, they remain an ineffective approach when considering the entire U.S. population. Not every voter has a device that is equipped for facial recognition or other forms of biometric identification. As such, relying on biometrics as a primary means for authentication could be viewed as a form of voter suppression. In addition, modernizing many local municipalities to recognize this form of authentication is also an unrealistic expectation.

For these and other reasons, passwords will remain the primary means of securing votes even as the election process becomes more digitized. To shore up security, governments should focus on strengthening the password layer. People frequently share passwords across multiple online accounts, and this practice is even more pervasive amongst both older and younger demographics who are less attuned to the inherent security vulnerabilities. In light of these factors, part of effectively digitizing the election process involves both screening and monitoring credentials to ensure they are not compromised and opening the door to potential fraud.

The pandemic already made this an unprecedented presidential election, and the events that have unfolded since November 3rd only underscore that 2020 is anything but typical. Emergency mode is never the right time to introduce technology changes. But as the current controversy fades and a new administration is sworn in, effectively transforming the election process should be a priority from day one. In an ideal world, by the 2026 midterms we should see a more digitized approach to voting that addresses the divergent needs of the U.S. population while simultaneously ensuring the security and integrity of every individual vote.

KEYWORDS: election security risk management voting security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Josh horwitz enzoic

Josh Horwitz is an enterprise software executive and entrepreneur with over 25 years experience. He was the founder of the cloud-based, enterprise customer-marketing platform, Boulder Logic, whose clients included Microsoft, Siemens, Dell, and CSC. Prior to founding his company, Josh held senior technology and sales positions with both start-ups and Fortune 500 companies, including IBM where he developed marketing programs to help build Lotus Domino to over 40 million users. Josh earned his MBA from Babson’s F.W. Olin Graduate School of Business and his BA from Washington University in St. Louis. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • keys-cyber-enews

    The Security Vulnerabilities Emerging from the Coronavirus Pandemic

    See More
  • key-enews

    Battling Account Takeover Risks Without Compromising User Experience

    See More
  • Can the voting process be hacked? Yes it can.

    Can the voting process be hacked?

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing