Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Working with Government to Help Secure Our Elections

By Dave Gerry
Security blog default
April 9, 2020

You don’t have to be a news junkie to notice one of the bigger stories the media is focusing on these days. Whether it’s local, state or national races, election security has become a serious issue. And it’s easy to understand why. If you think about the psychological impact of any data breach, there’s a sense of theft, of a violation of privacy. When you apply that to a free election -- the very bedrock of our democracy – it can be much worse, in a way. There is a real threat to take away your voice and ability to participate in a democracy.

Even if it’s not a security issue per se, if there is any inkling of interference, it can immediately taint the election. All it takes is a seed of doubt that a nation state or domestic meddler is interfering in an election for people to begin questioning the legitimacy of our country and democratic system. The entire process is undermined. If we get to a point where we don’t believe the election results shown to us, then ultimately, we’ve failed.

What Should be Done

Fortunately, we are not there yet. But it is important that steps be taken to ensure that never happens. At the state level in particular, there must be a more serious approach to securing the applications that run these elections. In any modern election system, there are two main applications: the actual app you use to vote and the app for the voter database/registration. Both are equally important to safe, free elections. But most government agencies don’t have the tools to fully ensure their security.

It all comes down to public trust, and anything that can be done to increase that trust is essential. We have to make sure apps are secure, and that the physical security of where those apps live is secure. It’s similar to the chain of custody within the data world, from the point when someone presses the vote button all the way up to state level. And that comes down to implementing a strong security policy.

Many people likely wonder, why isn’t more being done? It’s not for lack of money. Quite a bit of funding was granted from Homeland Security following the 2016 elections.

A bigger issue is that states simply lack the technology and cybersecurity expertise. Even in the private sector, the skills gap is a well-publicized problem. Keeping and finding talent is one of the bigger challenges facing our industry. But states don’t have the luxury of offering high salaries and lots of perks to lure talent to their doorstep. It’s a tough sell for a state government agency competing against the Googles of the world for top talent. It’s not just a skills problem, it’s a people problem.

Working with Government on Election Security

Obviously, there is an opportunity here for private industry to help address this important issue. But that is easier said than done. 

As any sales organization with government contracts will attest, working with the government, at any level, can be challenging. One of the things that makes it so difficult are the requirements that governments have when it comes to procuring software services. This is a real detriment to public sector agencies, as they are so limited in their choices. If you’re only able to choose between two or maybe three software vendors, are you really going to be able to get the best and brightest? Likely not. That’s true of any government project, but state agencies have very strict standards to meet for voting requirements, making it even more of a challenge.

If you do decide it’s in your best interest to work with a government agency on an election security issue, there’s a few things to keep in mind. Number one is to take advantage of the budget that’s available – as strict as it may seem, there may be additional funds available. In my experience, even multi-million-dollar investments. So be sure to educate yourself on the funding that is available and do what it takes to leverage it.

Also, you’ll likely want to partner with other organizations. Chances are, you don’t have the necessary resources in place and teams in place to implement and deploy these tools. But there are other vendors that likely do. As with most public sector projects, it’s going to take a team effort to tackle the job. Ideally, you’ll want to partner with someone who has plenty of experience deploying in the government sector. You’ll also want to operate in a secure environment, with credentialed U.S. citizens or U.S. naturals who will be dealing with data, so you are not opening yourself up to risk.

An Appeal 

One final thought, or perhaps an appeal: if you value the legitimacy of our free elections, consider giving something away. In my company’s case, we chose to walk away from a fairly lucrative opportunity and provide our services for free to state, local and federal agencies in North America. This was a situation where we were literally the only vendor that could provide a sufficient solution for a particular agency. But rather than approach that as a profit motive, we felt it was our job to help add a layer of protection to the voting and democratic process.

Longer term, that can pay dividends for your organization. If you can be trusted to help secure the inherently complex process of our country’s election system, you will get the attention of plenty of high-profile organizations in the public sector. But more importantly, you’ve done your part to keep our democracy safe.

 

KEYWORDS: cyber security data breach election security Homeland Security

Share This Story

Dave gerry
Dave Gerry currently serves as chief revenue officer and head of Global Operations for application security firm WhiteHat Security. He specializes in turning-around, leading, and growing revenue and service delivery engines to drive profitable, double and triple digit bookings growth. Focused on the cybersecurity industry, he has held executive roles at other dynamic organizations like Sumo Logic, Veracode and The Herjavec Group. He holds an MBA from Suffolk University and a BA from Merrimack College.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!