<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center; font-weight: normal; font-size: 12px;"><span style="font-size: 16px;"><span style="background-color: transparent;">With the recent indictment of 12 Russian int</span><span style="background-color: transparent;">elligence officials charged with hacking and attempting to manipulate elections in the US in 2016, the topic of election security has resurfaced.</span></span></p> <!--more--><p style="text-align: center; font-weight: normal; font-size: 12px;">&nbsp;</p> <p><span>The 2018 elections are quickly approaching, with the next presidential election not long behind in 2020. Even during recent local elections, cyber security incidents have occurred, showing that threats don’</span><span> </span><span class="details">t just emanate from Russia, but are increasing in frequency. </span></p> <p><span class="details">This webcast will highlight aspects of the indictment and show how threat sharing between election authorities and the automated use of threat intelligence data can protect local election authorities, state election boards, and the integrity of our elections as a whole. It becomes key not only to have knowledge of threats, but to block them from ever compromising election authorities in the first place. </span></p> <p>&nbsp;</p> <p><strong><span class="details">We'll Cover:</span></strong></p> <ul> <li> <p><span style="background-color: transparent; font-size: 16px; color: #000000;">What are the threats that election authorities and those involved in elections need to be most concerned about?</span></p> </li> <li><span class="details" style="color: #000000;">How can candidates and political parties protect themselves without expending great amount of funds?</span></li> <li><span class="details"><span style="color: #000000;">Why automated u</span>se of intelligence data to block threats is so important and why mere passive alerting is not enough.</span></li> </ul> <p>&nbsp;</p> <p><strong>Details:</strong></p> <p>Date: Thursday, July 19.</p> <p>Time: 10 AM - 10:30 AM PDT, 1 PM - 1:30 PM EDT. (30 minute run time)</p> <p><strong>Limited number of sports are available, reserve yours now and register <a href="https://register.gotowebinar.com/register/5999516375437955842"><span style="color: #ff0201;">here</span></a>.</strong></p> <p>&nbsp;</p> <p><strong><span class="details">About the Speaker: </span></strong></p> <p><span class="details"><span><img src="https://info.threatstop.com/hubfs/johnspeaking.jpg" alt="johnspeaking" width="197" style="width: 197px; float: left; margin: 0px 10px 10px 0px;">John Bambenek is the Vice President of Security, Research and Intelligence at ThreatSTOP, Lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign and a handler with the SANS Internet Storm Center. He has over 18 years experience in information security and leads several international investigative efforts tracking cyber criminals, some of which have led to high profile arrests and legal action. </span></span></p> <p><span class="details"><span>He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.</span></span></p></span>