Skip Navigation
BlackBerry Blog

ICIT and Cylance Discuss Election Hacking Risks

VIDEOS / 10.24.16 / The Cylance Team

Cylance’s Jim Walter recently participated in a non-partisan panel examining risks to the U.S. election system at a session hosted by the Institute for Critical Infrastructure Technology (ICIT) in Washington, DC.

As Senior Researcher with the Cylance SPEAR research team, Walter focuses on next-level attacks, threat actors and campaigns as well as ‘underground’ malware markets and associated cybercriminal activity.

The subject matter of the panel was based on two recently published research papers on election hacking that were intended to define the relevant attack vectors and to demonstrate the critical need to secure electronic voting systems.

Walter and other security industry experts specifically discussed:

  • Vulnerabilities in our e-voting systems at the local and state levels
  • Risks of local and election official and staff exploitation
  • Documented incidents of attacks targeting electronic voting systems


"It's time to take a deep dive into the state of security in electronic voting machines and to report on what is found," said Jon Miller, Chief Research Officer at Cylance. "Jim and the other experts on this ICIT panel will be speaking directly to the groups who can make a significant impact on this problem."

Walter is a regular speaker at cybersecurity events and has authored numerous articles and white papers specific to advanced and low-level threats. He joined Cylance following 17 years at McAfee/ Intel Security, running their Advanced Threat Research and Threat Intelligence teams and content streams.

Other panel speakers included:

  • James Scott, Senior Fellow at ICIT and Primary Author
  • Tony Cole, ICIT Fellow and VP/ Global Government CTO at FireEye
  • Parham Eftekhari, Senior Fellow at ICIT
The Cylance Team

About The Cylance Team

Our mission: to protect every computer, user, and thing under the sun.

Cylance’s mission is to protect every computer, user, and thing under the sun. That's why we offer a variety of great tools and resources to help you make better-informed security decisions.