Press + Media Contact
Director, PR and Communications
+1 (949) email@example.com
IRVINE, CALIFORNIA, October 18, 2016 - Cylance® Inc, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, announced today that Jim Walter, senior researcher with the Cylance SPEAR research team, will be participating on a non-partisan, non-political panel called "Hacking Elections is Easy!" at a briefing hosted by The Institute for Critical Infrastructure Technology (ICIT).
The briefing, which takes place on October 20 in Washington, DC, is based on two research papers on election hacking that aim to establish the need for a substantial discussion on the topic, to loosely define the relevant attack surface, and to demonstrate the need to secure electronic voting systems.
On the panel, Walter and other security industry experts, will discuss:
As a senior researcher for the Cylance SPEAR team, Walter focuses on next-level attacks, actors, and campaigns as well as "underground" malware markets and associated criminal activity. He is a regular speaker at cybersecurity events and has authored numerous articles, white papers and blog posts specific to advanced/low-level threats. He joined Cylance following 17 years at McAfee/Intel Security, running their Advanced Threat Research and Threat Intelligence teams and content streams.
"It's time to take a deep dive into the state of security in electronic voting machines and to be able to report on what is found," said Jon Miller, chief research officer at Cylance. "Jim and the other experts on this ICIT panel will be speaking directly to the groups who can make a significant impact on this problem."
About Cylance® Inc.
Cylance is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can’t, while using a fraction of the system resources associated with endpoint antivirus and detect and respond solutions that are deployed in enterprises today. For more information visit: www.cylance.com
Cylance and CylancePROTECT are registered trademarks or trademarks owned by Cylance Inc. in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks are the property of their respective owners.