Los Angeles County Embraces Comprehensive Security
Rather than relying solely on endpoint monitoring tools, the Los Angeles County Registrar-Recorder and County Clerk has adopted a multilayered strategy that integrates controls for strict data governance, risk and compliance, infrastructure monitoring, and identity and access management.
It also encompasses application security, security operations and incident response, social media monitoring, countermeasures for misinformation, aggressive user training, and continuous assessment and improvement to strengthen the county’s overall security posture.
All critical, election-specific systems, including custom-designed voting machines, are isolated in an air-gapped network.
For the remaining infrastructure, the county deploys Cradlepoint E3000 routers to create secure, temporary networks at voting centers. The county uses Cradlepoint’s NetCloud Manager to monitor all network traffic in real-time, allowing it to switch carriers instantly via 4G, 5G or satellite if one network becomes jammed or compromised.
Only authorized devices with fresh security certificates (specifically, Apple iPads used as electronic poll books) are allowed to connect to these secure routers.
READ MORE: CISA helps states and localities with cybersecurity training.
But technology is only one part of the equation. Bhullar emphasizes a human-centered design philosophy where security is baked into the foundation of the voting experience.
“Whether we’re procuring vendor solutions or developing applications in-house, we maintain a security-first design philosophy while ensuring the user experience remains intuitive and accessible,” Bhullar says. “We’re committed to deploying technology that accelerates productivity and enhances capabilities, ensuring it functions as a strategic asset rather than a barrier to progress.”
This approach includes a multilayered security program. All critical, election-specific systems are isolated in an air-gapped network. For the remaining systems — such as public-facing servers and voter registration databases — the county strictly enforces network segmentation and zero-trust principles, ensuring users only get access to the systems they explicitly need.
Because threats continually evolve, the county also uses comprehensive intrusion detection and prevention mechanisms to guard against ransomware. These protections are backed by regular tabletop security exercises, Bhullar says, “to ensure all stakeholders understand their roles and can execute our response protocols when an incident requires coordinated human intervention.”
Layered Defenses Protect Election Operations
In St. Louis County, Mo., election officials are working closely with their IT department and technology partners to fortify their network backbone as they roll out a new election management system ahead of 2026.
Eric Fey, a director of elections for St. Louis County, notes that the threat landscape is a “constant chase” against sophisticated actors. The county recently underwent a biennial cybersecurity risk assessment and is focusing heavily on defending against “tailored incursions” and social manipulation.
DIVE DEEPER: Artificial intelligence is transforming the modern firewall.
On Election Day, the county maintains a strict separation of assets. Ballot printers, ballot scanners at polling places and accessible devices for voters with disabilities operate in a completely air-gapped system, Fey says.
However, the electronic poll books used to check in voters are connected via a cellular network. To manage this securely, the county can remotely shut down a poll book if it goes missing, or correct a mundane check-in error from a central location, ensuring polling places keep moving without exposing the wider network to risk.
As part of its defense-in-depth strategy, the county deploys Fortinet’s FortiGate firewalls to secure its enterprise.