This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Back to to Advisory Committee
Liz Howard

Liz Howard

Brennan Center for Justice at NYU School of Law
Senior Counsel, Democracy Program

Liz Howard serves as senior counsel for the Brennan Center’s Democracy Program. Her work focuses on election security. Howard regularly comments for television, radio, and print media on issues relating to election security and election administration and has testified before U.S. House Committee on Homeland Security and in a variety of state legislatures. She has also co-authored multiple Brennan Center reports and white papers:  Better Safe Than Sorry (2018),  Defending Elections: Federal Funding Needs for State Election Security  (2019), Trump-Russia Investigations: A Guide Preparing for Cyberattacks and Technical Failures: A Guide for Election Officials  (2019). Prior to joining the Brennan Center, Howard served as deputy commissioner for the Virginia Department of Elections. During her tenure, she coordinated many election administration modernization projects, including the decertification of all paperless voting systems, implementation of the e-Motor Voter program, and adoption of online, paperless absentee ballot applications, for which the department received a 2017 Innovations in American Government Bright Ideas Award from the Ash Center for Democratic Governance and Innovation at the Harvard Kennedy School. She previously worked as general counsel at Rock the Vote, a nonprofit organization dedicated to engaging young people in politics and as a senior associate at Sandler Reiff in Washington, DC, where she specialized in election law with a focus on voting rights, campaign finance, and post election disputes. Howard earned her JD from the William & Mary Law School and received the Alumnus of the Year award from the William & Mary Election Law Society.

Legal Notice

GCA may provide information about third-party products or services, including security tools, videos, templates, guides, and other resources included in our cybersecurity toolkits (collectively, “Third-Party Content”). You are solely responsible for your use of Third-Party Content, and you must ensure that your use of Third-Party Content complies with all applicable laws, including applicable laws of your jurisdiction and applicable U.S. export compliance laws. We provide Third-Party Content as a service to those interested in such content. Your dealings or correspondence with third parties and your use of or interaction with any Third-Party Content are solely between you and the third party. GCA does not control or endorse, and makes no representations or warranties regarding, any Third-Party Content, and your access to and use of such Third-Party Content is at your own risk.

  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Policy Document
Instructions
Third Party Scan
Video
Third Party Tool

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/