This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Back to to Advisory Committee
Stephen Boyce

Stephen Boyce

International Foundation for Electoral Systems
Senior Global Election Technology and Cybersecurity Advisor

Stephen Boyce is the International Foundation for Electoral Systems’ (IFES) Senior Global Election Technology and Cybersecurity Advisor. He is a cybersecurity expert with experience working in law enforcement, the private sector, public service, and higher education. He leads IFES’s technology outreach and development of tools and policy recommendations on the responsible use of technology and countering the evolving threats posed to democracy.

He was previously a principal consultant at The Crypsis Group (a Palo Alto Networks Company), where he led global cyber investigations and provided virtual Chief Information Security Officer (vCISO) services to organizations worldwide. Before joining The Crypsis Group, he served as a technical subject matter expert for the Federal Bureau of Investigation (FBI), supporting a range of investigations worldwide. Earlier in his career, he served as a cyber intern for the National Cyber Investigative Joint Task Force, the U.S. Department of State, and the FBI’s International Operations Division.

Boyce is also an adjunct professor at the University of Maryland Global Campus and a cybersecurity adjunct professor at Marymount University. He is currently pursuing a Doctorate in Cybersecurity. His research areas of interest include Cyber Diplomacy, Data Privacy, and the Human Factors of Cybersecurity.

His numerous professional certifications include Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC) Security Essentials, GIAC Certified Forensic Examiner, GIAC Advanced Smartphone Forensics, to name a few.

Legal Notice

GCA may provide information about third-party products or services, including security tools, videos, templates, guides, and other resources included in our cybersecurity toolkits (collectively, “Third-Party Content”). You are solely responsible for your use of Third-Party Content, and you must ensure that your use of Third-Party Content complies with all applicable laws, including applicable laws of your jurisdiction and applicable U.S. export compliance laws. We provide Third-Party Content as a service to those interested in such content. Your dealings or correspondence with third parties and your use of or interaction with any Third-Party Content are solely between you and the third party. GCA does not control or endorse, and makes no representations or warranties regarding, any Third-Party Content, and your access to and use of such Third-Party Content is at your own risk.

  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Instructions
Third Party Scan
Video
Third Party Tool
Policy Document

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/