It’s 2018, and threats are continuously coming at nonprofits from every angle, especially as we deploy solutions for increased mobility and distributed workforces. Learn about how security threats impact nonprofits and find out how to keep your organization safe and compliant. Get practical guidelines to securing your environment and minimizing your risks.
Breakout Session: “Locking It Down – A Look at First Priorities for Securing Your Organization”
You’ve secured passwords and backed up your data, but what’s next on the to-do list of security? How do choose which security features are right for your organization, and when do you start implementing? Dive deeper into your needs in this interactive workshop that uses security and threat management checklists dependent on your size, sector and past experiences.
Breakout Session: “Privacy-First Approach to Security”
GDPR might be the law in Europe, but users are coming to expect the same protections around the world. Increasingly concerned constituents expect nonprofits to take their privacy and data security seriously. Learn about how to take a privacy-first approach to security in your nonprofit organization and stay ahead of your constituent’s expectations
Breakout Session: “New Norms in Information Security”
The traditional “norms” in Information Security have failed to yield positive results. Adherence to Security Frameworks (ISO 27001/2 and NIST), to regulatory obligations (GLBA, HIPAA, SOX), or to industry regulations (PCI) have been insufficient to halt or even slow down the consistent onslaught of security breaches impacting hundreds of millions of consumers. The industry is still attempting to establish the same traditional controls while expecting a different result. The baselines and paradigms that have been taught and preached to Information Security over the years have not resulted in the promised enhancements to an organization’s security posture. It is clearly time for a change.
It is time to establish a new set of “norms”, those outside of the expected and required. Those that are aligned with the current threat landscape and leveraging the wealth of opportunities in the advancements in technology and innovation. Takeaways will include a set of “new norms”, i.e. preventive and detective security controls that should be considered foundational in today’s threat landscape.
Breakout Session: “Advanced Security Threats”
Most nonprofits need to worry about phishing and brute-force attacks, but some need to worry about much more.
Learn about advanced security threats facing nonprofits with well-resourced and government adversaries. We’ll discuss man-in-the-middle, evil-maid, side-channel, rom-tampering, and other advanced threats.
This session will educate, but cut through the fear-mongering and help your organization understand where to focus its efforts.