Francis Johnson, Chief Technology Officer, Tech Impact
As security measures continue to grow, so does the threat landscape they are trying to protect against. SOC (Security Operations Center) and SIEM (Security Incident Event Management) combine two powerhouse services that help nonprofits stay ahead of attackers.
SOC is the team of security professionals that manages an organization’s security operations. While SIEM is the software solution used by the SOC to collect, analyze, and report on security data. SOC and SIEM play a critical role in maintaining an organization’s security posture and protecting against cyber threats. In this session, learn about what this means for nonprofits, how to identify your specific needs, and build an action plan to help unsure your organization’s safety and its ability to meet the requirements for cybersecurity insurance.
Brian Ford, Chief of Staff, National Endowment for Financial Education (NEFE)
Dashboards are a popular concept, and for good reason. When built with intentionality, they are a quick and easy snapshot of organizational data that save your constituents a great deal of time. We are excited to bring you an interactive session where you can explore inefficiencies to target and resolve through easily digestible reports and extraordinary clarity. (Spoiler alert: open dialogue about what does not work [and why] is KEY!)
Join the National Endowment for Financial Education (NEFE) team for a peek behind the curtain at how they created efficiencies and built an interactive reporting dashboard for staff and board members without breaking the bank. This simple, but powerful technology created a vehicle to better communicate KPI and impact data real time. Learn how NEFE identified the gap, turned it into an opportunity and created a solution that continues to evolve and support the organization.
Matthew Bonn, Sr. Functional Consultant, Zuri
When organizations are ready to focus on updating and upgrading their systems and procedures, it’s important to understand different methodologies and their benefits. In this session, we’ll examine the difference between digitalization and digital transformation, and why organizations need to transform, not just automate their businesses. We’ll cover the challenges, approaches, and areas of transformation through metrics and workbooks to map out customized plans.
Andrew Patricio, Principal, Digital Services, Unidos US
With terms like “data science” we may be guilty of unconsciously setting unrealistically high expectations when we make the case for analytics to our colleagues and leadership. But in reality, organizations don’t need it to be that daunting, or to wait for some unexpected program result or startling correlation to justify an investment in analytics. It’s less about insights in results than insights in actions: what can and does your analytics tell you about what to do next?
Join this session to hear how Unidos harnessed experimentation in analytics – systematically trying different approaches and iterating towards what is most effective – and how you can take your analytics from dramatic promises to ubiquitous usage.
Junell Felsburg, Sr. Director, Cybersecurity and Infrastructure, The Columbus Foundation
As cybersecurity threats and compliance requirements continue to grow and expand, it’s more important than ever for organizations to have a clear and comprehensive cybersecurity program in place. But with so many frameworks and recommendations, it can be hard to know where to start. That’s where the Secure Controls Framework comes in.
In this session, designed for organizational leaders building or expanding their cybersecurity programs, you’ll learn how to use the Secure Controls Framework, Maturity Modeling, and objective-based implementation programs to create a program customized for your organization’s needs.
The best part? The Secure Controls Framework isn’t just another set of rules to follow. Instead, it provides a clear framework for organizing and building secure and compliant cybersecurity and privacy programs that work. And because they have overlapping components with other frameworks and recommendations, you can be sure you’re building a program based on real-world best practices. You’ll leave with the tools and knowledge to build a strong, effective, compliant cybersecurity program that protects your organization from even the most sophisticated threats.