BEGIN:VCALENDAR VERSION:2.0 PRODID:-//ChamberMaster//Event Calendar 2.0//EN METHOD:PUBLISH X-PUBLISHED-TTL:P1H REFRESH-INTERVAL:P1H CALSCALE:GREGORIAN BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU DTSTART:20070101T000000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:Eastern Daylight Time END:DAYLIGHT BEGIN:STANDARD RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU DTSTART:20070101T000000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:Eastern Standard Time END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=America/New_York:20190711T130000 DTEND;TZID=America/New_York:20190711T143000 X-MICROSOFT-CDO-ALLDAYEVENT:FALSE SUMMARY:Webinar Series: Cyber Security 101 - Practical Ways to Protect Your Nonprofit DESCRIPTION:Webinar Series: Cyber Security 101 - Practical Ways to Protect Your Nonprofit\nThree Thursdays\, July 11 to July 25\, 1 to 2:30 PM Eastern Cyber Security is an increasingly important issue to the nonprofit community. Financially motivated cyber-attacks are increasing in frequency and nonprofit organizations are now a specific target due to their lack of policies and security training.This webinar series will explore the mechanisms of cyber-attacks and how to protect against them at the organizational level\, steps individual staff members can take to help reduce threats\, and how to assess and plan for improvements in your organization. Designed for small- to medium-sized organizations\, this course will focus on simple\, practical solutions. Finally\, we'll cap things off with an "ask the expert" session where you can try to stump Tech Impact's highly experienced consulting team with your security questions.Participants do not need any previous cyber or technical experience to benefit from this course. It's designed for people with zero years of experience.\nCourse ScheduleAll sessions take place on Thursdays at 1 PM Eastern and last for 90 minutes. July 11: How Vulnerable Are You?Cyber-attacks are on the rise. Though they can take a number of different forms\, what they all have in common is the devastating financial and reputational effect they can have on an organization. How vulnerable is yours? In this session\, we'll focus on identifying the variety of threats nonprofits are facing and look at common habits and practices that make your organization vulnerable to attacks. We will explore how much a security breach can cost your nonprofit and share ways to assess your current risk and exposure. July 18: Keeping Your Organization SecureNow that we have an idea of what kinds of attacks you could be facing\, we'll move toward keeping your organization secure. In this session\, we will share tips and tricks to boost security using existing software like Microsoft Office\, how to establish security policies\, and the best ways to train your staff about security issues. Depending on the results of your organization's risk assessment\, it may be worth investing in stronger security measures we'll share some of the tools and professional assessment and monitoring services available to help you make the best decision for your needs. July 25: Ask the ExpertPerfect security is not attainable and different organizations will have different needs. In this session\, we'll offer the chance for you to ask a team of cyber-security experts and consultants specific questions\, and to benefit from their expertise.\nAbout Your TrainerLinda Widdop \nAs Tech Impact's Director of Client Solutions and Education\, Linda manages all aspects of client relations\, including educating nonprofits about technology solutions. She works with local\, regional\, and national partners to provide the nonprofit community with increased knowledge of technology through speaking engagements\, individual consultations\, and digital content delivery. She has worked in the computer industry for over 30 years in a variety of roles\, including manufacturing\, retail sales\, and extensive technology training experience\, and holds a Masters of Education degree from Arcadia University.\nOther InfoEvery session and demo will be recorded and available to individuals who have registered for the course. A weekly email will include access information for the recordings collected that week.Please register with the email address where you would like to receive the access code and dial-in information for the online seminar. Also\, be sure to add info@idealware.org to your contacts to ensure meeting details do not get caught in your spam folder.All registered participants are granted access to the recordings of each session. Participants who cannot attend any of the sessions due to scheduling conflicts will still have access to the toolkit presentation decks and handouts. X-ALT-DESC;FMTTYPE=text/html:
Webinar Series: Cyber Security 101 - Practical Ways to Protect Your Nonprofit
 \;
Cyber Security is an increasingly important issue to the nonprofit community. Financially motivated cyber-attacks are increasing in frequency and nonprofit organizations are now a specific target due to their lack of policies and security training.
This webinar series will explore the mechanisms of cyber-attacks and how to protect against them at the organizational level\, steps individual staff members can take to help reduce threats\, and how to assess and plan for improvements in your organization. Designed for small- to medium-sized organizations\, this course will focus on simple\, practical solutions. \;
Finally\, \;we&rsquo\;ll \;cap things off \;with an &ldquo\;ask the expert&rdquo\; session where you can try to stump Tech Impact&rsquo\;s highly experienced \;consulting team with your security questions.
Participants do not need any previous cyber or technical experience to benefit from this course.  \;It&rsquo\;s designed for people with zero years of experience.
Course \;Schedule
All sessions take place on Thursdays \;at 1 PM Eastern and last for 90 minutes.
 \;
July 11: How Vulnerable Are You?
Cyber-attacks are on the rise. Though they can take a number of different forms\, what they all have in common is the \;devastating financial and reputational effect \;they can have \;on \;an \;organization. How vulnerable is yours? In this session\, \;we&rsquo\;ll \;focus on identifying the variety of threats nonprofits are facing \;and look at \;common habits and practices that make your organization vulnerable to attacks. We will explore how much a security breach can cost your nonprofit \;and share \;ways to assess \;your \;current \;risk and exposure.
 \;
July 18: Keeping Your Organization Secure
Now that we have an idea of what kinds \;of attacks you could be facing\, \;we&rsquo\;ll \;move toward \;keeping your organization secure. In this session\, we will share tips and tricks to boost security using existing software like Microsoft Office\, how to \;establish security policies\, and the best ways to train your staff about security issues. Depending on \;the results of \;your organization&rsquo\;s risk assessment\, it may be worth investing in stronger security measures&mdash\;we&rsquo\;ll \;share some of the \;tools and professional assessment and monitoring services available \;to help you make the best decision for your needs.
 \;
July 25: \;Ask the Expert
Perfect security is not attainable&mdash\;and different organizations will have different needs. \;In this session\, \;we&rsquo\;ll \;offer the chance for you to ask \;a team of cyber-security experts and consultants \;specific questions\, and to benefit from their expertise.
About Your Trainer
Linda Widdop
As \;Tech Impact&rsquo\;s \;Director of Client Solutions and Education\, Linda manages all aspects of client relations\, \;including educating \;nonprofits about technology solutions. She works with local\, regional\, \;and national partners to provide the nonprofit community with increased knowledge of technology through speaking engagements\, individual consultations\, and digital content delivery. She has worked in the computer industry for over 30 years in a variety of roles\, including manufacturing\, retail sales\, and extensive technology training experience\, and \;holds a Masters of Education degree from Arcadia University.
Other Info
Every session and demo will be recorded and available to individuals who have registered for the course. A weekly email will include access information for the recordings collected that week.
Please register with the email address where you would like to receive the access code and dial-in information for the online seminar. Also\, be sure to add \;info@idealware.org \;to your contacts to ensure meeting details do not get caught in your spam folder.
All registered participants \;are granted \;access to the recordings of each session. Participants who cannot attend any of the sessions due to scheduling conflicts will still have access to the toolkit presentation decks and handouts.
LOCATION: UID:e.1202.90625 SEQUENCE:3 DTSTAMP:20240328T235937Z URL:https://members.kynonprofits.org/eventsv2/Details/webinar-series-cyber-security-101-practical-ways-to-protect-your-nonprofit-103470?sourceTypeId=Hub END:VEVENT END:VCALENDAR