SlideShare a Scribd company logo
A Functional IT Framework
Infrastructure Development Security Data
Infrastructure
Security Data
Infrastructure Development
Data
Security
Infrastructure
Development
Security
Data
Infrastructure Development
Security Data
Infra Dev
Infra Data
Infra Sec
Sec Data
Dev Data
Dev Sec
Matching architecture to
development needs
Building security directly
into applications
Layering HW/SW tools to
fit security profile
Driving data insights into
application behavior
Building networks/
storage to support data
flow
Securing data at rest, in
use, and in motion
Cloud
Infrastructure
How are workloads
balanced between
cloud systems and
on-prem systems?
Development
Can development
operate more nimbly
by using cloud
environments?
Security
How are applications
and data secured?
Data
Does cloud help with
consolidation and
analysis of
organizational data?
Mobile
Infrastructure
How does the
company provision
and support mobile
devices?
Development
Are applications and
web portals optimized
for mobile?
Security
How are endpoint
security and data
encryption handled?
Data
Which data should
be allowed on mobile
devices?
IoT
Infrastructure
Will the network
support an explosion
in connected
devices?
Development
How can intelligent
devices communicate
with each other?
Security
Are new vendors
using best practices
for security?
Data
How does the data
from connected
devices flow into
existing datasets?
System admin
Network admin
Help desk
Web dev
App dev
Product dev
Process mgt
Compliance
User education
DBA
Data analyst
Data visualization
Infrastructure Development Security Data
IT Security
Community
Professional
Certifications
State/National
Advocacy
DevPrep
Program
Download A Functional IT Framework and
More research at comptia.org

More Related Content

What's hot

CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
anurama
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
ANIL247048
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Pistoia Alliance
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
Adam Levithan
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elasticsearch
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
CloudExpoAsia
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
 
Internet of Things - Steven Davy 2015
Internet of Things - Steven Davy 2015Internet of Things - Steven Davy 2015
Internet of Things - Steven Davy 2015
Walton Institute
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Tripwire
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
 
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempoPoner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Elasticsearch
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentationrenaglasser
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
Daliya Spasova
 

What's hot (20)

resume IT security
resume IT securityresume IT security
resume IT security
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Internet of Things - Steven Davy 2015
Internet of Things - Steven Davy 2015Internet of Things - Steven Davy 2015
Internet of Things - Steven Davy 2015
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempoPoner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
 

Viewers also liked

Digital design 8209600
Digital design 8209600Digital design 8209600
Digital design 8209600
Thuy Hang
 
Най - бедна в европейския свят
Най   - бедна в европейския святНай   - бедна в европейския свят
Най - бедна в европейския свят
realandtender
 
「審議民主」讀書會—人都會說謊:民主沒有意義嗎?
「審議民主」讀書會—人都會說謊:民主沒有意義嗎?「審議民主」讀書會—人都會說謊:民主沒有意義嗎?
「審議民主」讀書會—人都會說謊:民主沒有意義嗎?
Wan-Tzu Chang
 
SK-KD Bhs. Arab Prog. Pilihan SMA-MA
SK-KD Bhs. Arab Prog. Pilihan SMA-MASK-KD Bhs. Arab Prog. Pilihan SMA-MA
SK-KD Bhs. Arab Prog. Pilihan SMA-MA
SMA Negeri 9 KERINCI
 
STL Container Usage Tips
STL Container Usage TipsSTL Container Usage Tips
STL Container Usage Tips永泉 韩
 
20151213 參與式預算 松山區 市民場
20151213 參與式預算 松山區 市民場20151213 參與式預算 松山區 市民場
20151213 參與式預算 松山區 市民場
恩恩 許
 
Qué es un proyecto
Qué es un proyectoQué es un proyecto
Qué es un proyecto
Adrian Barrios
 
Christmas update 2016
Christmas update 2016Christmas update 2016
Christmas update 2016
Duality Blockchain Solutions
 
「審議民主」讀書會—審議民主之病徵及其原因
「審議民主」讀書會—審議民主之病徵及其原因「審議民主」讀書會—審議民主之病徵及其原因
「審議民主」讀書會—審議民主之病徵及其原因
Wan-Tzu Chang
 
Respirasi
RespirasiRespirasi
1.1 Introducción a redes - Sistemas 2016
1.1 Introducción a redes  - Sistemas 20161.1 Introducción a redes  - Sistemas 2016
1.1 Introducción a redes - Sistemas 2016
David Narváez
 
Mengenali ciri - ciri usahawan
Mengenali ciri - ciri usahawanMengenali ciri - ciri usahawan
Mengenali ciri - ciri usahawan
Syahremie Teja
 

Viewers also liked (12)

Digital design 8209600
Digital design 8209600Digital design 8209600
Digital design 8209600
 
Най - бедна в европейския свят
Най   - бедна в европейския святНай   - бедна в европейския свят
Най - бедна в европейския свят
 
「審議民主」讀書會—人都會說謊:民主沒有意義嗎?
「審議民主」讀書會—人都會說謊:民主沒有意義嗎?「審議民主」讀書會—人都會說謊:民主沒有意義嗎?
「審議民主」讀書會—人都會說謊:民主沒有意義嗎?
 
SK-KD Bhs. Arab Prog. Pilihan SMA-MA
SK-KD Bhs. Arab Prog. Pilihan SMA-MASK-KD Bhs. Arab Prog. Pilihan SMA-MA
SK-KD Bhs. Arab Prog. Pilihan SMA-MA
 
STL Container Usage Tips
STL Container Usage TipsSTL Container Usage Tips
STL Container Usage Tips
 
20151213 參與式預算 松山區 市民場
20151213 參與式預算 松山區 市民場20151213 參與式預算 松山區 市民場
20151213 參與式預算 松山區 市民場
 
Qué es un proyecto
Qué es un proyectoQué es un proyecto
Qué es un proyecto
 
Christmas update 2016
Christmas update 2016Christmas update 2016
Christmas update 2016
 
「審議民主」讀書會—審議民主之病徵及其原因
「審議民主」讀書會—審議民主之病徵及其原因「審議民主」讀書會—審議民主之病徵及其原因
「審議民主」讀書會—審議民主之病徵及其原因
 
Respirasi
RespirasiRespirasi
Respirasi
 
1.1 Introducción a redes - Sistemas 2016
1.1 Introducción a redes  - Sistemas 20161.1 Introducción a redes  - Sistemas 2016
1.1 Introducción a redes - Sistemas 2016
 
Mengenali ciri - ciri usahawan
Mengenali ciri - ciri usahawanMengenali ciri - ciri usahawan
Mengenali ciri - ciri usahawan
 

Similar to 4 Pillars of IT - a Baltimore Techies for Good webinar

Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
David J Rosenthal
 
why-choose-.net-for-your-next-iot-project.pdf
why-choose-.net-for-your-next-iot-project.pdfwhy-choose-.net-for-your-next-iot-project.pdf
why-choose-.net-for-your-next-iot-project.pdf
PixelQA
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
RICHARD AMUOK
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USIngrid Fernandez, PhD
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
Shamima Akther
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefingguestb099f64c
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
TanishqVarma1
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Denodo
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
ardexateam
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
Nextbrain
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
AFCEA International
 

Similar to 4 Pillars of IT - a Baltimore Techies for Good webinar (20)

Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
why-choose-.net-for-your-next-iot-project.pdf
why-choose-.net-for-your-next-iot-project.pdfwhy-choose-.net-for-your-next-iot-project.pdf
why-choose-.net-for-your-next-iot-project.pdf
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 

More from NetSquared

#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
NetSquared
 
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save MoneyNonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
NetSquared
 
Digital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and ProcessDigital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and Process
NetSquared
 
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden GemsNPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NetSquared
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NetSquared
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NetSquared
 
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NetSquared
 
NPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During EmergenciesNPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During Emergencies
NetSquared
 
NPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board ManagementNPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board Management
NetSquared
 
NPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator PitNPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator Pit
NetSquared
 
NPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of ColorNPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of Color
NetSquared
 
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
NetSquared
 
Social Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by AttackersSocial Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by Attackers
NetSquared
 
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and NonprofitNetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared
 
Community Isn't Cancelled — Q3 FY20 NetSquared Report
Community Isn't Cancelled —  Q3 FY20 NetSquared ReportCommunity Isn't Cancelled —  Q3 FY20 NetSquared Report
Community Isn't Cancelled — Q3 FY20 NetSquared Report
NetSquared
 
How NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference SoftwareHow NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference Software
NetSquared
 
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
NetSquared
 
Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]
NetSquared
 
NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019
NetSquared
 
Tech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping WorkshopTech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping Workshop
NetSquared
 

More from NetSquared (20)

#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
 
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save MoneyNonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
 
Digital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and ProcessDigital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and Process
 
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden GemsNPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
 
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
 
NPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During EmergenciesNPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During Emergencies
 
NPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board ManagementNPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board Management
 
NPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator PitNPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator Pit
 
NPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of ColorNPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of Color
 
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
 
Social Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by AttackersSocial Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by Attackers
 
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and NonprofitNetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
 
Community Isn't Cancelled — Q3 FY20 NetSquared Report
Community Isn't Cancelled —  Q3 FY20 NetSquared ReportCommunity Isn't Cancelled —  Q3 FY20 NetSquared Report
Community Isn't Cancelled — Q3 FY20 NetSquared Report
 
How NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference SoftwareHow NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference Software
 
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
 
Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]
 
NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019
 
Tech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping WorkshopTech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping Workshop
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 

4 Pillars of IT - a Baltimore Techies for Good webinar