As part of our continuing webinar series we explore the phenomenon of BYOD and discuss various approaches for creating an effective BYOD policy for your organization.
BYOD stands for Bring Your Own Device. It refers to staff bringing their own devices to work, instead of working on the computer provided by the organization.
BYOD can have its benefits and challenges. It also raises a lot of questions.
- Does your nonprofit have a BYOD policy?
- Does your organization help staff configure their personal devices to use for work?
- How does BYOD affect your organization’s data?
In this webinar Johan Hammerstrom, COO, discussed how nonprofits can prepare for BYOD, leverage the strengths and minimize the challenges.
More than 3 million unintended pregnancies occur in the US each year, with 47% of women using no contraception and 53% using contraception inconsistently or incorrectly. Common early signs of pregnancy include missed or late periods, breast tenderness, nausea, vomiting, fatigue, and mood changes. A pregnancy test can confirm pregnancy about two weeks after ovulation by detecting the hormone hCG in urine or blood. For an unexpected positive result, a woman has several options - continuing the pregnancy and parenting or placing for adoption, abortion, or foster care placement until she is able to parent. Seeking counsel and support is important for making the best decision.
The document summarizes the layout and design elements of a magazine cover. Key points include:
1) The masthead is in a large, bold font and bright colors to draw attention as the iconic logo.
2) A "flash" uses an informal tone to highlight news stories with catchy text.
3) The main image takes up most space and anchors the cover line, appealing to the target audience of 16-28 year olds.
4) Sections inside are clearly labeled so readers can easily find content areas like news, reviews, and features.
The document discusses the use of cesium formate brine as a drilling fluid for drilling deep high pressure, high temperature (HPHT) gas wells over the past 10 years. Some key points:
1) Cesium formate brine is an effective drill-in and completion fluid for HPHT gas wells that is non-toxic, compatible with reservoirs, and less corrosive than other brines.
2) Case studies show that cesium formate brine has been used successfully as a combined drill-in and completion fluid for open hole completions in over 40 HPHT gas fields worldwide.
3) Its first use as a combined drill-in and completion fluid was in 2001 in
02/15/12 - UNITED STATES CONGRESSIONAL COMPLAINTVogelDenise
02/15/12 - UNITED STATES PRESIDENT BARACK HUSSEIN OBAMA II/HIS ADMINISTRATION and CONSPIRATORS/CO-CONSPIRATORS – RETALIATORY/CRIMINAL PRACTICES AGAINST VOGEL DENISE NEWSOME FOR REPORTING CRIMINAL/CIVIL VIOLATIONS TO THE PUBLIC and REQUESTING THAT PRESIDENT BARACK OBAMA STEP DOWN BY FRIDAY, FEBRUARY 10, 2012 - - “COMPLAINT; STATUS REQUEST and NOTICE OF COURT FILING” - - ATTEMPT BY THE HAMILTON COUNTY (OHIO) COURT OF COMMON PLEAS TO ENCROACH UPON THE POWERS/JURISDICTION OF THE UNITED STATES CONGRESS
Garretson Resolution Group appears to be FRONTING Law Firm for United States President Barack Obama and Legal Counsel/Advisor (Baker Donelson Bearman Caldwell & Berkowitz) which has submitted a SLAPP Complaint to OneWebHosting.com in efforts of PREVENTING the PUBLIC/WORLD from knowing of its and President Barack Obama's ROLE in CONSPIRACIES leveled against Vogel Denise Newsome in EXPOSING the TRUTH behind the 911 DOMESTIC TERRORIST ATTACKS, COLLAPSE OF THE WORLD ECONOMY, EMPLOYMENT violations and other crimes of United States Government Officials. Information that United States President Barack Obama, The Garretson Resolution Group, Baker Donelson Bearman Caldwell & Berkowitz, and United States Congress, etc. do NOT want the PUBLIC/WORLD to see. Information of PUBLIC Interest!
Antonin Scalia is an Associate Justice of the US Supreme Court, appointed in 1986. He is known as one of the most conservative justices and advocates for textualism and originalism. Scalia was born in New Jersey and attended Georgetown University and Harvard Law School. He has served in various legal roles, including as a law professor and judge, before being nominated to the Supreme Court by President Reagan.
BYOD stands for Bring Your Own Device. It refers to staff bringing their own devices to work, instead of working on the computer provided by the organization.
BYOD can have its benefits and challenges. It also raises a lot of questions.
- Does your nonprofit have a BYOD policy?
- Does your organization help staff configure their personal devices to use for work?
- How does BYOD affect your organization’s data?
In this webinar Johan Hammerstrom, COO, discussed how nonprofits can prepare for BYOD, leverage the strengths and minimize the challenges.
More than 3 million unintended pregnancies occur in the US each year, with 47% of women using no contraception and 53% using contraception inconsistently or incorrectly. Common early signs of pregnancy include missed or late periods, breast tenderness, nausea, vomiting, fatigue, and mood changes. A pregnancy test can confirm pregnancy about two weeks after ovulation by detecting the hormone hCG in urine or blood. For an unexpected positive result, a woman has several options - continuing the pregnancy and parenting or placing for adoption, abortion, or foster care placement until she is able to parent. Seeking counsel and support is important for making the best decision.
The document summarizes the layout and design elements of a magazine cover. Key points include:
1) The masthead is in a large, bold font and bright colors to draw attention as the iconic logo.
2) A "flash" uses an informal tone to highlight news stories with catchy text.
3) The main image takes up most space and anchors the cover line, appealing to the target audience of 16-28 year olds.
4) Sections inside are clearly labeled so readers can easily find content areas like news, reviews, and features.
The document discusses the use of cesium formate brine as a drilling fluid for drilling deep high pressure, high temperature (HPHT) gas wells over the past 10 years. Some key points:
1) Cesium formate brine is an effective drill-in and completion fluid for HPHT gas wells that is non-toxic, compatible with reservoirs, and less corrosive than other brines.
2) Case studies show that cesium formate brine has been used successfully as a combined drill-in and completion fluid for open hole completions in over 40 HPHT gas fields worldwide.
3) Its first use as a combined drill-in and completion fluid was in 2001 in
02/15/12 - UNITED STATES CONGRESSIONAL COMPLAINTVogelDenise
02/15/12 - UNITED STATES PRESIDENT BARACK HUSSEIN OBAMA II/HIS ADMINISTRATION and CONSPIRATORS/CO-CONSPIRATORS – RETALIATORY/CRIMINAL PRACTICES AGAINST VOGEL DENISE NEWSOME FOR REPORTING CRIMINAL/CIVIL VIOLATIONS TO THE PUBLIC and REQUESTING THAT PRESIDENT BARACK OBAMA STEP DOWN BY FRIDAY, FEBRUARY 10, 2012 - - “COMPLAINT; STATUS REQUEST and NOTICE OF COURT FILING” - - ATTEMPT BY THE HAMILTON COUNTY (OHIO) COURT OF COMMON PLEAS TO ENCROACH UPON THE POWERS/JURISDICTION OF THE UNITED STATES CONGRESS
Garretson Resolution Group appears to be FRONTING Law Firm for United States President Barack Obama and Legal Counsel/Advisor (Baker Donelson Bearman Caldwell & Berkowitz) which has submitted a SLAPP Complaint to OneWebHosting.com in efforts of PREVENTING the PUBLIC/WORLD from knowing of its and President Barack Obama's ROLE in CONSPIRACIES leveled against Vogel Denise Newsome in EXPOSING the TRUTH behind the 911 DOMESTIC TERRORIST ATTACKS, COLLAPSE OF THE WORLD ECONOMY, EMPLOYMENT violations and other crimes of United States Government Officials. Information that United States President Barack Obama, The Garretson Resolution Group, Baker Donelson Bearman Caldwell & Berkowitz, and United States Congress, etc. do NOT want the PUBLIC/WORLD to see. Information of PUBLIC Interest!
Antonin Scalia is an Associate Justice of the US Supreme Court, appointed in 1986. He is known as one of the most conservative justices and advocates for textualism and originalism. Scalia was born in New Jersey and attended Georgetown University and Harvard Law School. He has served in various legal roles, including as a law professor and judge, before being nominated to the Supreme Court by President Reagan.
The document summarizes an experiment to determine the best insulating material. The experiment tested aluminum foil, plastic wrapping paper, newspaper, and a woolen sock wrapped around identical glass bottles filled with hot water. Temperatures were recorded over 20 minutes. The conclusion was that the woolen sock was the best insulator, maintaining temperatures longest, while the hypothesis that silver foil would be best was wrong. The experiment taught that different materials insulate heat differently and the right material depends on the temperature.
The district is facing potential turnover from their assistant principal, Raymond Tyler. Tyler originally planned to stay 5 years but is now considering leaving for a position in Chicago where his wife teaches. This has strained his relationship with the principal. Key issues include Tyler never fully integrating into the community as expected, a lack of career growth opportunities, and signs the principal did not view Tyler as a good fit. Potential solutions center around finding an acceptable outcome for Tyler while planning for stability in the assistant principal role going forward.
This magazine pitch document outlines plans for a new lifestyle magazine called "My Magazine" targeting readers in Sheffield, England. The magazine will feature local stories and events with a red and grey color scheme. Advertising and sponsorship opportunities are also described to generate revenue.
The document outlines a course on report writing, including objectives to prepare students to write assignments in report form and organize report sections, as well as assignments to collect report parts and write an analysis report. Additionally, it discusses related topics like types of reports and communication skills, and lists lecture topics that will cover report sections, writing style, and online searching.
The document outlines a company that helps clients build wealth through real estate investing, business ownership, and a rewards program. It discusses the company's vision, mission, and 4 pillars of wealth building, as well as the rewards program which allows clients to earn points for referrals that can be redeemed for merchandise, travel, or cash back. The document encourages the reader to join the company's wealth building efforts.
Rochelle Smith's photo essay concludes with images taken at Elyria City Hall. The historic building dates back to the early 20th century and features architectural details representative of that time period. Various shots showcase the interior and exterior of City Hall, providing a visual documentation of the structure for readers.
This document provides frequently asked questions (FAQs) for both buyers and sellers of timeshares. For buyers, it addresses why they should purchase a resale timeshare from a broker rather than privately, and how to ensure the timeshare is free of any liens. For sellers, it explains why listing with a broker that markets the timeshare is beneficial, that upfront fees should be avoided, how pricing is determined, that the standard commission is 30%, and that transactions are handled securely through an escrow company.
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenaryReno Filla
This is a supporting presentation to explain how scoring currently works (visualizing the official equations in a rearranged way) and what the effect of Dutch proposal 8.1.4 will be
This document provides information about Intelligent Source Document Management software called DoxCycle that is designed for Canadian tax professionals. It discusses how DoxCycle allows users to scan, organize, and import source documents like T-Slips and receipts for use in tax preparation software. It provides tips on scanning documents and integrating DoxCycle with the ProFile tax software. The document promotes DoxCycle and provides quotes from users who praise its ability to streamline document management workflows for tax preparation.
Samuel Alito has had a long legal career, serving as a U.S. Attorney, federal appeals court judge, and currently as an Associate Justice of the U.S. Supreme Court. He was born in New Jersey and educated at Princeton and Yale Law School. President George W. Bush nominated Alito to the Supreme Court in 2005 to replace Sandra Day O'Connor, and he was confirmed by the Senate and has served on the Court since 2006, being known as a conservative jurist.
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...VogelDenise
CONNECTING-THE-DOTS:
http://www.slideshare.net/VogelDenise/072314-hcmc-notice-of-nonattendance-at-072514-ali-hearing
http://www.slideshare.net/VogelDenise/061214-notice-of-nonattendance-at-061314-hearing-due-to-the-concerns-of-threats-on-defendant-denise-newsomes-life
http://www.slideshare.net/VogelDenise/070714-obamafraudgate-connection-to-the-annalouiseinn-eviction-scandal-36698826
WHEN YOU DON'T STOP CRIMINALS LIKE BAKER DONELSON BEARMAN CALDWELL & BERKOWITZ and their CLIENTS/CONSPIRATORS/CO-CONSPIRATORS, they CONTINUE in their CRIMINAL WAYS:
http://www.slideshare.net/VogelDenise/122613-pleading
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
This document provides information about an upcoming HDI Capital Area event. It includes details about the event such as date, location, speakers, agenda, and registration information. It also lists the chapter officers and provides announcements about upcoming HDI events, training opportunities, and programs. The main presentation will be on a simple approach to security and how to assess security risks and implement basic protections.
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
This document discusses I.T. strategy, risk management, and governance. It begins with an introduction of Steve Howse, the president of Millington & Associates, and his background. The document then discusses what I.T. strategy and governance entail and why they are important. It introduces the "20 questions" framework as a tool to assess I.T. strategy, risk, and governance. The questions are categorized into strategic issues, internal control issues, and risk issues. The document dives deeper into examples of risks and what organizations can do to address risks such as dedicating board members to I.T. committees and ensuring business continuity plans are tested.
Johan Hammerstrom, Chief Operating Officer, and Matthew Eshleman, Chief Technology Officer, discussed what they shared and learned at the 2013 Nonprofit Technology Conference (NTC). They shared the highlights of presentations they did, and other aha moments from sessions they attended.
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
My slide deck used in People Management Association of the Philippines' (PMAP) Data Privacy Act Forum held last 18 SEP 2017 at Ace Hotel & Suites, Pasig City.
Information Security is NOT an IT IssueEvan Francen
This document summarizes a presentation about information security. The presentation argues that information security is not just an IT issue and should be viewed as a business issue. It explains that IT-centric security can overlook important administrative and physical controls. The presentation recommends establishing an information security committee with the right stakeholders to develop policies and oversee a security program. It also describes security services offered by FRSecure to help organizations assess and improve their information security.
This webinar covered the importance of security awareness education for employees. It discussed how human error is the primary security risk for most companies and how training employees can help reduce that risk. The webinar provided an overview of the key elements of a security awareness program, including content, delivery methods, and reinforcement strategies. It also reviewed the benefits of implementing a program, such as a potential seven-fold return on investment, and the typical costs involved, which range from $10-14 per user per year. The presentation recommended that security awareness education be one part of a company's overall security strategy.
The document summarizes an experiment to determine the best insulating material. The experiment tested aluminum foil, plastic wrapping paper, newspaper, and a woolen sock wrapped around identical glass bottles filled with hot water. Temperatures were recorded over 20 minutes. The conclusion was that the woolen sock was the best insulator, maintaining temperatures longest, while the hypothesis that silver foil would be best was wrong. The experiment taught that different materials insulate heat differently and the right material depends on the temperature.
The district is facing potential turnover from their assistant principal, Raymond Tyler. Tyler originally planned to stay 5 years but is now considering leaving for a position in Chicago where his wife teaches. This has strained his relationship with the principal. Key issues include Tyler never fully integrating into the community as expected, a lack of career growth opportunities, and signs the principal did not view Tyler as a good fit. Potential solutions center around finding an acceptable outcome for Tyler while planning for stability in the assistant principal role going forward.
This magazine pitch document outlines plans for a new lifestyle magazine called "My Magazine" targeting readers in Sheffield, England. The magazine will feature local stories and events with a red and grey color scheme. Advertising and sponsorship opportunities are also described to generate revenue.
The document outlines a course on report writing, including objectives to prepare students to write assignments in report form and organize report sections, as well as assignments to collect report parts and write an analysis report. Additionally, it discusses related topics like types of reports and communication skills, and lists lecture topics that will cover report sections, writing style, and online searching.
The document outlines a company that helps clients build wealth through real estate investing, business ownership, and a rewards program. It discusses the company's vision, mission, and 4 pillars of wealth building, as well as the rewards program which allows clients to earn points for referrals that can be redeemed for merchandise, travel, or cash back. The document encourages the reader to join the company's wealth building efforts.
Rochelle Smith's photo essay concludes with images taken at Elyria City Hall. The historic building dates back to the early 20th century and features architectural details representative of that time period. Various shots showcase the interior and exterior of City Hall, providing a visual documentation of the structure for readers.
This document provides frequently asked questions (FAQs) for both buyers and sellers of timeshares. For buyers, it addresses why they should purchase a resale timeshare from a broker rather than privately, and how to ensure the timeshare is free of any liens. For sellers, it explains why listing with a broker that markets the timeshare is beneficial, that upfront fees should be avoided, how pricing is determined, that the standard commission is 30%, and that transactions are handled securely through an escrow company.
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenaryReno Filla
This is a supporting presentation to explain how scoring currently works (visualizing the official equations in a rearranged way) and what the effect of Dutch proposal 8.1.4 will be
This document provides information about Intelligent Source Document Management software called DoxCycle that is designed for Canadian tax professionals. It discusses how DoxCycle allows users to scan, organize, and import source documents like T-Slips and receipts for use in tax preparation software. It provides tips on scanning documents and integrating DoxCycle with the ProFile tax software. The document promotes DoxCycle and provides quotes from users who praise its ability to streamline document management workflows for tax preparation.
Samuel Alito has had a long legal career, serving as a U.S. Attorney, federal appeals court judge, and currently as an Associate Justice of the U.S. Supreme Court. He was born in New Jersey and educated at Princeton and Yale Law School. President George W. Bush nominated Alito to the Supreme Court in 2005 to replace Sandra Day O'Connor, and he was confirmed by the Senate and has served on the Court since 2006, being known as a conservative jurist.
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...VogelDenise
CONNECTING-THE-DOTS:
http://www.slideshare.net/VogelDenise/072314-hcmc-notice-of-nonattendance-at-072514-ali-hearing
http://www.slideshare.net/VogelDenise/061214-notice-of-nonattendance-at-061314-hearing-due-to-the-concerns-of-threats-on-defendant-denise-newsomes-life
http://www.slideshare.net/VogelDenise/070714-obamafraudgate-connection-to-the-annalouiseinn-eviction-scandal-36698826
WHEN YOU DON'T STOP CRIMINALS LIKE BAKER DONELSON BEARMAN CALDWELL & BERKOWITZ and their CLIENTS/CONSPIRATORS/CO-CONSPIRATORS, they CONTINUE in their CRIMINAL WAYS:
http://www.slideshare.net/VogelDenise/122613-pleading
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
This document provides information about an upcoming HDI Capital Area event. It includes details about the event such as date, location, speakers, agenda, and registration information. It also lists the chapter officers and provides announcements about upcoming HDI events, training opportunities, and programs. The main presentation will be on a simple approach to security and how to assess security risks and implement basic protections.
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
This document discusses I.T. strategy, risk management, and governance. It begins with an introduction of Steve Howse, the president of Millington & Associates, and his background. The document then discusses what I.T. strategy and governance entail and why they are important. It introduces the "20 questions" framework as a tool to assess I.T. strategy, risk, and governance. The questions are categorized into strategic issues, internal control issues, and risk issues. The document dives deeper into examples of risks and what organizations can do to address risks such as dedicating board members to I.T. committees and ensuring business continuity plans are tested.
Johan Hammerstrom, Chief Operating Officer, and Matthew Eshleman, Chief Technology Officer, discussed what they shared and learned at the 2013 Nonprofit Technology Conference (NTC). They shared the highlights of presentations they did, and other aha moments from sessions they attended.
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
My slide deck used in People Management Association of the Philippines' (PMAP) Data Privacy Act Forum held last 18 SEP 2017 at Ace Hotel & Suites, Pasig City.
Information Security is NOT an IT IssueEvan Francen
This document summarizes a presentation about information security. The presentation argues that information security is not just an IT issue and should be viewed as a business issue. It explains that IT-centric security can overlook important administrative and physical controls. The presentation recommends establishing an information security committee with the right stakeholders to develop policies and oversee a security program. It also describes security services offered by FRSecure to help organizations assess and improve their information security.
This webinar covered the importance of security awareness education for employees. It discussed how human error is the primary security risk for most companies and how training employees can help reduce that risk. The webinar provided an overview of the key elements of a security awareness program, including content, delivery methods, and reinforcement strategies. It also reviewed the benefits of implementing a program, such as a potential seven-fold return on investment, and the typical costs involved, which range from $10-14 per user per year. The presentation recommended that security awareness education be one part of a company's overall security strategy.
This document discusses cyber risk and how organizations can address the challenges of managing cyber risk. It provides an overview of cyber risk and outlines key steps organizations can take to prepare for, protect against, monitor for, and respond to cyber incidents. These include developing a cyber risk governance structure, integrating cyber risk management practices, and aligning security strategies with risk assessments. The role of insurance in addressing cyber risk is also examined.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
This document provides recommendations for small businesses to improve cyber security. It discusses how (1) changing the conversation with end users to be more empathetic and focus on usability can improve security, (2) implementing multi-factor authentication and centralized identity management can replace passwords for stronger access control, and (3) leveraging trusted cloud solutions allows businesses to benefit from economies of scale for security compliance. It also recommends (4) making endpoints as minimal as possible by storing all data in the cloud and browser, and (5) recentralizing content to eliminate silos and enforce consistent policies. The document emphasizes that security should not get in the way of productivity and must be seamless for users.
Securing your digital world cybersecurity for sb esSonny Hashmi
This document provides recommendations for small businesses to improve cyber security. It discusses how (1) changing the conversation with end users to be more empathetic and focus on usability can improve security, (2) implementing multi-factor authentication and centralized identity management can replace passwords for stronger access control, and (3) leveraging trusted cloud solutions allows businesses to benefit from economies of scale for security compliance. It also recommends (4) making endpoints as minimal as possible by storing all data in the cloud and browser, and (5) recentralizing content to eliminate silos and enforce consistent policies. The document emphasizes that security should not get in the way of productivity and usability.
The document discusses standards and information sharing in local government. It explains that standards are important for effective collaboration and the sharing of services and data. When standards are applied consistently, it allows systems and information to interconnect and resources to be shared across organizations. The document advocates for leadership, change management, and governance to promote standardization and maximize the benefits of information sharing in the public sector.
Delivered at Trend Micro's Executive briefing events Sydney and Melbourne 5-6 June 2017 on Australia's new Mandatory Data Breach Notification legislation. YoutubeVideo available at https://youtu.be/j5nmY916H7k
The document provides an overview of designing and developing an effective security awareness and training program. It defines security awareness training, discusses why such programs are important, and outlines best practices for doing it correctly. The presentation agenda includes defining security awareness training, discussing its importance, and presenting Mittal Technologies' security awareness training solution. The document then provides details on developing effective security awareness training, including establishing goals and success criteria, designing the program, developing training content at different levels, and tracking results.
Using events to drive deeper engagement - MemberWise Purple Vision
This document discusses how events can use mobile apps to drive deeper member engagement. It provides reasons to invest in an event app, including allowing members to see the program, network with others attending, and start connecting before the event. While networking tools and customizable programs often work well, features like maps and gamification don't always. The document outlines benefits for organizers, such as an interactive home feed, push notifications, and attendee data. It also notes potential pitfalls and next steps organizations can take to learn more about implementing a successful event app.
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
The document provides an overview of Trend Micro's 2012 field marketing program. It discusses distributing marketing efforts across thought leadership, market awareness, lead generation, and relationship building. It outlines tactics for each area including events, content creation, social media, and demand generation programs. Measurement metrics are also proposed to track the success of the various initiatives.
As a follow up to the May webinar on IT Planning & Budgeting, we organized a joint webinar with Nonprofit Roundtable to share case studies and best practices. While everyone agrees that technology is an essential resource, organizations often underestimate technology costs and overlook critical conversations with their IT team/partners.
In this webinar Johan Hammerstrom, COO at Community IT Innovators, talked about the essential elements of an annual IT budget, IT considerations in a project budget, and key personnel in building the budget and managing it.
We also had a guest speaker, Norwin Herrera, IS Manager at La Clinica del Pueblo who shared his organization’s experience around IT Planning & Budgeting.
Is Your Direct Selling Technology Strategy Relevant?Kris Shenk
As marketing and relationship companies at their core, direct selling (DS) based organizations have lagged behind modern enterprise technology solutions. This deck will give you the top 10 ways to make sure the technology strategy for your company is keeping up and staying relevant.
Similar to Community IT Webinar - Build your own BYOD Policy (20)
The document summarizes a webinar that discussed collaboration tools Slack, Microsoft Teams, and Zoom. It provided an overview of the features and use cases of each tool, as well as their advantages. The webinar aimed to help organizations choose the right collaboration platform by comparing Slack, Teams, and Zoom and discussing real-world examples of how nonprofits can leverage these tools. It concluded with an invitation to an upcoming webinar on cybersecurity and thanked attendees.
Join CTO and Nonprofit Cybersecurity expert Matthew Eshleman as he walks through the third annual Community IT Nonprofit Cybersecurity Incident Report.
This report looks at the different types of attacks that occur at small and mid-sized nonprofit organizations. Is your nonprofit prepared?
Matt also shares advice on security improvements that provide protection against the most common attacks. Learn the role of leadership in placing a value on cybersecurity preparedness for your nonprofit and the long term planning that should accompany your immediate assessment of your security risk.
Matt touches on vendor hacks from 2020 including Blackbaud and SolarWinds and discusses steps your nonprofit should take to understand your risk level.
Learn about real cyberattacks on nonprofit organizations and how they responded to these attempted hacks. Matt gives you the tools you need to protect your organization and staff from cybercrimes.
Many of these tips you can put in place quickly and train your staff on immediately.
Download the full report or view here: https://communityit.com/2021-nonprofit-cybersecurity-incident-download/
This document summarizes a cybersecurity training webinar for nonprofits. The webinar covered the current cybersecurity landscape including persistent brute force attacks and sophisticated spearphishing targeting organizations. It discussed new security tools available and common contemporary attack examples like phishing, malware, and social engineering. The presentation emphasized the importance of the human firewall through cybersecurity awareness training and individual steps like enabling multi-factor authentication and using a password manager. It provided resources for moving forward with both individual cybersecurity practices and formalizing organizational controls.
Are you utilizing SharePoint best practices? Are your staff frustrated by your protocols, or are they whizzing along collaborating with ease and speed? Do you have any files shared in SharePoint that need extra security?
Please join our resident expert Steve Longenecker in this video to walk through what SharePoint can do for your nonprofit.
If your nonprofit is already using Office365 in the cloud for email, then you should be leveraging SharePoint, the platform’s capabilities for document sharing, a component of Office 365 also available to nonprofits through donated licenses from Microsoft.
Are you using SharePoint as a file storage library?
Is your file sharing set up so that your staff are using it with ease?
Do you have some confusion or frustration with sharing files and collaborating using SharePoint?
Learn highlights from Community IT Innovators’ user trainings provided in SharePoint implementations.
Steve has directed many SharePoint implementations and trainings with our clients. This new and updated video incorporates material from recent trainings.
We know our nonprofits will be called on over the next few years to provide more support to our communities than ever before. Put your best foot forward now with tech projects that position your organization to deliver on your mission at this critical time.
As with all our webinars, this presentation is appropriate for an audience of varied IT experience.
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Community IT Innovators
Making the move to a platform like Microsoft Dynamics or Salesforce can fuel your nonprofit’s digital transformation. These platforms allow you to manage and engage with constituents in new ways, create more unified experiences for them, and transform how your organization works.
But do you know where your organization should start when choosing a technology platform?
Kyle Haines, Partner at Build Consulting, shares some of the questions your organization should answer before making significant investments in a platform like Microsoft Dynamics or Salesforce.
In this webinar, he covers
What is Microsoft Dynamics? How does it compare to Salesforce?
How do you analyze your business needs and stakeholder needs when considering a new platform or upgrade that will have a broad impact on your entire organization?
How will a new platform change your organization? Are you ready to capitalize on the potential for change?
Additionally, he shares his experience on what makes platform selections and implementations successful, and how to position your organization to take advantage of the opportunities a new platform brings.
We know our nonprofits will be called on over the next few years to provide more support to our communities than ever before. Put your best foot forward now with tech projects that position your organization to deliver on your mission at this critical time.
Kyle spends over 15 minutes on Q&A after the webinar, discussing real-life questions from your nonprofit colleagues on the advantages to consider when moving forward with either the Microsoft Dynamics or Salesforce platforms.
As with all our webinars, this presentation is appropriate for an audience of varied IT experience.
This webinar presents a best-practices framework on assessing your risks, using the National Institute of Standards and Technology (NIST) privacy risk assessment methodology.
Matt Eshleman, Community IT Innovators’ CTO and resident cybersecurity expert, will teach you how to
Understand the cybersecurity threats facing nonprofits
perform a basic assessment using our NIST survey tool
understand the recommendations
budget for risk prevention
engage nonprofit executives in supporting proactive cybersecurity
create an actionable road map with next steps for your organization
Over the last few months, many organizations began to use personal computers and devices for work, quickly set up cloud file sharing platforms, put the entire remote office on Slack or Teams, or moved to using Zoom for conference calls.
Even if we did our best to implement thoughtful security protocols and train new users on new tools, circumstances have made measured approaches to cybersecurity difficult. Your practices are probably out of sync with your security needs.
You know your nonprofit organization is at risk.
But do you know how to manage cybersecurity risk?
Now is the time to better manage risks by reviewing your cybersecurity stance and (re)training your users on security best practices.
In this webinar, Build Consulting expert Peter Mirus explains how to build a technology roadmap that will guide your organization to a successful future.
Peter draws on years of experience consulting with nonprofits on technology projects to give you practical steps to implement quickly.
Don’t miss this chance to learn how your organization can create a technology roadmap that is right for you.
As with all our webinars, this presentation is appropriate for an audience of varied IT experience.
Join three Community IT Innovators experts for an “ask the experts” free-wheeling discussion–a nonprofit technology trends roundtable 2020 on trends we expect to deliver new impact this year.
In this video we talk about some tools and techniques that can be used to protect your login credentials and digital identity including good password practices, adding Multi Factor Authentication (MFA), and monitoring to alert when a compromised account is found. Don’t assume your organization won’t be targeted – everyone is a target. As with all our webinars, this presentation is appropriate for an audience of varied IT and security experience.
Peter Mirus from Build Consulting uses examples from the nonprofit and public sectors to show how good data quality can have big fundraising and program impacts. He explores the role of good data at your organization, provides tips on how to get everyone at your organization on the same page, and gives ideas on how to prioritize data for quality improvement. This webinar was presented by Community IT Innovators in November 2019.
Join CTO and resident security expert, Matt Eshleman, for this webinar which will cover the basics a security plan should include, giving updates and a synthesis of our recent security webinars on understanding risks, considering cyber insurance, security incidence response best practices, and creating a multi-layered security plan that actively includes your staff and executives.
Peter Mirus at Build Consulting walks us through the five essential aspects of a good information strategy and provides real-life examples of organizations that overcame challenges and were able to change their strategy and improve their fundraising and mission effectiveness.
Microsoft has announced that they will no longer be providing security updates for Server 2008 and Windows 7 systems as of January 2020. This means that organizations have 6 months to implement a plan to address the increasing security vulnerability that these systems represent to your networks and data.
In this webinar, Community IT Innovators' CTO Matt Eshleman covers three things you need to know to update your security and plan for this development.
Join Peter Mirus, a Build Consulting expert on technology project implementations at nonprofits, who will offer insights from his years of experience as a consultant, and answer participant questions on driving successful technology projects.
What you'll learn:
What does it mean for a project to be a "success?"
What are the key elements your organization needs to have in place?
What are the secrets of success that fail to get enough attention?
How can you help your nonprofit be in the 50% of tech projects that succeed?
Pat Sprehe and Steve Longenecker provide insights into how to evaluate a potential MSP provider, how to engage with vendors, best practices and checklists for your daily and monthly interactions, annual planning with your outsourced IT manager, and how to plan and practice for emergency communications with your provider if your accounts are hacked or you suspect an attack. We cover any outsourced IT function, including databases or security management as stand alone services, as well as managed services generally.
Join CTO Matthew Eshleman as he walks through the inaugural Nonprofit Cybersecurity Incident Report from Community IT Innovators. This report looks at the different types of attacks that occur at small and mid-sized organizations. He also shares advice on security improvements that provide protection against the most common attacks.
Learn the role of leadership in placing a value on cybersecurity preparedness for your nonprofit and the long term planning that should accompany your immediate assessment of your security risk.
For the video of the presentation or to subscribe to future webinars: https://www.communityit.com/connect-with-us/webinars/
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
Join Community IT Innovators' partners Build Consulting's development, fundraising, operations, and CRM experts, for an “Ask the Experts” February 2019 webinar. We offer ideas and answer participant questions on how to take your donor data management to the next level.
Join us for one of our most popular webinar topics - our executive team discussing the technology trends that grew over 2018 and what they expect in nonprofit technology in 2019. We will touch on IT security at nonprofits, up and coming technologies to watch, innovations to embrace, and continuing technology basics that nonprofits can upgrade in 2019. Of course we will touch on IT security at nonprofits, which continues to be an essential part of any #nptech strategy.
Join a panel of Build Consulting experts Peter Mirus, David Deal, and Kyle Haines, for Q&A on the nonprofit software selection process and how technology decisions must come last to give your organization a greater hope of successful implementation.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Community IT Webinar - Build your own BYOD Policy
1. June 26, 2014 presented by…
Johan Hammerstrom
Community IT Innovators
Webinar Series
Build Your Own
BYOD Policy
2. Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking. You may just miss the best part of
the presentation
• Webinar PowerPoint & Recording
PowerPoint and recording links will be shared after the
webinar
3. About Community IT
Community IT Innovators partners with nonprofits to help them solve
their strategic & day-to-day IT challenges.
Strategic
Proactive approach so you can make IT decisions that support your
mission and grow with you
Collaborative
Team of over 40 staff who empower you to make informed IT choices
Invested
We are committed to supporting your mission, and take care of your IT
network as if it were our own
Nonprofit focus
Worked with over 900 nonprofits since 1993
19. • Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
20. • Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
21. • Email
• Files
Data
•Office 365, Google Apps
•Box, DropBox, OneDriveServices
• Outlook, mobile mail
• Word, Excel, PowerPointApps
• Windows, OS X, iOSOS
• PC, Tablet, MobileHardware
32. 1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security measures
– Loss of full control of device
33. 2. Legal Risks
a) Organization
– Lack of certainty in case law and legislation
b) Personal
– Personal device could be confiscated
– Personal blurs into the corporate
34. 3. Financial Risks
a) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become entangled
– Mobile Device Management (MDM) can be expensive
b) Personal
– Stipend may not cover full cost…or any at all
– Can be responsible for own support
35. Build your own BYOD
1. Inventory your data
• How sensitive is it?
• Compliance regulations?
2. Identify work roles
• Access to data
• Remote work requirements
• Flexibility requirements
36. Build your own BYOD
1. Identify Benefits
• Prioritize for your Organization
• Establish your strategy
2. Identify Risks
• Risk = Impact * Likelihood
3. Summarize
• Consider your options
• Summarize in a written policy
37. Program Staff Development Executive
Sensitive Data
Medical Records
Donor Contacts Yes Yes
Financial System Yes
HR Records
Less Sensitive
Email Yes Yes Yes
Grant Proposals Yes Yes
Program Mgmt Yes Yes
38. Program Staff Development Executive
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
39. Program Staff Development Executive
Benefits
Reduce costs Yes
Work Flexibility Yes Yes
Availability Yes Yes
User adoption Yes
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
BYOD ltd BYOD CYOD
Policy
provide small stipend
& limited access to
information
limited access to
information from
home
fully managed
access to info
44. Upcoming Webinar
Thursday July 24
4:00 – 5:00 PM EST
SharePoint
Taking Another Look
Matthew Eshleman & Steve Longenecker
45. After the webinar
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
• Missed anything?
Link to slides & recording will be emailed to you.
Editor's Notes
Poll: For mobile devices, what does your organization provide?
Poll: For laptops and desktops, what does your organization provide?