SlideShare a Scribd company logo
Security and
Privacy: What
Nonprofits Need to
Know
August 6, 2019
Using ReadyTalk
Chat to ask questions
All lines are muted
If you lose your Internet connection, reconnect
using the link emailed to you.
You can find upcoming and past webinars on
the TechSoup website:
www.techsoup.org/community/events-webinars
You will receive an email with this presentation,
recording, and links
Tweet us @TechSoup and use hashtag
#tswebinars
A Global Network
Bridging Tech Solutions
and Services for Good
Where are you on the map?
Acclivity
Adobe
Alpha Software
Asana
Atlas Business Solutions
Atomic Training
Autodesk
Azavea
BetterWorld
Bitdefender
Blackbaud
Bloomerang
Box
Brocade
Bytes of Learning
Caspio
CauseVox
CDI Computer Dealers
Cisco
Citrix
CitySoft
CleverReach
ClickTime
Closerware
Comodo
Connect2Give
Dell
Dharma Merchant Services
Digital Wish
Dolby
DonorPerfect
Efficient Elements
FileMaker
GoDaddy
GrantStation
Guide By Cell
Headsets.com
Horizon DataSys
HR Solutions Partners
Huddle
Idealware
InFocus
Informz
InterConnection
Intuit
JourneyEd
Litmos
Little Green Light
Mailshell
Microsoft
Mobile Beacon
NetSuite
Nielsen
NonProfitEasy
O&O Software
Quickbooks Made Easy
Reading Eggs
ReadyTalk
Red Earth Software
Sage Software
Shopify
Simple Charity Registration
Skillsoft
Smart Business Savings
Society for Nonprofit Organizations
Sparrow Mobile
Symantec
Tableau
TechBridge
Tech Impact
Teespring
Telosa
Tint
Ultralingua
Western Digital
Zoner
Explore our Nonprofit
Tech Marketplace
For more information, please visit
www.techsoup.org/get-product-donations
"We are an all-volunteer organization with
limited professional skills. Adobe's donated
technology is helping us present our story to
the public and to lenders in the format of a
much larger organization. With Adobe, we
are able to knock off a few of the "rough
edges" so that our story is front and center
instead of our technological limitations.
Thank you, Adobe!”
- Richard de Koster
Constitution Island Association, Inc
The Symantec Security and
Antivirus Donation Program
For more information, please visit
techsoup.org/symantec-catalog
● Symantec Endpoint Protection.
Admin Fee $6
● Symantec Endpoint Protection,
Small Business Edition. Admin Fee
$4
● Symantec Norton Small Business
● Symantec Norton Security Deluxe
TechSoup Solutions
for Nonprofits
Presenters
Michael Standard
Senior Corporate Counsel
Symantec
Kirsten McMullen
Global Privacy Compliance Manager
Nicole Jones
Dir. of Communications
TechSoup
Assisting with chat:
Zerreen Kazi, TechSoup
Kirsten McMullen
Global Privacy
Compliance Manager
Zerreen Kazi
Communications Project
Coordinator, TechSoup
Nicole Jones
Dir. of Communications,
TechSoup
Michael Standard
Senior Corporate Counsel,
Symantec
Privacy & Data Security
Do’s, Don’ts and Why it Matters
Michael Standard
August 6, 2019
Senior Corporate Counsel – Privacy and Data Security
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 2
Why it Matters: Losing Brand Trust
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps
Save the Children:
International charity was hacked twice by
malicious scammers in 2017.
Criminals created false invoices and
related documents.
The organization was tricked into
transferring nearly $1 million USD to a
fake business entity in Japan.
The funds could not be recovered.
3
Source: https://www.insurancebusinessmag.com/us/news/non-profits/nonprofits-are-a-target-for-data-breach-165039.aspx
https://www.zdnet.com/article/save-the-children-foundation-duped-by-hackers-into-paying-out-1-million/
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps (continued)
MacEwan University:
A “spoofed” email appeared to come from a
vendor, requesting the school’s accounts
receivable team reroute payments for
ongoing construction to a new National Bank
of Canada account.
A supporting letter attached to the email
appeared to have been signed by the
company’s chief financial officer.
The university made three payments to the
new account, totaling more than 11.8M USD.
The email was a fraud, which was not
discovered until 2 months later.
4
Source: https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps
Health and Human Services v. Affinity Health:
Affinity Health accidentally disclosed the
protected health information of over 300,000
individuals when it failed to erase the data on
copier hard drives when it returned the copiers
at the conclusion of the lease.
Affinity paid a $1,215,780 fine to HHS.
There is no report of costs for individual claims.
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps (continued)
FTC v. Aaron’s et al.:
Aaron’s franchisees and several other “rent-to-own”
retailers and a computer software company used
computer programs to spy on consumers who rented
computers from those companies.
The program captured screenshots of confidential and
personal information, logging their computer
keystrokes, and in some cases taking webcam pictures
of people in their homes, all without notice to, or
consent from, the consumers.
This cost Aaron’s at least $25 million to settle with the
CA attorney general and they entered into a 20 year
consent decree with the FTC; not to mention extensive
legal fees.
Source: https://www.ajc.com/business/aaron-settles-spying-complaint-with-ftc/N4zLeQHVhQnDnzysFFjFEK/
6
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Poll Time!
How would you rate the maturity level of your privacy and security
programs?
• Documented and regularly reviewed
• Documented but not reviewed or tested
• Informal with some documentation
• Ad hoc
7
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 8
Security vs Privacy
You can have security without privacy, but you can’t have privacy without security.
Privacy is how an organization processes Personal Data to comply with laws, regulations and perhaps most
importantly, customer expectations. Security is the technical methods used to protect that data.
Privacy
Notice/Consent
Limiting data collected
How used
When shared
How stored
When archived
When destroyed
Security
Availability
Keeping information
safe
Protection from loss
or theft
Access
Confidentiality
Integrity
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
• Safeguarding of data
• Protecting data from erasure, theft,
unauthorized access and unauthorized
changes
• Stopping bad guys – internal and external
Security
Security vs. Privacy
Privacy
• Safeguarding of identity
• Setting the rules for when, how and why
personal data is processed, and by whom
• Handling personal information
appropriately & responsibly
9
• Appropriately limit the disclosure of
and access to information
(confidentiality)
• Maintain the accuracy and
comprehensiveness of the data
(integrity)
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Personal Data means any information related to any identified or identifiable natural person and, soon to
come, data related to a household.
Data Subjects
What is “Personal Data”?
Personal Data Examples Sensitive Personal Data Examples
• Employees
• Clients/Customers
• Patients
• Donors
• Research Subjects
• Volunteers
• Names
• Address
• Phone Number
• Email
• IP Address
• Advertising Identifier
• Cookie ID
• Internal Identifiers
• Social Security Number
• Driver’s License Number
• Credit Card Information
• Health Information
10
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
*
Fair Information Practice Principles (FIPPs)
• Transparency - ensures no secret data collection; provides information about the
purpose and use of personal data to allow users to make an informed choice
• Choice - gives individuals a choice as to how their information will be used
• Data Minimization - only collect that personal data that is necessary for the stated
purpose
• Information Review and Correction - allows individuals the right to review and
correct personal information
• Information Protection - requires organizations to protect the quality and integrity of
personal information
• Accountability - holds organizations accountable for complying with FIPPs
11
Example: PIPEDA – Schedule 1: https://laws-lois.justice.gc.ca/eng/acts/P-8.6/page-11.html#h-417659
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Top Three Threats to Nonprofits
Phishing
Malware
Website attacks
Social engineering
Lack of training/
awareness
Improper use of assets
(cloud, email)
Poor security practices
(e.g. simple passwords,
password re-use)
Vendor security
Limited visibility and
control
Subcontractor exposure
Contractual protections/
Limits of liability
Bad ActorsOrganizational Vendors
12
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Avoid the most common exploitations
Spoofing
Social Engineering, Phishing, Spoofing
Phishing Malware
• Emails appearing to
come from a friend,
vendor or boss
• Attempts to gain access
to systems by tricking
people
• Can happen via phone,
email and in-person
• Computer viruses that
demand payment
• Often uses fear and
intimidation
• Ransomware
13
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
14
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
1
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
15
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
1
2
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
16
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
1
2
3
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
17
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
Assess your vendors and hold them
accountable. Use privacy and security
questionnaires
1
2
3
4
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
18
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
Assess your vendors and hold them
accountable. Use privacy and security
questionnaires
Implement Privacy by Design basics
(internal questionnaires, privacy
assessments, etc.)
1
2
3
4
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
19
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
Assess your vendors and hold them
accountable. Use privacy and security
questionnaires
Implement Privacy by Design basics
(internal questionnaires, privacy
assessments, etc.)
Account for Employee Data
1
2
3
4
5
6
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
20
Ignore your risks
1
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
21
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
1
2
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
22
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
Use default passwords that come with
your devices; always create new complex
passwords
1
2
3
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
23
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
Use default passwords that come with
your devices; always create new complex
passwords
Ignore your own privacy policy. This is your
promise to your customers; if you can’t
abide by your policy, change it (on a going
forward basis!)
1
2
3
4
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
24
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
Use default passwords that come with
your devices; always create new complex
passwords
Ignore your own privacy policy. This is your
promise to your customers; if you can’t
abide by your policy, change it (on a going
forward basis!)
Ignore Employee Data
1
2
3
4
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Implementing the Do’s and Don’ts: Establish a
Privacy Program
1. Map and know your data. What do you have and where is it?
2. Identify threats and legal obligations
3. Establish privacy and security policies and controls
• Implement an effective Privacy by Design Program
• Customize your privacy policy to your organization (write what you do, not
what you “hope to” do…)
• Vendor Due Diligence
• Information Security - design, implement, verify
4. Establish compliance capabilities (incl audit & verification)
• Who will actually implement your program and how
5. Awareness and training
25
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Assessment of Personal Data Processing and Security
Simple Privacy/Security Questionnaire
26
• What personal data do you collect? Why?
• Is it consistent with our privacy policy?
• Are you transparent with how you are using the data?
• Who needs access to it?
• Internal employees
• Vendors
• Where will it be stored?
• How will we protect it? Consider - On-premise, cloud, encryption, transfer, back-up, etc
• How long do we need it? And, why?
• Who is responsible for the data lifecycle and destruction?
• Who is the responsible manager/department?
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Know Your Vendors and Service Providers
Vendor Privacy/Security Questionnaire
27
• Who is the Vendor?
• Type of entity and, if applicable, where incorporated;
• Funding (public/private) and ownership;
• Where is the Vendor located and where will they process your Personal
Data?
• What types of Personal Data will they process and how?
• Are they insured against cyber-crimes and/or security breaches?
• What Security Certifications do they have? Third party audit reports?
• Obtain their written security policies and practices
• Period Re-assessments, Audits and Annual Questionnaires
• Breach History
• Identify sub-contractors / sub-processors
• Evaluate contractual promises, indemnification and limits of liability
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Privacy Laws – Can Anyone be 100% Compliant?
• GDPR, PIPEDA, LGPD (Brazil), etc.
• HIPAA, GLB, Telecom Act, etc.
• CCPA and the emerging U.S. patchwork of laws
• What’s next?
28
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
What Questions To Test Your Nonprofit?
29
• When testing for privacy rights:
Be the ultimate privacy champion user and test your technology
• Where do I find the privacy literature? Links, please.
• Can a non-lawyer understand my privacy notice?
• Without reading the privacy notice, would I be surprised at how my data is being used?
• When signing up for emails is it clear that’s what is happening?
• Can I correct my information if it’s wrong?
• When testing for security:
• Who has access to data and how do they get it?
• How do we protect ourselves from bad actors?
• What tools do we use to protect our data?
Thank You!
…Questions?
Share and Learn
Chat in one thing that you learned in today’s
webinar.
Please complete our post-event survey. Your
feedback really helps.
Follow TechSoup on social media
(FB, Instagram, Twitter, LinkedIn)
Visit the TechSoup Blog at blog.techsoup.org
Join us for our
upcoming webinars.
8/15
Public Good App House: Voting Apps
Demo
8/27
Raise More Money By Automating the
Right Message at the Right Time
Archived Webinars:
www.techsoup.org/community-events
The Symantec Security and
Antivirus Donation Program
For more information, please visit
techsoup.org/symantec-catalog
● Symantec Endpoint Protection.
Admin Fee $6
● Symantec Endpoint Protection,
Small Business Edition. Admin Fee
$4
● Symantec Norton Small Business
● Symantec Norton Security Deluxe
Thank you to our
webinar sponsor!
Please complete the post-event survey that will
pop up once you close this window.

More Related Content

What's hot

Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
Maran Corporate Risk Associates, Inc.
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
CSCJournals
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
Martin Jordan
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Authentic8
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Marco Essomba
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
Transcendent Group
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
Gary Chambers
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
Symantec
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
Felipe Prado
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
GFI Software
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
Taranggg11
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
Clearswift
 

What's hot (20)

Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 

Similar to Security and Privacy: What Nonprofits Need to Know

The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
TriState Technology
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
Meg Weber
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
ZitaAdlTrk
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
Carlos Roberto Paula Soares
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Business Days
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
TrustArc
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Agile Financial Technologies
 

Similar to Security and Privacy: What Nonprofits Need to Know (20)

The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 

More from TechSoup

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
TechSoup
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
TechSoup
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
TechSoup
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
TechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
TechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
TechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
TechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
TechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
TechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
TechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
TechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
TechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
TechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
TechSoup
 

More from TechSoup (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Security and Privacy: What Nonprofits Need to Know

  • 1. Security and Privacy: What Nonprofits Need to Know August 6, 2019
  • 2. Using ReadyTalk Chat to ask questions All lines are muted If you lose your Internet connection, reconnect using the link emailed to you. You can find upcoming and past webinars on the TechSoup website: www.techsoup.org/community/events-webinars You will receive an email with this presentation, recording, and links Tweet us @TechSoup and use hashtag #tswebinars
  • 3. A Global Network Bridging Tech Solutions and Services for Good Where are you on the map?
  • 4. Acclivity Adobe Alpha Software Asana Atlas Business Solutions Atomic Training Autodesk Azavea BetterWorld Bitdefender Blackbaud Bloomerang Box Brocade Bytes of Learning Caspio CauseVox CDI Computer Dealers Cisco Citrix CitySoft CleverReach ClickTime Closerware Comodo Connect2Give Dell Dharma Merchant Services Digital Wish Dolby DonorPerfect Efficient Elements FileMaker GoDaddy GrantStation Guide By Cell Headsets.com Horizon DataSys HR Solutions Partners Huddle Idealware InFocus Informz InterConnection Intuit JourneyEd Litmos Little Green Light Mailshell Microsoft Mobile Beacon NetSuite Nielsen NonProfitEasy O&O Software Quickbooks Made Easy Reading Eggs ReadyTalk Red Earth Software Sage Software Shopify Simple Charity Registration Skillsoft Smart Business Savings Society for Nonprofit Organizations Sparrow Mobile Symantec Tableau TechBridge Tech Impact Teespring Telosa Tint Ultralingua Western Digital Zoner
  • 5. Explore our Nonprofit Tech Marketplace For more information, please visit www.techsoup.org/get-product-donations "We are an all-volunteer organization with limited professional skills. Adobe's donated technology is helping us present our story to the public and to lenders in the format of a much larger organization. With Adobe, we are able to knock off a few of the "rough edges" so that our story is front and center instead of our technological limitations. Thank you, Adobe!” - Richard de Koster Constitution Island Association, Inc
  • 6. The Symantec Security and Antivirus Donation Program For more information, please visit techsoup.org/symantec-catalog ● Symantec Endpoint Protection. Admin Fee $6 ● Symantec Endpoint Protection, Small Business Edition. Admin Fee $4 ● Symantec Norton Small Business ● Symantec Norton Security Deluxe
  • 8. Presenters Michael Standard Senior Corporate Counsel Symantec Kirsten McMullen Global Privacy Compliance Manager Nicole Jones Dir. of Communications TechSoup Assisting with chat: Zerreen Kazi, TechSoup Kirsten McMullen Global Privacy Compliance Manager Zerreen Kazi Communications Project Coordinator, TechSoup Nicole Jones Dir. of Communications, TechSoup Michael Standard Senior Corporate Counsel, Symantec
  • 9. Privacy & Data Security Do’s, Don’ts and Why it Matters Michael Standard August 6, 2019 Senior Corporate Counsel – Privacy and Data Security
  • 10. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 2 Why it Matters: Losing Brand Trust
  • 11. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps Save the Children: International charity was hacked twice by malicious scammers in 2017. Criminals created false invoices and related documents. The organization was tricked into transferring nearly $1 million USD to a fake business entity in Japan. The funds could not be recovered. 3 Source: https://www.insurancebusinessmag.com/us/news/non-profits/nonprofits-are-a-target-for-data-breach-165039.aspx https://www.zdnet.com/article/save-the-children-foundation-duped-by-hackers-into-paying-out-1-million/
  • 12. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps (continued) MacEwan University: A “spoofed” email appeared to come from a vendor, requesting the school’s accounts receivable team reroute payments for ongoing construction to a new National Bank of Canada account. A supporting letter attached to the email appeared to have been signed by the company’s chief financial officer. The university made three payments to the new account, totaling more than 11.8M USD. The email was a fraud, which was not discovered until 2 months later. 4 Source: https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html
  • 13. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps Health and Human Services v. Affinity Health: Affinity Health accidentally disclosed the protected health information of over 300,000 individuals when it failed to erase the data on copier hard drives when it returned the copiers at the conclusion of the lease. Affinity paid a $1,215,780 fine to HHS. There is no report of costs for individual claims. 5
  • 14. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps (continued) FTC v. Aaron’s et al.: Aaron’s franchisees and several other “rent-to-own” retailers and a computer software company used computer programs to spy on consumers who rented computers from those companies. The program captured screenshots of confidential and personal information, logging their computer keystrokes, and in some cases taking webcam pictures of people in their homes, all without notice to, or consent from, the consumers. This cost Aaron’s at least $25 million to settle with the CA attorney general and they entered into a 20 year consent decree with the FTC; not to mention extensive legal fees. Source: https://www.ajc.com/business/aaron-settles-spying-complaint-with-ftc/N4zLeQHVhQnDnzysFFjFEK/ 6
  • 15. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Poll Time! How would you rate the maturity level of your privacy and security programs? • Documented and regularly reviewed • Documented but not reviewed or tested • Informal with some documentation • Ad hoc 7
  • 16. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 8 Security vs Privacy You can have security without privacy, but you can’t have privacy without security. Privacy is how an organization processes Personal Data to comply with laws, regulations and perhaps most importantly, customer expectations. Security is the technical methods used to protect that data. Privacy Notice/Consent Limiting data collected How used When shared How stored When archived When destroyed Security Availability Keeping information safe Protection from loss or theft Access Confidentiality Integrity
  • 17. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only • Safeguarding of data • Protecting data from erasure, theft, unauthorized access and unauthorized changes • Stopping bad guys – internal and external Security Security vs. Privacy Privacy • Safeguarding of identity • Setting the rules for when, how and why personal data is processed, and by whom • Handling personal information appropriately & responsibly 9 • Appropriately limit the disclosure of and access to information (confidentiality) • Maintain the accuracy and comprehensiveness of the data (integrity)
  • 18. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Personal Data means any information related to any identified or identifiable natural person and, soon to come, data related to a household. Data Subjects What is “Personal Data”? Personal Data Examples Sensitive Personal Data Examples • Employees • Clients/Customers • Patients • Donors • Research Subjects • Volunteers • Names • Address • Phone Number • Email • IP Address • Advertising Identifier • Cookie ID • Internal Identifiers • Social Security Number • Driver’s License Number • Credit Card Information • Health Information 10
  • 19. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only * Fair Information Practice Principles (FIPPs) • Transparency - ensures no secret data collection; provides information about the purpose and use of personal data to allow users to make an informed choice • Choice - gives individuals a choice as to how their information will be used • Data Minimization - only collect that personal data that is necessary for the stated purpose • Information Review and Correction - allows individuals the right to review and correct personal information • Information Protection - requires organizations to protect the quality and integrity of personal information • Accountability - holds organizations accountable for complying with FIPPs 11 Example: PIPEDA – Schedule 1: https://laws-lois.justice.gc.ca/eng/acts/P-8.6/page-11.html#h-417659
  • 20. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Top Three Threats to Nonprofits Phishing Malware Website attacks Social engineering Lack of training/ awareness Improper use of assets (cloud, email) Poor security practices (e.g. simple passwords, password re-use) Vendor security Limited visibility and control Subcontractor exposure Contractual protections/ Limits of liability Bad ActorsOrganizational Vendors 12
  • 21. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Avoid the most common exploitations Spoofing Social Engineering, Phishing, Spoofing Phishing Malware • Emails appearing to come from a friend, vendor or boss • Attempts to gain access to systems by tricking people • Can happen via phone, email and in-person • Computer viruses that demand payment • Often uses fear and intimidation • Ransomware 13
  • 22. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 14 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand 1
  • 23. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 15 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security 1 2
  • 24. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 16 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible 1 2 3
  • 25. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 17 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible Assess your vendors and hold them accountable. Use privacy and security questionnaires 1 2 3 4
  • 26. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 18 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible Assess your vendors and hold them accountable. Use privacy and security questionnaires Implement Privacy by Design basics (internal questionnaires, privacy assessments, etc.) 1 2 3 4 5
  • 27. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 19 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible Assess your vendors and hold them accountable. Use privacy and security questionnaires Implement Privacy by Design basics (internal questionnaires, privacy assessments, etc.) Account for Employee Data 1 2 3 4 5 6
  • 28. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 20 Ignore your risks 1
  • 29. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 21 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) 1 2
  • 30. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 22 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) Use default passwords that come with your devices; always create new complex passwords 1 2 3
  • 31. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 23 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) Use default passwords that come with your devices; always create new complex passwords Ignore your own privacy policy. This is your promise to your customers; if you can’t abide by your policy, change it (on a going forward basis!) 1 2 3 4
  • 32. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 24 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) Use default passwords that come with your devices; always create new complex passwords Ignore your own privacy policy. This is your promise to your customers; if you can’t abide by your policy, change it (on a going forward basis!) Ignore Employee Data 1 2 3 4 5
  • 33. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Implementing the Do’s and Don’ts: Establish a Privacy Program 1. Map and know your data. What do you have and where is it? 2. Identify threats and legal obligations 3. Establish privacy and security policies and controls • Implement an effective Privacy by Design Program • Customize your privacy policy to your organization (write what you do, not what you “hope to” do…) • Vendor Due Diligence • Information Security - design, implement, verify 4. Establish compliance capabilities (incl audit & verification) • Who will actually implement your program and how 5. Awareness and training 25
  • 34. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Assessment of Personal Data Processing and Security Simple Privacy/Security Questionnaire 26 • What personal data do you collect? Why? • Is it consistent with our privacy policy? • Are you transparent with how you are using the data? • Who needs access to it? • Internal employees • Vendors • Where will it be stored? • How will we protect it? Consider - On-premise, cloud, encryption, transfer, back-up, etc • How long do we need it? And, why? • Who is responsible for the data lifecycle and destruction? • Who is the responsible manager/department?
  • 35. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Know Your Vendors and Service Providers Vendor Privacy/Security Questionnaire 27 • Who is the Vendor? • Type of entity and, if applicable, where incorporated; • Funding (public/private) and ownership; • Where is the Vendor located and where will they process your Personal Data? • What types of Personal Data will they process and how? • Are they insured against cyber-crimes and/or security breaches? • What Security Certifications do they have? Third party audit reports? • Obtain their written security policies and practices • Period Re-assessments, Audits and Annual Questionnaires • Breach History • Identify sub-contractors / sub-processors • Evaluate contractual promises, indemnification and limits of liability
  • 36. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Privacy Laws – Can Anyone be 100% Compliant? • GDPR, PIPEDA, LGPD (Brazil), etc. • HIPAA, GLB, Telecom Act, etc. • CCPA and the emerging U.S. patchwork of laws • What’s next? 28
  • 37. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only What Questions To Test Your Nonprofit? 29 • When testing for privacy rights: Be the ultimate privacy champion user and test your technology • Where do I find the privacy literature? Links, please. • Can a non-lawyer understand my privacy notice? • Without reading the privacy notice, would I be surprised at how my data is being used? • When signing up for emails is it clear that’s what is happening? • Can I correct my information if it’s wrong? • When testing for security: • Who has access to data and how do they get it? • How do we protect ourselves from bad actors? • What tools do we use to protect our data?
  • 39. Share and Learn Chat in one thing that you learned in today’s webinar. Please complete our post-event survey. Your feedback really helps. Follow TechSoup on social media (FB, Instagram, Twitter, LinkedIn) Visit the TechSoup Blog at blog.techsoup.org
  • 40. Join us for our upcoming webinars. 8/15 Public Good App House: Voting Apps Demo 8/27 Raise More Money By Automating the Right Message at the Right Time Archived Webinars: www.techsoup.org/community-events
  • 41.
  • 42. The Symantec Security and Antivirus Donation Program For more information, please visit techsoup.org/symantec-catalog ● Symantec Endpoint Protection. Admin Fee $6 ● Symantec Endpoint Protection, Small Business Edition. Admin Fee $4 ● Symantec Norton Small Business ● Symantec Norton Security Deluxe
  • 43. Thank you to our webinar sponsor! Please complete the post-event survey that will pop up once you close this window.