SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Security and
Privacy: What
Nonprofits Need to
Know
August 6, 2019
Using ReadyTalk
Chat to ask questions
All lines are muted
If you lose your Internet connection, reconnect
using the link emailed to you.
You can find upcoming and past webinars on
the TechSoup website:
www.techsoup.org/community/events-webinars
You will receive an email with this presentation,
recording, and links
Tweet us @TechSoup and use hashtag
#tswebinars
A Global Network
Bridging Tech Solutions
and Services for Good
Where are you on the map?
Acclivity
Adobe
Alpha Software
Asana
Atlas Business Solutions
Atomic Training
Autodesk
Azavea
BetterWorld
Bitdefender
Blackbaud
Bloomerang
Box
Brocade
Bytes of Learning
Caspio
CauseVox
CDI Computer Dealers
Cisco
Citrix
CitySoft
CleverReach
ClickTime
Closerware
Comodo
Connect2Give
Dell
Dharma Merchant Services
Digital Wish
Dolby
DonorPerfect
Efficient Elements
FileMaker
GoDaddy
GrantStation
Guide By Cell
Headsets.com
Horizon DataSys
HR Solutions Partners
Huddle
Idealware
InFocus
Informz
InterConnection
Intuit
JourneyEd
Litmos
Little Green Light
Mailshell
Microsoft
Mobile Beacon
NetSuite
Nielsen
NonProfitEasy
O&O Software
Quickbooks Made Easy
Reading Eggs
ReadyTalk
Red Earth Software
Sage Software
Shopify
Simple Charity Registration
Skillsoft
Smart Business Savings
Society for Nonprofit Organizations
Sparrow Mobile
Symantec
Tableau
TechBridge
Tech Impact
Teespring
Telosa
Tint
Ultralingua
Western Digital
Zoner
Explore our Nonprofit
Tech Marketplace
For more information, please visit
www.techsoup.org/get-product-donations
"We are an all-volunteer organization with
limited professional skills. Adobe's donated
technology is helping us present our story to
the public and to lenders in the format of a
much larger organization. With Adobe, we
are able to knock off a few of the "rough
edges" so that our story is front and center
instead of our technological limitations.
Thank you, Adobe!”
- Richard de Koster
Constitution Island Association, Inc
The Symantec Security and
Antivirus Donation Program
For more information, please visit
techsoup.org/symantec-catalog
● Symantec Endpoint Protection.
Admin Fee $6
● Symantec Endpoint Protection,
Small Business Edition. Admin Fee
$4
● Symantec Norton Small Business
● Symantec Norton Security Deluxe
TechSoup Solutions
for Nonprofits
Presenters
Michael Standard
Senior Corporate Counsel
Symantec
Kirsten McMullen
Global Privacy Compliance Manager
Nicole Jones
Dir. of Communications
TechSoup
Assisting with chat:
Zerreen Kazi, TechSoup
Kirsten McMullen
Global Privacy
Compliance Manager
Zerreen Kazi
Communications Project
Coordinator, TechSoup
Nicole Jones
Dir. of Communications,
TechSoup
Michael Standard
Senior Corporate Counsel,
Symantec
Privacy & Data Security
Do’s, Don’ts and Why it Matters
Michael Standard
August 6, 2019
Senior Corporate Counsel – Privacy and Data Security
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 2
Why it Matters: Losing Brand Trust
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps
Save the Children:
International charity was hacked twice by
malicious scammers in 2017.
Criminals created false invoices and
related documents.
The organization was tricked into
transferring nearly $1 million USD to a
fake business entity in Japan.
The funds could not be recovered.
3
Source: https://www.insurancebusinessmag.com/us/news/non-profits/nonprofits-are-a-target-for-data-breach-165039.aspx
https://www.zdnet.com/article/save-the-children-foundation-duped-by-hackers-into-paying-out-1-million/
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps (continued)
MacEwan University:
A “spoofed” email appeared to come from a
vendor, requesting the school’s accounts
receivable team reroute payments for
ongoing construction to a new National Bank
of Canada account.
A supporting letter attached to the email
appeared to have been signed by the
company’s chief financial officer.
The university made three payments to the
new account, totaling more than 11.8M USD.
The email was a fraud, which was not
discovered until 2 months later.
4
Source: https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps
Health and Human Services v. Affinity Health:
Affinity Health accidentally disclosed the
protected health information of over 300,000
individuals when it failed to erase the data on
copier hard drives when it returned the copiers
at the conclusion of the lease.
Affinity paid a $1,215,780 fine to HHS.
There is no report of costs for individual claims.
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Security & Privacy Missteps (continued)
FTC v. Aaron’s et al.:
Aaron’s franchisees and several other “rent-to-own”
retailers and a computer software company used
computer programs to spy on consumers who rented
computers from those companies.
The program captured screenshots of confidential and
personal information, logging their computer
keystrokes, and in some cases taking webcam pictures
of people in their homes, all without notice to, or
consent from, the consumers.
This cost Aaron’s at least $25 million to settle with the
CA attorney general and they entered into a 20 year
consent decree with the FTC; not to mention extensive
legal fees.
Source: https://www.ajc.com/business/aaron-settles-spying-complaint-with-ftc/N4zLeQHVhQnDnzysFFjFEK/
6
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Poll Time!
How would you rate the maturity level of your privacy and security
programs?
• Documented and regularly reviewed
• Documented but not reviewed or tested
• Informal with some documentation
• Ad hoc
7
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 8
Security vs Privacy
You can have security without privacy, but you can’t have privacy without security.
Privacy is how an organization processes Personal Data to comply with laws, regulations and perhaps most
importantly, customer expectations. Security is the technical methods used to protect that data.
Privacy
Notice/Consent
Limiting data collected
How used
When shared
How stored
When archived
When destroyed
Security
Availability
Keeping information
safe
Protection from loss
or theft
Access
Confidentiality
Integrity
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
• Safeguarding of data
• Protecting data from erasure, theft,
unauthorized access and unauthorized
changes
• Stopping bad guys – internal and external
Security
Security vs. Privacy
Privacy
• Safeguarding of identity
• Setting the rules for when, how and why
personal data is processed, and by whom
• Handling personal information
appropriately & responsibly
9
• Appropriately limit the disclosure of
and access to information
(confidentiality)
• Maintain the accuracy and
comprehensiveness of the data
(integrity)
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Personal Data means any information related to any identified or identifiable natural person and, soon to
come, data related to a household.
Data Subjects
What is “Personal Data”?
Personal Data Examples Sensitive Personal Data Examples
• Employees
• Clients/Customers
• Patients
• Donors
• Research Subjects
• Volunteers
• Names
• Address
• Phone Number
• Email
• IP Address
• Advertising Identifier
• Cookie ID
• Internal Identifiers
• Social Security Number
• Driver’s License Number
• Credit Card Information
• Health Information
10
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
*
Fair Information Practice Principles (FIPPs)
• Transparency - ensures no secret data collection; provides information about the
purpose and use of personal data to allow users to make an informed choice
• Choice - gives individuals a choice as to how their information will be used
• Data Minimization - only collect that personal data that is necessary for the stated
purpose
• Information Review and Correction - allows individuals the right to review and
correct personal information
• Information Protection - requires organizations to protect the quality and integrity of
personal information
• Accountability - holds organizations accountable for complying with FIPPs
11
Example: PIPEDA – Schedule 1: https://laws-lois.justice.gc.ca/eng/acts/P-8.6/page-11.html#h-417659
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Top Three Threats to Nonprofits
Phishing
Malware
Website attacks
Social engineering
Lack of training/
awareness
Improper use of assets
(cloud, email)
Poor security practices
(e.g. simple passwords,
password re-use)
Vendor security
Limited visibility and
control
Subcontractor exposure
Contractual protections/
Limits of liability
Bad ActorsOrganizational Vendors
12
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Avoid the most common exploitations
Spoofing
Social Engineering, Phishing, Spoofing
Phishing Malware
• Emails appearing to
come from a friend,
vendor or boss
• Attempts to gain access
to systems by tricking
people
• Can happen via phone,
email and in-person
• Computer viruses that
demand payment
• Often uses fear and
intimidation
• Ransomware
13
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
14
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
1
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
15
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
1
2
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
16
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
1
2
3
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
17
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
Assess your vendors and hold them
accountable. Use privacy and security
questionnaires
1
2
3
4
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
18
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
Assess your vendors and hold them
accountable. Use privacy and security
questionnaires
Implement Privacy by Design basics
(internal questionnaires, privacy
assessments, etc.)
1
2
3
4
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DO
Do’s and Don’ts to Counter Your Risks
19
Assess your risks: Assess your exposure; the
likelihood of harm; worst-case damages to
your organization and brand
Train your team on privacy and security
Implement information security best
practices: e.g. Prohibit password sharing
and re-use, access authentication and
limits, encrypt where possible
Assess your vendors and hold them
accountable. Use privacy and security
questionnaires
Implement Privacy by Design basics
(internal questionnaires, privacy
assessments, etc.)
Account for Employee Data
1
2
3
4
5
6
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
20
Ignore your risks
1
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
21
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
1
2
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
22
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
Use default passwords that come with
your devices; always create new complex
passwords
1
2
3
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
23
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
Use default passwords that come with
your devices; always create new complex
passwords
Ignore your own privacy policy. This is your
promise to your customers; if you can’t
abide by your policy, change it (on a going
forward basis!)
1
2
3
4
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
DON’T
Do’s and Don’ts to Counter Your Risks
24
Ignore your risks
Keep more data than you need for longer
than you need (i.e. avoid the “we keep
everything forever “in case we need it”
syndrome”)
Use default passwords that come with
your devices; always create new complex
passwords
Ignore your own privacy policy. This is your
promise to your customers; if you can’t
abide by your policy, change it (on a going
forward basis!)
Ignore Employee Data
1
2
3
4
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Implementing the Do’s and Don’ts: Establish a
Privacy Program
1. Map and know your data. What do you have and where is it?
2. Identify threats and legal obligations
3. Establish privacy and security policies and controls
• Implement an effective Privacy by Design Program
• Customize your privacy policy to your organization (write what you do, not
what you “hope to” do…)
• Vendor Due Diligence
• Information Security - design, implement, verify
4. Establish compliance capabilities (incl audit & verification)
• Who will actually implement your program and how
5. Awareness and training
25
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Assessment of Personal Data Processing and Security
Simple Privacy/Security Questionnaire
26
• What personal data do you collect? Why?
• Is it consistent with our privacy policy?
• Are you transparent with how you are using the data?
• Who needs access to it?
• Internal employees
• Vendors
• Where will it be stored?
• How will we protect it? Consider - On-premise, cloud, encryption, transfer, back-up, etc
• How long do we need it? And, why?
• Who is responsible for the data lifecycle and destruction?
• Who is the responsible manager/department?
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Know Your Vendors and Service Providers
Vendor Privacy/Security Questionnaire
27
• Who is the Vendor?
• Type of entity and, if applicable, where incorporated;
• Funding (public/private) and ownership;
• Where is the Vendor located and where will they process your Personal
Data?
• What types of Personal Data will they process and how?
• Are they insured against cyber-crimes and/or security breaches?
• What Security Certifications do they have? Third party audit reports?
• Obtain their written security policies and practices
• Period Re-assessments, Audits and Annual Questionnaires
• Breach History
• Identify sub-contractors / sub-processors
• Evaluate contractual promises, indemnification and limits of liability
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Privacy Laws – Can Anyone be 100% Compliant?
• GDPR, PIPEDA, LGPD (Brazil), etc.
• HIPAA, GLB, Telecom Act, etc.
• CCPA and the emerging U.S. patchwork of laws
• What’s next?
28
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
What Questions To Test Your Nonprofit?
29
• When testing for privacy rights:
Be the ultimate privacy champion user and test your technology
• Where do I find the privacy literature? Links, please.
• Can a non-lawyer understand my privacy notice?
• Without reading the privacy notice, would I be surprised at how my data is being used?
• When signing up for emails is it clear that’s what is happening?
• Can I correct my information if it’s wrong?
• When testing for security:
• Who has access to data and how do they get it?
• How do we protect ourselves from bad actors?
• What tools do we use to protect our data?
Thank You!
…Questions?
Share and Learn
Chat in one thing that you learned in today’s
webinar.
Please complete our post-event survey. Your
feedback really helps.
Follow TechSoup on social media
(FB, Instagram, Twitter, LinkedIn)
Visit the TechSoup Blog at blog.techsoup.org
Join us for our
upcoming webinars.
8/15
Public Good App House: Voting Apps
Demo
8/27
Raise More Money By Automating the
Right Message at the Right Time
Archived Webinars:
www.techsoup.org/community-events
The Symantec Security and
Antivirus Donation Program
For more information, please visit
techsoup.org/symantec-catalog
● Symantec Endpoint Protection.
Admin Fee $6
● Symantec Endpoint Protection,
Small Business Edition. Admin Fee
$4
● Symantec Norton Small Business
● Symantec Norton Security Deluxe
Thank you to our
webinar sponsor!
Please complete the post-event survey that will
pop up once you close this window.

Contenu connexe

Tendances

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013Martin Jordan
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Gary Chambers
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 

Tendances (20)

Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 

Similaire à Security and Privacy: What Nonprofits Need to Know

The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application TriState Technology
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 

Similaire à Security and Privacy: What Nonprofits Need to Know (20)

The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
CDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdfCDP_Engagement_Team_Training_BRADESCO.pdf
CDP_Engagement_Team_Training_BRADESCO.pdf
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 

Plus de TechSoup

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)TechSoup
 
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...TechSoup
 
Enhance Your Funding Success Through Partnerships.pdf
Enhance Your Funding Success Through Partnerships.pdfEnhance Your Funding Success Through Partnerships.pdf
Enhance Your Funding Success Through Partnerships.pdfTechSoup
 
Is Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdf
Is Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdfIs Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdf
Is Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdfTechSoup
 
Ask the Exerts - AI Ethics, Principles and Governance.pdf
Ask the Exerts - AI Ethics, Principles and Governance.pdfAsk the Exerts - AI Ethics, Principles and Governance.pdf
Ask the Exerts - AI Ethics, Principles and Governance.pdfTechSoup
 

Plus de TechSoup (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
 
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
 
Enhance Your Funding Success Through Partnerships.pdf
Enhance Your Funding Success Through Partnerships.pdfEnhance Your Funding Success Through Partnerships.pdf
Enhance Your Funding Success Through Partnerships.pdf
 
Is Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdf
Is Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdfIs Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdf
Is Your Tech Up to Date? Find Out If You Need To Upgrade With Our Experts!.pdf
 
Ask the Exerts - AI Ethics, Principles and Governance.pdf
Ask the Exerts - AI Ethics, Principles and Governance.pdfAsk the Exerts - AI Ethics, Principles and Governance.pdf
Ask the Exerts - AI Ethics, Principles and Governance.pdf
 

Dernier

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Dernier (20)

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 

Security and Privacy: What Nonprofits Need to Know

  • 1. Security and Privacy: What Nonprofits Need to Know August 6, 2019
  • 2. Using ReadyTalk Chat to ask questions All lines are muted If you lose your Internet connection, reconnect using the link emailed to you. You can find upcoming and past webinars on the TechSoup website: www.techsoup.org/community/events-webinars You will receive an email with this presentation, recording, and links Tweet us @TechSoup and use hashtag #tswebinars
  • 3. A Global Network Bridging Tech Solutions and Services for Good Where are you on the map?
  • 4. Acclivity Adobe Alpha Software Asana Atlas Business Solutions Atomic Training Autodesk Azavea BetterWorld Bitdefender Blackbaud Bloomerang Box Brocade Bytes of Learning Caspio CauseVox CDI Computer Dealers Cisco Citrix CitySoft CleverReach ClickTime Closerware Comodo Connect2Give Dell Dharma Merchant Services Digital Wish Dolby DonorPerfect Efficient Elements FileMaker GoDaddy GrantStation Guide By Cell Headsets.com Horizon DataSys HR Solutions Partners Huddle Idealware InFocus Informz InterConnection Intuit JourneyEd Litmos Little Green Light Mailshell Microsoft Mobile Beacon NetSuite Nielsen NonProfitEasy O&O Software Quickbooks Made Easy Reading Eggs ReadyTalk Red Earth Software Sage Software Shopify Simple Charity Registration Skillsoft Smart Business Savings Society for Nonprofit Organizations Sparrow Mobile Symantec Tableau TechBridge Tech Impact Teespring Telosa Tint Ultralingua Western Digital Zoner
  • 5. Explore our Nonprofit Tech Marketplace For more information, please visit www.techsoup.org/get-product-donations "We are an all-volunteer organization with limited professional skills. Adobe's donated technology is helping us present our story to the public and to lenders in the format of a much larger organization. With Adobe, we are able to knock off a few of the "rough edges" so that our story is front and center instead of our technological limitations. Thank you, Adobe!” - Richard de Koster Constitution Island Association, Inc
  • 6. The Symantec Security and Antivirus Donation Program For more information, please visit techsoup.org/symantec-catalog ● Symantec Endpoint Protection. Admin Fee $6 ● Symantec Endpoint Protection, Small Business Edition. Admin Fee $4 ● Symantec Norton Small Business ● Symantec Norton Security Deluxe
  • 8. Presenters Michael Standard Senior Corporate Counsel Symantec Kirsten McMullen Global Privacy Compliance Manager Nicole Jones Dir. of Communications TechSoup Assisting with chat: Zerreen Kazi, TechSoup Kirsten McMullen Global Privacy Compliance Manager Zerreen Kazi Communications Project Coordinator, TechSoup Nicole Jones Dir. of Communications, TechSoup Michael Standard Senior Corporate Counsel, Symantec
  • 9. Privacy & Data Security Do’s, Don’ts and Why it Matters Michael Standard August 6, 2019 Senior Corporate Counsel – Privacy and Data Security
  • 10. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 2 Why it Matters: Losing Brand Trust
  • 11. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps Save the Children: International charity was hacked twice by malicious scammers in 2017. Criminals created false invoices and related documents. The organization was tricked into transferring nearly $1 million USD to a fake business entity in Japan. The funds could not be recovered. 3 Source: https://www.insurancebusinessmag.com/us/news/non-profits/nonprofits-are-a-target-for-data-breach-165039.aspx https://www.zdnet.com/article/save-the-children-foundation-duped-by-hackers-into-paying-out-1-million/
  • 12. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps (continued) MacEwan University: A “spoofed” email appeared to come from a vendor, requesting the school’s accounts receivable team reroute payments for ongoing construction to a new National Bank of Canada account. A supporting letter attached to the email appeared to have been signed by the company’s chief financial officer. The university made three payments to the new account, totaling more than 11.8M USD. The email was a fraud, which was not discovered until 2 months later. 4 Source: https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html
  • 13. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps Health and Human Services v. Affinity Health: Affinity Health accidentally disclosed the protected health information of over 300,000 individuals when it failed to erase the data on copier hard drives when it returned the copiers at the conclusion of the lease. Affinity paid a $1,215,780 fine to HHS. There is no report of costs for individual claims. 5
  • 14. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Security & Privacy Missteps (continued) FTC v. Aaron’s et al.: Aaron’s franchisees and several other “rent-to-own” retailers and a computer software company used computer programs to spy on consumers who rented computers from those companies. The program captured screenshots of confidential and personal information, logging their computer keystrokes, and in some cases taking webcam pictures of people in their homes, all without notice to, or consent from, the consumers. This cost Aaron’s at least $25 million to settle with the CA attorney general and they entered into a 20 year consent decree with the FTC; not to mention extensive legal fees. Source: https://www.ajc.com/business/aaron-settles-spying-complaint-with-ftc/N4zLeQHVhQnDnzysFFjFEK/ 6
  • 15. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Poll Time! How would you rate the maturity level of your privacy and security programs? • Documented and regularly reviewed • Documented but not reviewed or tested • Informal with some documentation • Ad hoc 7
  • 16. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 8 Security vs Privacy You can have security without privacy, but you can’t have privacy without security. Privacy is how an organization processes Personal Data to comply with laws, regulations and perhaps most importantly, customer expectations. Security is the technical methods used to protect that data. Privacy Notice/Consent Limiting data collected How used When shared How stored When archived When destroyed Security Availability Keeping information safe Protection from loss or theft Access Confidentiality Integrity
  • 17. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only • Safeguarding of data • Protecting data from erasure, theft, unauthorized access and unauthorized changes • Stopping bad guys – internal and external Security Security vs. Privacy Privacy • Safeguarding of identity • Setting the rules for when, how and why personal data is processed, and by whom • Handling personal information appropriately & responsibly 9 • Appropriately limit the disclosure of and access to information (confidentiality) • Maintain the accuracy and comprehensiveness of the data (integrity)
  • 18. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Personal Data means any information related to any identified or identifiable natural person and, soon to come, data related to a household. Data Subjects What is “Personal Data”? Personal Data Examples Sensitive Personal Data Examples • Employees • Clients/Customers • Patients • Donors • Research Subjects • Volunteers • Names • Address • Phone Number • Email • IP Address • Advertising Identifier • Cookie ID • Internal Identifiers • Social Security Number • Driver’s License Number • Credit Card Information • Health Information 10
  • 19. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only * Fair Information Practice Principles (FIPPs) • Transparency - ensures no secret data collection; provides information about the purpose and use of personal data to allow users to make an informed choice • Choice - gives individuals a choice as to how their information will be used • Data Minimization - only collect that personal data that is necessary for the stated purpose • Information Review and Correction - allows individuals the right to review and correct personal information • Information Protection - requires organizations to protect the quality and integrity of personal information • Accountability - holds organizations accountable for complying with FIPPs 11 Example: PIPEDA – Schedule 1: https://laws-lois.justice.gc.ca/eng/acts/P-8.6/page-11.html#h-417659
  • 20. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Top Three Threats to Nonprofits Phishing Malware Website attacks Social engineering Lack of training/ awareness Improper use of assets (cloud, email) Poor security practices (e.g. simple passwords, password re-use) Vendor security Limited visibility and control Subcontractor exposure Contractual protections/ Limits of liability Bad ActorsOrganizational Vendors 12
  • 21. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Avoid the most common exploitations Spoofing Social Engineering, Phishing, Spoofing Phishing Malware • Emails appearing to come from a friend, vendor or boss • Attempts to gain access to systems by tricking people • Can happen via phone, email and in-person • Computer viruses that demand payment • Often uses fear and intimidation • Ransomware 13
  • 22. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 14 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand 1
  • 23. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 15 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security 1 2
  • 24. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 16 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible 1 2 3
  • 25. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 17 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible Assess your vendors and hold them accountable. Use privacy and security questionnaires 1 2 3 4
  • 26. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 18 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible Assess your vendors and hold them accountable. Use privacy and security questionnaires Implement Privacy by Design basics (internal questionnaires, privacy assessments, etc.) 1 2 3 4 5
  • 27. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DO Do’s and Don’ts to Counter Your Risks 19 Assess your risks: Assess your exposure; the likelihood of harm; worst-case damages to your organization and brand Train your team on privacy and security Implement information security best practices: e.g. Prohibit password sharing and re-use, access authentication and limits, encrypt where possible Assess your vendors and hold them accountable. Use privacy and security questionnaires Implement Privacy by Design basics (internal questionnaires, privacy assessments, etc.) Account for Employee Data 1 2 3 4 5 6
  • 28. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 20 Ignore your risks 1
  • 29. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 21 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) 1 2
  • 30. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 22 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) Use default passwords that come with your devices; always create new complex passwords 1 2 3
  • 31. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 23 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) Use default passwords that come with your devices; always create new complex passwords Ignore your own privacy policy. This is your promise to your customers; if you can’t abide by your policy, change it (on a going forward basis!) 1 2 3 4
  • 32. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only DON’T Do’s and Don’ts to Counter Your Risks 24 Ignore your risks Keep more data than you need for longer than you need (i.e. avoid the “we keep everything forever “in case we need it” syndrome”) Use default passwords that come with your devices; always create new complex passwords Ignore your own privacy policy. This is your promise to your customers; if you can’t abide by your policy, change it (on a going forward basis!) Ignore Employee Data 1 2 3 4 5
  • 33. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Implementing the Do’s and Don’ts: Establish a Privacy Program 1. Map and know your data. What do you have and where is it? 2. Identify threats and legal obligations 3. Establish privacy and security policies and controls • Implement an effective Privacy by Design Program • Customize your privacy policy to your organization (write what you do, not what you “hope to” do…) • Vendor Due Diligence • Information Security - design, implement, verify 4. Establish compliance capabilities (incl audit & verification) • Who will actually implement your program and how 5. Awareness and training 25
  • 34. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Assessment of Personal Data Processing and Security Simple Privacy/Security Questionnaire 26 • What personal data do you collect? Why? • Is it consistent with our privacy policy? • Are you transparent with how you are using the data? • Who needs access to it? • Internal employees • Vendors • Where will it be stored? • How will we protect it? Consider - On-premise, cloud, encryption, transfer, back-up, etc • How long do we need it? And, why? • Who is responsible for the data lifecycle and destruction? • Who is the responsible manager/department?
  • 35. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Know Your Vendors and Service Providers Vendor Privacy/Security Questionnaire 27 • Who is the Vendor? • Type of entity and, if applicable, where incorporated; • Funding (public/private) and ownership; • Where is the Vendor located and where will they process your Personal Data? • What types of Personal Data will they process and how? • Are they insured against cyber-crimes and/or security breaches? • What Security Certifications do they have? Third party audit reports? • Obtain their written security policies and practices • Period Re-assessments, Audits and Annual Questionnaires • Breach History • Identify sub-contractors / sub-processors • Evaluate contractual promises, indemnification and limits of liability
  • 36. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Privacy Laws – Can Anyone be 100% Compliant? • GDPR, PIPEDA, LGPD (Brazil), etc. • HIPAA, GLB, Telecom Act, etc. • CCPA and the emerging U.S. patchwork of laws • What’s next? 28
  • 37. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only What Questions To Test Your Nonprofit? 29 • When testing for privacy rights: Be the ultimate privacy champion user and test your technology • Where do I find the privacy literature? Links, please. • Can a non-lawyer understand my privacy notice? • Without reading the privacy notice, would I be surprised at how my data is being used? • When signing up for emails is it clear that’s what is happening? • Can I correct my information if it’s wrong? • When testing for security: • Who has access to data and how do they get it? • How do we protect ourselves from bad actors? • What tools do we use to protect our data?
  • 39. Share and Learn Chat in one thing that you learned in today’s webinar. Please complete our post-event survey. Your feedback really helps. Follow TechSoup on social media (FB, Instagram, Twitter, LinkedIn) Visit the TechSoup Blog at blog.techsoup.org
  • 40. Join us for our upcoming webinars. 8/15 Public Good App House: Voting Apps Demo 8/27 Raise More Money By Automating the Right Message at the Right Time Archived Webinars: www.techsoup.org/community-events
  • 41.
  • 42. The Symantec Security and Antivirus Donation Program For more information, please visit techsoup.org/symantec-catalog ● Symantec Endpoint Protection. Admin Fee $6 ● Symantec Endpoint Protection, Small Business Edition. Admin Fee $4 ● Symantec Norton Small Business ● Symantec Norton Security Deluxe
  • 43. Thank you to our webinar sponsor! Please complete the post-event survey that will pop up once you close this window.