Cyber Security Track


Digital Protection for the World's Most Vulnerable
May
2

Digital Protection for the World's Most Vulnerable

Nonprofits are the second most attacked sector when it comes to cyber threats; yet 59% of large humanitarian and development actors believe that their own cybersecurity and information security practice is underfunded, and 65% believe it is inadequately managed. This puts all of our communities at our most vulnerable at risk.

Join Okta, Nethope, CyberPeace Institute and UC Berkeley Center for Long-Term Cybersecurity for a panel discussion on how they are meeting this challenge with data, partnership and new programs to support nonprofits with practical advice to shore up their security posture.

Register here.

View Event →
Responding to a Ransomware Attack: A Cybersecurity Dilemma
May
2

Responding to a Ransomware Attack: A Cybersecurity Dilemma

Ransomware has become a major cyber threat in recent years to make headlines and criminal organizations have been increasingly targeting nonprofits, as seen in some notable recent cases.

In a scenario where your data and applications are being held hostage, how do you respond to such an event? And how can you mitigate this type of threat before it happens? Also, what is being done on a larger scale to address this activity which is an increasing risk for both commercial and nonprofit organizations?

This session will provide practical guidance on addressing ransomware along with highlighting several other emerging security threats that organizations for good need to be prepared for.

Register here.

View Event →
Three AI Impacts on Cybersecurity in 2024
May
2

Three AI Impacts on Cybersecurity in 2024

What are the main ways AI impacts nonprofit cybersecurity risks?

Not surprisingly, Matt Eshleman, CTO at Community IT, recommends creating policies that address the way your staff uses AI – if you haven’t updated your Acceptable Use policies recently, AI concerns are a good reason to do that. He also recommends taking an inventory of your file sharing permissions before AI surfaces something that wasn’t secured correctly. Finally, make sure your staff training is up to date, engaging, and constant. AI is creating more believable attacks that change more frequently; if your staff don't know what to look out for you could fall for the newest scams or share sensitive data with a public AI generator.

Community IT has created an Acceptable Use of AI Tools policy template; you can download it for free from their site.

Register here.

View Event →