Topic: Crafting an IT Security Policy for Your Organization
Date: Thursday, April 23, 2015
Slide and Recording links below.
- I hear about a new security breach every week – and I’m not sure we’re doing everything we can to keep our data safe. How can I improve security at my organization?
- Everyone wants to use their own devices to work – how can I support them without creating extra security risks?
- I don’t know what our security policy even is! How do I create or update a policy that explains clearly to our staff what they are required to do and why, without imposing insane procedures or burdens on them?
In this webinar we explore the IT security landscape in 2015 examining recent threats and trends. You will learn the CIA security framework (tough sounding, it actually stands for Confidentiality, Integrity, and Accessibility) which helps you assess your data and assign risk levels. We’ll take you through a manageable outline to create or update a policy for your organization that will address different levels of access to data, confidentiality and security, and what policies need to be in place for staff devices whether yours or theirs.
This webinar is for everyone – we all have passwords, we all use our own devices for work from time to time, and we all suffer if the next big security breach puts our organization in the spotlight in a very bad way.
Johan Hammerstrom has been a Network Engineer, a Team Lead, the Director of Services, Vice President of Services, Chief Operating Officer and now President of Community IT. Working directly with over 200 nonprofit organizations, to help them plan around and use technology to accomplish their mission has been one of the most positive and rewarding experiences of his life. He has spent plenty of time working with clients on security policies and is excited to share best practices with you here.
photo credit: brooklyn via photopin cc