photo of locksTopic: Crafting an IT Security Policy for Your Organization
Date: Thursday, April 23, 2015
Slide and Recording links below.

In this webinar we explore the IT security landscape in 2015 examining recent threats and trends. You will learn the CIA security framework (tough sounding, it actually stands for Confidentiality, Integrity, and Accessibility) which helps you assess your data and assign risk levels.  We’ll take you through a manageable outline to create or update a policy for your organization that will address different levels of access to data, confidentiality and security, and what policies need to be in place for staff devices whether yours or theirs.
This webinar is for everyone – we all have passwords, we all use our own devices for work from time to time, and we all suffer if the next big security breach puts our organization in the spotlight in a very bad way.
Johan Hammerstrom Johan Hammerstrom has been a Network Engineer, a Team Lead, the Director of Services, Vice President of Services, Chief Operating Officer and now President of Community IT.  Working directly with over 200 nonprofit organizations, to help them plan around and use technology to accomplish their mission has been one of the most positive and rewarding experiences of his life.  He has spent plenty of time working with clients on security policies and is excited to share best practices with you here.
photo credit: brooklyn via photopin cc