A GrantNewswatch Program

Online Sessions:


Each session's recorded link will be available within 24 hrs after completion of each live daily session and will remain available to participants only for one month after the course ends. 

Group Rates

Groups of four or more receive a 25% discount off the otherwise applicable rate. Please call 201 871 0474 or email register@pmaconference.com to register groups.

Cancellation Policy

Cancel up to 30 days in advance for a full refund. Thereafter, refund is 75% of registration fee. Registrations may be transferred to another person at no cost. Transfers to alternate dates/locations are generally available at no cost.

Instructor

Bill Edelstein is a consultant specializing in helping not-for-profits develop diversified revenue streams. He holds Advanced Degrees in Education and Not-for-Profit Development. His professional work is focused on Donor Relations and Fundraising. Bill is an adjunct professor at John Jay College of the City University of New York.

Bill Edelstein   DevelopmentConsultant.org

Testimonials

I participated in the webinar which, by the way, was amazing. Thanks for all the information you shared. - Elliot, Adcieo

Thank you Bill!! I enjoyed the presentation, in fact one of the best I have attended in some time. - Wendy, Ferris State University

A great Class! - Cheryl, Tulane University

Keep up the great work. Really glad I was able to join today. - Anna, Community Bridges

Thanks so much for an amazing Webinar.  So much info there.  I’ve already sent my notes to the fundraisers but I am glad they will be getting your recording! - Diana, St. Joseph Center

Thank you for your time and effort teaching this course – I am really enjoying participating with other ‘students’! - Liz, AFTD

GREAT CLASSES! - Karen, Chicago Urban League

I’d like to thank you once again for the great virtual facilitation and training sessions. You were patient, understanding, engaging, and checked in with us on our learning in several ways. I admit that this is a very busy time for me as it is reporting season so I wasn’t able to participate in the homework the way I would have liked. I was so grateful that I felt nothing but understanding from you and was able to learn so much from your sessions! - Clarinda, United Way of Central Minnesota

Thank you Bill. I found the course helpful because you provided a comprehensive overview and specific resources to help. - Julia, Wings for Kids


Cybersecurity for Nontechnical Personnel

February 7-8, 2024

Most cybersecurity issues are not caused by nepharious evil geniuses hacking your system. It's more likely someone clicking on the wrong email link, sharing a password with the wrong "tech support" person or simply not using passwords at all. But everyone who has access to confidential or important files needs to be aware of cybersecurity issues. Why?

  • Protection of Data: Organizations hold a plethora of sensitive information, from personal data of employees and clients to proprietary business information. A breach can lead to unauthorized access and theft of this data.
  • Financial Impact: Cyberattacks can be costly. Beyond the immediate financial loss from theft, organizations may face fines for data breaches, especially if they are found to be non-compliant with data protection regulations.
  • Reputation Damage: A cyberattack or data breach can severely damage an organization's reputation. It can erode trust and lead to the loss of customers or clients.
  • Business Continuity: Ransomware attacks, where attackers lock critical data and demand a ransom, can halt business operations. Ensuring cybersecurity can prevent such disruptions.
  • Regulatory Compliance: Many jurisdictions have regulations (like the General Data Protection Regulation (GDPR) in Europe) that mandate businesses to follow certain cybersecurity practices. Non-compliance can lead to heavy penalties.
  • Rise in Cyber Threats: The number and sophistication of cyberattacks are growing. As technology evolves, so do the methods employed by cybercriminals, making it paramount for organizations to be proactive.
  • Protecting Intellectual Property: For businesses that rely on unique products, services, or processes, a breach can mean the theft of intellectual property, which can be exploited by competitors or sold.
  • Avoidance of Legal Consequences: Data breaches can result in legal action from affected parties. This not only can result in financial penalties but also requires resources for legal defense.
  • Moral Obligation: Organizations have a moral responsibility to protect the personal and financial information of their employees, customers, and stakeholders.
  • Enhancing Trust: Demonstrating robust cybersecurity practices can enhance trust with clients, stakeholders, and partners. It can also be a competitive advantage in some sectors.

    As cyber threats transition to become even more complex, it is critical for organizational leaders to be proactive in protecting their institutions while remaining ahead of the curve. In an increasingly evolving and growing digital landscape, compliance isn’t simply about adhering to regulations. Forging a positive trajectory forward for your organization while combatting cybersecurity risks is key.

    In 2023 and beyond, a plethora of cyber security solutions are necessary to mitigate organizational cyber risk. This course will offer a broad overview of cybersecurity including how computers and networks are attacked, how to construct a cybersecurity framework, and how to mitigate attack. Terminologyies strategies, and underlying technologies utilized in cybersecurity are also covered. This 7.5 hour session will cover the following:


Schedule

  • Day 1 – 10:00 AM –4:00 PM Eastern Time
    • 1/2 Hour Lunch at 1:00 PM
  • Day 2 – 10:00 AM –12:30 PM Eastern Time

Two 15 minute breaks each day at instructor discretion


DAY 1:
Morning (10am – 12:30pm)

  • Introduction - Welcome and course overview
  • Importance of cybersecurity for municipalities, nonprofits, and beyond
  • Understanding Cybersecurity Basics
    • What is cybersecurity?
    • Common threats and vulnerabilities
    • Risk assessment
    • IT Governance
    • Security threats and benefits of Artificial Intelligence (AI)
  • Legal and Compliance Considerations
    • Relevant regulations and compliance standards
    • Impact of non-compliance
  • Building a Cybersecurity Framework
    • Creating a cybersecurity policy
    • Identifying key stakeholders
    • Developing an incident response plan
    • Firewalls and intrusion detection
  • Network Security
  • Protecting network infrastructure.
  • Firewall and intrusion detection systems.
  • VPNs and secure remote access.
  • Wireless technology and security

Afternoon: (1:30pm – 4pm)

  • Data Protection
  • Encryption methods
  • Data classification and handling
  • Backup and recovery strategies
  • User Awareness and Training  
  • Importance of educating employees
  • Phishing awareness and best practices
  • Social engineering threats
  • Vendor and Third-Party Risk  
  • Evaluating third-party security
  • Contractual obligations and SLAs
  • Case Studies and Practical Examples  
  • Real-world examples of cybersecurity incidents
  • Lessons learned and best practices from case studies
  • Contingency planning
  • How to Navigate and Implement a Successful Hybrid Workforce
  • How Artificial Intelligence (AI) can strengthen and/or weaken organizational cybersecurity

DAY 2:
Morning (10am – 12:30pm)

  • Securing Mobile and IoT Devices  
  • Risks associated with mobile and IoT devices
  • Strategies for securing them
  • Ransomware – How to Avoid Being the Next Victim
  • Secure Cloud Computing
  • Cloud security considerations
  • Best practices for cloud adoption
  • Monitoring and Incident Response  
  • Real-time monitoring tools
  • Responding to security incidents
  • Post-incident review and improvement
  • An Introduction to the SEC Cybersecurity Disclosure Rules
  • Q&A and Open Discussion
  • Resources and Next Steps