Using the Cloud and IT Security
Is your nonprofit considering getting on the cloud? Are you already using it? Come learn about the pros and cons of the cloud and what you need to know to protect your organization from information security threats.
- Understand the building blocks and characteristics of cloud computing
- Understand the advantages and risks of using cloud computing in your organization
- Recognize the top six IT controls and practices that can help keep your organization safe
Nonprofits are expected to be fully transparent in their operations. Whether it is government compliance, competition for funding, or outcome accountability, it is critical that nonprofits use technology tools that improve their efficiency, reduce costs, and increase their visibility.
Significant innovations in modern technology have opened the door for nonprofits to leverage cloud computing to benefit their operations. Understandably, you likely have lots of questions and concerns about the cloud. How does it work? What are the risks? Is it worth the financial investment? How do we choose?
In this training, you will learn about the key benefits and concerns around the cloud and the current state of cloud computing. In addition, you will leave with a better understanding of how cloud computing offers tremendous opportunity, and at the same time, some risks to consider. This training will also cover security controls your organization can implement to avoid external and internal information security threats such as data breaches, viruses, and misuse of data.
Executive Directors, Managers, IT Staff, Development Staff, and anyone responsible for data management
Sunita Moonka recently retired from Sandia National Laboratories where she served as a Cyber Security Manager. In this role, her responsibilities included managing and overseeing the lab's information security program, including network monitoring, cyber risk analysis and mitigation, cloud security, incidence response, information security policies, procedures, standards and best practices. Sunita has over 15 years of experience as technical manager in cyber security and all aspects of Software Systems Engineering. She has a Bachelor of Science in Molecular Cell Biology and Masters in Information Technology. She is also a Certified Information Systems Security Professional.
2340 Alamo SE, 2nd Floor
Albuquerque, NM 87106
Email: [email protected]