BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//www.ndano.org//NONSGML kigkonsult.se iCalcreator 2.30.10//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:886adae2-3bcb-496b-adf1-161d8b8c1f03
X-WR-CALDESC:<b>Presenter:</b> Idealware\n<b>Cost:</b> $135 Regular Price o
 r $108 with NDANO discount code  (Login to <a href='https://www.ndano.org/
 portal/login.html' target='_blank' rel='noreferrer noopener'>Members Only 
 Portal</a> for code)\n\n<b><a href='https://www.idealware.org/training/inf
 ographictoolkit-2/' target='_blank' rel='noreferrer noopener'>REGISTER</a>
 </b>\n\n\n<b>Details:</b> If you don’t have written policies—and regular t
 raining to ensure that people understand them—your organization may face b
 igger risks than you think. Over three 90-minute webinars\, Idealware will
  walk you through the questions you should consider as you develop policie
 s to protect your nonprofit.\n\n<b>During this course\, you will learn:</b
 >\n\n   – Identify the risks your nonprofit faces and the level of risk wi
 th which you’re comfortable.\n   – Ask yourself important questions about 
 what is and is not acceptable use of organization resources and tools.\n  
  – Learn to manage people and data to keep your organization safe from mal
 icious attacks and honest mistakes.\n   – Walkthrough the pros and cons of
  whether staff members should use their personal devices for work.\n   – C
 onsider the ways you can partner with your staff to protect organization d
 ata on personal devices.\n   – Review what you’ll need to do if your offic
 e experiences a major disaster such as flood\, earthquake\, or ransomware.
 \n   – Gain the knowledge you need to write smart policies to protect cons
 tituents\, staff members\, and your organization.\n\n\nThis three-part 90 
 min. course takes place Thursdays\, March. 5-19\, 12-1:30 p.m. Central Tim
 e.\n\n<b>Course Schedule </b>\n\n<b>March 5: Acceptable Use and IT Securit
 y</b>\nComputers and office software are so familiar it’s easy to assume t
 hat everyone knows what’s OK and what’s not. But that false sense of secur
 ity can cause a lot of problems. This session will help you develop clear 
 guidelines for what is and is not acceptable on organization devices and n
 etworks. Idealware will also provide IT security tips to guide your policy
  so that you’re less likely to fall victim to ransomware and other malicio
 us software. \n\n<b>March 12: Bring Your Own Device Policies</b>\nNonprofi
 ts and staff members appreciate the convenience of being able to do work a
 t home or on the road using a personal device. However\, without good poli
 cies\, the blurred lines between work and personal life can cause issues a
 nd put your data at risk. Idealware will discuss what to consider as you d
 evelop a policy that’s fair and protects your organization.\n\n<b>March 19
 : Disaster Recovery</b>\nThe potential for disaster is everywhere. Hurrica
 ne\, flood\, tornado\, earthquake—and those are just the big ones. What wi
 ll you do if your systems are infected with ransomware or someone accident
 ally deletes important files? What about if your executive director or top
  IT staff storms out and takes all of their institutional knowledge (and p
 asswords) with them? Idealware will walk you through the potential disaste
 rs and guide you through developing a plan that will help you get your org
 anization back up and running as quickly and as safely as possible.\n\n\n<
 b>About the Presenter</b>\nJoshua is an expert trainer for Tech Impact’s I
 dealware and Vice President of RoundTable Technology\, a technology servic
 e provider in New York and Maine. Joshua has been helping nonprofit organi
 zations improve their use of technology since the early 1990’s and has wor
 ked with more than 1\,000 organizations. He specializes in helping organiz
 ations be strategic about their technology and make smart choices about se
 rvices\, support\, and management.\n
X-WR-RELCALID:17243f81171aec40c30f968b19130815
X-WR-TIMEZONE:America/Chicago
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:STANDARD
TZNAME:CST
DTSTART:20191103T020000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RDATE:20201101T020000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:CDT
DTSTART:20190310T020000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RDATE:20200308T020000
RDATE:20210314T020000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:d6e3a142-2b5b-4283-ac30-9740baa47fd1
DTSTAMP:20260522T014240Z
DESCRIPTION:<b>Presenter:</b> Idealware\n<b>Cost:</b> $135 Regular Price or
  $108 with NDANO discount code  (Login to <a href='https://www.ndano.org/p
 ortal/login.html' target='_blank' rel='noreferrer noopener'>Members Only P
 ortal</a> for code)\n\n<b><a href='https://www.idealware.org/training/info
 graphictoolkit-2/' target='_blank' rel='noreferrer noopener'>REGISTER</a><
 /b>\n\n\n<b>Details:</b> If you don’t have written policies—and regular tr
 aining to ensure that people understand them—your organization may face bi
 gger risks than you think. Over three 90-minute webinars\, Idealware will 
 walk you through the questions you should consider as you develop policies
  to protect your nonprofit.\n\n<b>During this course\, you will learn:</b>
 \n\n   – Identify the risks your nonprofit faces and the level of risk wit
 h which you’re comfortable.\n   – Ask yourself important questions about w
 hat is and is not acceptable use of organization resources and tools.\n   
 – Learn to manage people and data to keep your organization safe from mali
 cious attacks and honest mistakes.\n   – Walkthrough the pros and cons of 
 whether staff members should use their personal devices for work.\n   – Co
 nsider the ways you can partner with your staff to protect organization da
 ta on personal devices.\n   – Review what you’ll need to do if your office
  experiences a major disaster such as flood\, earthquake\, or ransomware.
 \n   – Gain the knowledge you need to write smart policies to protect cons
 tituents\, staff members\, and your organization.\n\n\nThis three-part 90 
 min. course takes place Thursdays\, March. 5-19\, 12-1:30 p.m. Central Tim
 e.\n\n<b>Course Schedule </b>\n\n<b>March 5: Acceptable Use and IT Securit
 y</b>\nComputers and office software are so familiar it’s easy to assume t
 hat everyone knows what’s OK and what’s not. But that false sense of secur
 ity can cause a lot of problems. This session will help you develop clear 
 guidelines for what is and is not acceptable on organization devices and n
 etworks. Idealware will also provide IT security tips to guide your policy
  so that you’re less likely to fall victim to ransomware and other malicio
 us software. \n\n<b>March 12: Bring Your Own Device Policies</b>\nNonprofi
 ts and staff members appreciate the convenience of being able to do work a
 t home or on the road using a personal device. However\, without good poli
 cies\, the blurred lines between work and personal life can cause issues a
 nd put your data at risk. Idealware will discuss what to consider as you d
 evelop a policy that’s fair and protects your organization.\n\n<b>March 19
 : Disaster Recovery</b>\nThe potential for disaster is everywhere. Hurrica
 ne\, flood\, tornado\, earthquake—and those are just the big ones. What wi
 ll you do if your systems are infected with ransomware or someone accident
 ally deletes important files? What about if your executive director or top
  IT staff storms out and takes all of their institutional knowledge (and p
 asswords) with them? Idealware will walk you through the potential disaste
 rs and guide you through developing a plan that will help you get your org
 anization back up and running as quickly and as safely as possible.\n\n\n<
 b>About the Presenter</b>\nJoshua is an expert trainer for Tech Impact’s I
 dealware and Vice President of RoundTable Technology\, a technology servic
 e provider in New York and Maine. Joshua has been helping nonprofit organi
 zations improve their use of technology since the early 1990’s and has wor
 ked with more than 1\,000 organizations. He specializes in helping organiz
 ations be strategic about their technology and make smart choices about se
 rvices\, support\, and management.\n
DTSTART;TZID=America/Chicago:20200305T120000
DTEND;TZID=America/Chicago:20200305T133000
LOCATION:Partner Webinar (Series)
SUMMARY:Establishing Tech Policies to Protect Your Nonprofit— a Three-Part 
 Course
END:VEVENT
END:VCALENDAR
