Zoom Logo

Partnering with Grantees on Security - Shared screen with speaker view
Chantal Forster
24:47
Here’s the quote I just shared:
Chantal Forster
24:58
“Funders – both public and private – are beginning to question their role in the data ecosystem. They are asking themselves how their own data demands may be unintentionally putting their nonprofit partners and the people they serve at risk.”
https://pacscenter.stanford.edu/publication/philanthropy-and-digital-civil-society-blueprint-2019/
rmcgee
31:12
Because we share data with various organizations and vice-versa... data privacy and security is imperative for sustaining high levels of trust... it's a matter of maintaining strong partnerships/relationships
David Donaldson
31:54
Because we provide the online tools to manage funds on behalf of stakeholders, we must be trustworthy
Jeff Sauter
32:28
Unless we're requesting security from all our grantees I don't see how we can enhance individual grantees' security except through public forums and training sessions utilizing outside experts. We can help but we can't be responsible unless we're willing to establish and maintain the necessary expertise.
Carlos
33:35
We survey our grantees and an internal grantee security task force research, vet and consolidate tools and resources that can be shared out to grantees.
Chantal Forster
34:26
Thank you for sharing, everyone. If we didn’t get to your question now, we’ll come back to it.
Chantal Forster
35:08
Here's the link to the Funder Briefing and more: https://www.tagtech.org/page/cybersecurity
Chantal Forster
36:04
Hello! Would you like to re-share your question to include all attendees?
Chantal Forster
00:37:59
Here’s a question that just came in for everyone: 

“Has anyone created a set of security/privacy standards that they require/encourage their funded agencies comply with?”
Chantal Forster
00:42:19
If you’re curious, the cybersecurity breach rate amongst foundations (200 reporting) in 2018 was 21%.

https://www.tagtech.org/philanthropytech2018

We’re repeating the survey this year, so will have updated #s in late Q3.
Deborah Van Kummer
42:34
Limited funds/staff.
Hesham Tamraz
42:54
Lack of resources and technical expertise to implement secure systems
rmcgee
43:07
A lack of resources - time, employees/staff, knowledge...
David Fleit
44:33
Re: tools, we've found there are a lot of tools out there but uncertainty about best-in-class our industry recommendations, etc.
David Fleit
44:50
*or
Chantal Forster
45:21
Jason, do you want to repost to all?
Chantal Forster
45:43
Adam, do you want to repost your awesome ideas to everyone?
Chantal Forster
45:47
(All attendees)
Chantal Forster
46:25
Jason, would you like to share at the end how you do this? Even for a few seconds?
Chantal Forster
46:37
I can unmute you at the end, if so.
Chantal Forster
47:06
Will do
Chantal Forster
47:31
Hey David, would you be willing to share your approach at the end of the call? If so, I’ll unmute you then.
Adam Rosenzweig (Okta)
48:26
How might we reimagine the relationship between IT professionals working for funders and grantees in order to expand the entire portfolio's ability to pursue digital transformation and improve security?
Chantal Forster
48:38
If anyone here would like to unmute and briefly (1-2 min) share your org’s approach in the last 10 min of the webinar, let me know and I’ll unmute you then.
Bonnie Look
49:05
I wonder if its difficult for non-profits to decide to allocate funds toward cybersecurity versus the same amount of funds to supporting their core work.
Chantal Forster
50:51
Thanks, Laura. Do you want to share that with all? Great point.
Chantal Forster
51:49
Great point, John. Definitely share out with the full group / all attendees.
John Mohr
52:07
Should cybersecurity posture/readiness be thought of as a strategic capability? Or just something “you need to do”?
Chantal Forster
53:05
As in, a basic program readiness, John?
Laura Goff
53:08
Some foundations' discretionary grantmaking is limited by the governance (trust terms, etc.) that funds it.
John Mohr
55:29
I think of it as “Operational Readiness” but it is a fundamental capability, and the risk can result in such disruption.
Adam Rosenzweig (Okta)
56:56
Investments in cybersecurity can feel expensive. “Too expensive” is another way of saying, “not valuable enough,” which may imply that funders and/or grantees don’t fully understand the potential value/risks associated with security. Addressing that knowledge gap can help shift the conversation from “cost” to “value.”
Chantal Forster
59:17
Do you currently leverage any of these ideas for capacity building?
Chantal Forster
59:53
HI Jason, would you be available to share in a few minutes?
Chantal Forster
01:00:26
Hi! Would you like to unmute and share these thoughts?
David Donaldson
01:00:44
Are the links to those Resources available on the TAG Website?
Chantal Forster
01:01:29
You’re next!
Hesham Tamraz
01:01:46
Are TAG security briefs and research kits available to the public or members only?
Chantal Forster
01:02:23
Hesham, many of the publications are available to the public at: https://www.tagtech.org/cybersecurity
Chantal Forster
01:03:06
David from Pierce Family Foundation is going to share a bit next…

Would you like to share, let me know!
Chantal Forster
01:04:44
HI Adam, did you want to make any comments?
Chantal Forster
01:06:20
Anyone else?
Chantal Forster
01:07:18
As we begin to wrap up in 10 minutes, thanks for joining us today. To dig more deeply, you’re welcome to download the Funder Briefing that accompanies this webinar at: https://www.tagtech.org/page/cybersecurity
Chantal Forster
01:08:34
Great. I’ll call on your in a sec
David Krumlauf
01:11:22
Community IT Innovators do terrific webinars about cybersecurity https://communityit.com/webinars/
Chantal Forster
01:11:26
Anyone else have a comment or example to share in our remaining 5 minutes? I’d love to hear from you.
Chantal Forster
01:13:42
Thank you for joining us, Arlene.
David Krumlauf
01:17:46
Very well done! Thanks for do this webinar!