top of page

Event Recordings and Materials

Welcome to our resource hub for past events! Here, you can access recordings and materials from our previous sessions. We've compiled these resources to help you revisit key insights and continue your learning journey.

January 2026 - Awareness on a Shoestring
Portrait of young beautiful smiling casual woman sitting at office desk enjoying her cup o
Portrait of young beautiful smiling casual woman sitting at office desk enjoying her cup o

28 January 2026

1:00 PM Pacific   Free Online Event
Cybersecurity Awareness on a Shoestring: Practical Steps for Small Budgets

Ensuring that your remote team understands how to avoid costly cybersecurity threats is no longer optional, even if you're a two person team. For nonprofits of every size, if your organization is online, then integrating security for your data, devices, and apps must include every member of your organization. But what does this actually entail? And is subscribing to an automated training service or implementing phishing simulations the complete answer?

To answer these questions, we'll review data from non-vendor sources on the effectiveness of various awareness approaches. Then we'll look beyond phishing email training at a specific example of how one nonprofit built their program over a two-year period with limited staff time and budget.

Doc Type Images - PDF.png
Doc Type Images - PDF.png
August 2025 - Plan to Secure
unseen-studio-s9CC2SKySJM-unsplash.jpg

August 20, 2025

1PM PDT    Free Online Event

Create a Plan to Secure Your Nonprofit Against Online Threats

Take the first step toward protecting your nonprofit by creating a security plan that prioritizes your most important digital assets. In this informal talk, we'll explore how to build a digital asset inventory as a first step in establishing a security program for your organization and how creating the inventory can be an eye-opening cybersecurity awareness exercise for your entire team. Next, we'll cover how to go from inventory to establishing security priorities and then how to put basic security controls in place to protect your most valuable assets. 

bottom of page