Checklists; Protecting identity checklist

From California Technology Festival Wiki
Jump to navigation Jump to search

As nonprofits move increasingly to "the cloud", with hosted applications and online services playing a central role in their program and operations, a new category of risk exposures has emerged. From proper domain registration to ownership and management of hosted data to control of social media accounts, many organizations fail to consider the long term when they set up online presences and increase their dependency on online tools. This session will provide practical steps organizations can take to take full control of their online identity and long-term destiny.


Aspiration Online Indentity Webinars

1. Another Cloud is Possible

2. Taking Control of Your Online Identity

Previous Session Notes