Tag Archives: TechSoup

Nonprofit Radio for March 13, 2023: Beat Back Cyberattack

 

Michael EnosBeat Back Cyberattack

Cyberattacks against nonprofits are on the rise. While you cannot avoid them, you can make them a lot less likely to cost you big money, your data, your reputation, your donors, and your employees. Michael Enos from TechSoup helps us out.

 

 

Listen to the podcast

Get Nonprofit Radio insider alerts!

 

 

Apple Podcast button

 

 

 

We’re the #1 Podcast for Nonprofits, With 13,000+ Weekly Listeners

Board relations. Fundraising. Volunteer management. Prospect research. Legal compliance. Accounting. Finance. Investments. Donor relations. Public relations. Marketing. Technology. Social media.

Every nonprofit struggles with these issues. Big nonprofits hire experts. The other 95% listen to Tony Martignetti Nonprofit Radio. Trusted experts and leading thinkers join me each week to tackle the tough issues. If you have big dreams but a small budget, you have a home at Tony Martignetti Nonprofit Radio.
View Full Transcript

Transcript for 631_tony_martignetti_nonprofit_radio_20230313.mp3

Processed on: 2023-03-11T01:00:20.020Z
S3 bucket containing transcription results: transcript.results
Link to bucket: s3.console.aws.amazon.com/s3/buckets/transcript.results
Path to JSON: 2023…03…631_tony_martignetti_nonprofit_radio_20230313.mp3.38068433.json
Path to text: transcripts/2023/03/631_tony_martignetti_nonprofit_radio_20230313.txt

[00:01:26.42] spk_0:
And welcome to Tony-Martignetti non profit radio big, non profit ideas for the other 95%. I’m your Aptly named host of your favorite abdominal podcast. Oh, I’m glad you’re with me. I’d suffer the embarrassment of a phone. Yah. If I had to speak the words you missed this week’s show, beat back, cyber attack, cyberattacks against non profits are on the rise while you cannot avoid them, you can make them a lot less likely to cost you big money, your data, your reputation, your donors and your employees, Michael Enos from Techsoup Global helps us out on tony steak too. Get in people’s faces again. It’s a pleasure to welcome Michael Enos to non profit radio He is senior director of community and platform for Techsoup Global. He began his professional career in technology in 1996 and has since led team, tech teams at the national and individual office levels in increasing responsibilities on Mastodon. He’s at Michael underscore Enos at public good dot social and tech soup is where you’d expect them to be at techsoup dot org. Michael, welcome to non profit radio

[00:01:42.03] spk_1:
It’s great to be here. Tony Thank you for having me.

[00:01:46.69] spk_0:
My pleasure. My pleasure. Let’s please explain the work of tech soup. I think it’s so valuable, so many billions of dollars of software and hardware transferred to nonprofits. Make sure, let’s make sure everybody knows what techsoup is doing,

[00:02:52.57] spk_1:
you know? Absolutely. I mean, essentially our, our mission is to help civil society, organizations worldwide um better leverage technology to create impact in the missions um that they serve and to build communities. Um You know, that, that then can then foster that, that, that, that impact globally. Um We do that through a number of different ways. We do that by facilitating philanthropy from large tech donors. Um And you know, most of which are the ones that are just, you know, household names. Um We also do it through uh courses, services, consultations, um and through connecting organizations with each other and through also through engagements like this where we try to really uh to blogs, webinars and other facets where we help organizations understand how they could use tech um and protect their tech to uh enable uh and further have impact for their, their communities. They serve,

[00:03:17.12] spk_0:
I saw on tech soups website today, Microsoft Office or Microsoft 3 65 for a dollar. So

[00:03:18.55] spk_1:
that’s an example, right? And if you were to go to uh you know, Microsoft for nonprofits or Google for nonprofits, for example, um you know, the data validation platform that validates organizations worldwide is managed by Texas So, ultimately, we, we, we do many things but we’re also sort of a, I guess, data leading partner for, for a lot of these organizations that want to understand and make sure that their philanthropy is going into the right hands.

[00:03:48.25] spk_0:
You have, you have local uh connect groups to techsoup, connects groups.

[00:03:54.10] spk_1:
That’s great. That’s right.

[00:03:56.21] spk_0:
Yeah. You know, I know, I know you’re, well, you’re director of community and platform. So is that, is that part of your work

[00:04:42.76] spk_1:
director? I mean, you know, you know, I support that, that organization that we um we have, we have lots of different um areas and, you know, and, and in my role, I support them all um platform is a lot of the, you know, I oversee our enterprise, infrastructure and security as one of my fundamental sort of roles. I mean, obviously with the, with their expansive amount of technology that we have, that runs our platforms that, that consumes a lot of my time, but also the community side because of my background working in the tech for good space, you know, since, you know, for the length of my vocation, um you know, I have, I’ve accessed as a resource for a lot of other groups, including the connect group for when they need, you know, to understand, you know, how to, you know, for, for things like this and for, for other things um to help our communities um better leverage to the tech that they use. I mean, it’s one thing to, to uh provide the technology. It’s another thing to actually help people, you know, provide them the enablement to be able to use it and optimize it.

[00:05:08.91] spk_0:
Are there local meetups are the group’s going back

[00:05:50.06] spk_1:
to? Exactly. There are, there, there are, you know, communities within the regional and our, and that’s part of our connect program. Um And eli, the guy who runs that and, and the group that runs that are very, very energetic and it’s very community driven, which, which is fantastic and we’re sort of an enabler and facilitator in that work, which is wonderful. And that stems from the early days of us being part of the early groups that were involved with the, you know, tech for good space way back when technology was first getting launched, you know, and the internet was first launching different

[00:05:51.33] spk_0:
types of work. I mean, you know, n 10 doesn’t do consulting, which I wanted to ask you about very shortly. But, you know, they don’t do tech grants necessarily, but all, all very parallel with, with N 10.

[00:06:26.73] spk_1:
Yeah. Correct. And, and we, we have a close partner to put 10, 10 and, and we attend the events and such and we’ve long been sort of affiliated with that demand and other and other groups like like 10, 10. Um and we have partnerships that sort of expand throughout the different communities. Um And, and we try to be involved globally as well. You know, so there’s this sort of, you know, there’s the U S side of it, but then there’s also the everything that we’re doing outside of the U S and abroad because, you know, it’s um civil society is international and so, and tech soup is really involved with, with things not just within our own borders but, but outside of them um globally.

[00:06:50.58] spk_0:
Are you going to 23 NTCC the conference?

[00:06:51.42] spk_1:
Um myself. No, I’m not the, I know we have some, some other representatives that are there. I’ve been to many of those uh this year. I’m not specifically going, but we will have some representative from Texas there. I’m

[00:07:03.64] spk_0:
sure. Yeah. And non profit radio will be there as well. We’ll be on the exhibit floor.

[00:07:07.67] spk_1:
Excellent. That’s fantastic. Yeah. Yeah. Well, I’m sorry, I’m not going to be there to be in person to meet

[00:07:12.61] spk_0:
you. That’s all right. There. There are others every, every spring and

[00:07:17.31] spk_1:
virtually, by the way,

[00:07:18.97] spk_0:
that’s true. There is hybrid this year. That’s right. Um And, and texture is also consultants to consultants to nonprofits. Let’s make sure folks understand that too.

[00:08:46.84] spk_1:
Yeah, I mean, we, we provide, essentially, we help organizations connect with other organizations that then provide consultant services. We do some ourselves, but it’s very specific to some of the um because we, we provide a lot of, you know, what we’re doing to, to skills. So to speak what we, what we have is we’ve partnered with other organizations through our platforms to, to align organizations depending on exactly what type of consultation they need to inappropriate sort of resource for them. Um And that’s more uh our, our model in terms of we’re sort of a connector. So for example, if somebody needs, you know, specific sort of technology assessment uh for implementing uh Microsoft, we may do some, but then if it’s more advanced, we may work for them to, to impact or an organization that we partner with and then they provide that as a service to that organization. So, and we have other partners like that, who provide those similar sorts of services that are more hands on and direct than what tech soup can provide at this moment. And we may may expand that more and do some of that um more, more stuff ourselves and, and we are developing that and some of our customers success programs. Um and we do run a lot of sort of in the office programs where people could have webinars. And I’ve spoken in a few of those where we do it in in depth dive of a particular technology so that organizations can learn how to use them.

[00:09:00.19] spk_0:
I’ve always considered the big three to be Tech Soup N 10 and tech impact in terms of technology for nonprofits and, and all three of those of course, are nonprofits themselves. Right.

[00:09:12.87] spk_1:
Exactly. Yeah. All right,

[00:09:15.44] spk_0:
let’s talk about cyber attacks. Uh They are on the rise against nonprofits. What, what, what are you, what are you seeing? We’re going to get into the details, of course, but overall general, you know, kick us off. What are you seeing on this front?

[00:11:31.28] spk_1:
What, what we’re seeing is a lot more, um, targeted attacks, which, which is, which is unique because there’s, you know, speaking broadly about cyber activity, you know, there’s a lot of noise on the internet. There’s, you know, just all these robotic sort of in these bots that are flying around trying to find targets, right? And they’re sort of just, you know, you know, I guess, you know, they’re, they’re doing drive by sort of evaluations to see of anything, you know, just to see if there’s anything that they could get a finger in or, you know, just to explore and see if there’s sort of a, you know, something that they could find in there. What we’re seeing now is more targeted attacks, meaning there’s a specific purpose to it. Like somebody’s like, well, you know what we think that, you know, this is a, you know, a specific type of organization, they’re involved with a particular type of activity and we’re interested in knowing who’s donating to that activity and whether or not we could possibly have access to that information because that might be valuable or perhaps to the constituents that they’re serving because maybe that information is valuable as well, maybe for either financial reasons or, or, or or political reasons. And so we’re seeing a little bit more of that or, or perhaps because we really want to cause disruption in critical infrastructure. And one thing that um this is sort of a broader trend in cyber security around targets towards critical infrastructure and myself and and others in this space believe that civil society, organization data is part of critical infrastructure and critical infrastructure. So I mean, people are targeting things like, you know, we’ve we’ve heard about the target on power grids and uh gas pipelines and such. And you know, if you think about data that’s relative to communities that are specifically vulnerable in certain context or, or have access to information about others, then that’s critical infrastructure because we need these organizations to function in society. And so, you know, there could be other actors who say we want to disrupt that particular critical infrastructure for some reason and that reason could be varied just like it is for why people would disrupt any sort of critical infrastructure.

[00:12:55.08] spk_0:
I have an example that is pretty close to home. I I I own two homes in North Carolina. One of them was affected by that shooting at uh at the electrical substation in that was, that was in Moore County, North Carolina. Um And there’s a, there’s a possible correlation that, that that attack was to prevent a drag queen show from going on in the little town of Southern Pines, North Carolina, which is served by that substation that got shot at. Um So, I mean, it sounds like you’re saying, it’s not that far a leap like, you know, 11 cadre of bad actors uses guns. Another cadre of miscreants could be hackers that are looking for data at that maybe at that theater or, uh you know, among a nonprofit that may have been involved with

[00:13:45.30] spk_1:
maybe maybe the intent at the attendance list or the people who are donating to that event. And so, you know, this is the type of data and like I said, there’s, there’s different reasons why somebody might be targeting certain data. But this, these are the, this is, you know, this is like bingo on the nose, this is the kind of stuff that, that we’re seeing more and more and we’re very concerned about and why we’re really like soup is really sort of launching this um effort to help educate organizations on how to improve uh and understand what cyber security means in this space and how to prioritize it, but also how to um sort of get through the sort of complexity of it and, and, and find simple ways to knock off low hanging fruit to make it sort of actually, you know, doable for them with given their budgets and given their constraints that we a lot of smaller organizations in the, in the space you know, have, generally,

[00:14:39.67] spk_0:
it feels like in our polarized culture that there isn’t a nonprofit mission category that would be exempt from, from possible attack. I mean, you know, even feeding, feeding the hungry, you know, I could conceive of that being objectionable to some group of people that feels like why do those folks get food and, and I don’t get food or why are they entitled? And I’m not, or, you know, something that seems innocuous and purely beneficial. I, I can imagine, uh, another cadre of bad actors deciding that it’s, it’s, it’s worthless or worth worse than worthless. It’s detrimental to our culture for some reason and wanting to attack it. It doesn’t, it doesn’t feel like any particular mission would be more vulnerable or less than, than any other.

[00:15:59.15] spk_1:
Um, you’re correct. And one of the other things that is, has changed in, in this, in this sort of, you know, over time that I’ve seen is the availability of the tools to be able to perform exploits before you would actually have to be, you know, pretty well versed in hacking to be able to do any harm right now. It’s, you can, you can buy the service. I mean, you could just go to the market on the dark web and just say, hey, you know, I want to buy this, you know, uh, this hacking kit, you know, and, and, and, and there’s youtube tutorials on how to do it. I mean, it’s becoming, and, and these are, the tools are free and readily available. So what we’re seeing more of is not only just this trend of people wanting to and, you know, and maybe that hasn’t changed, it’s just that it’s more accessible, right? But, you know, people wanting to, you know, target communities and, and, and, and also try to find valuable data within these communities, but also their ability to do so it’s become easier and there, you know, and, and so you combine those things together and that’s why we’re seeing the trends we’re seeing. That’s one of the reasons

[00:16:21.11] spk_0:
you no longer have to be a sophisticated computer user. It doesn’t take a lot of study, you’re saying these things are available for cost or free to cause harm. All

[00:16:29.81] spk_1:
right.

[00:16:39.80] spk_0:
Alright. So how do we, how do we break this down for folks in small and mid sized nonprofits, you know, that, that they can sort of prioritize? I mean, is it as simple as let’s start having universal two factor authentication for everybody on your teams or maybe that’s passe maybe, maybe we’re past that now. I don’t know, how should

[00:19:30.66] spk_1:
we, you know, you, you make a good point. So for example, like the first thing I think people should do is, you know, or, or what you know, uh would be recommended and to think about it is to do the basics. Okay. What things like what you mentioned is like like multifactor authentication, um you know, anti malware on their clients, keeping things up to date and, and making sure you have backups of your data, these are sort of the basics, right? And so apart from the basics, though, you know, the next step above that is to then start looking at what we call privileged access management or role based security, not everybody needs to have access to everything, right? So, so, so let’s say, for example, a system was compromised with somebody’s permissions or credentials, depending on what they have access to, they could only do so much. And so there’s a, there’s a, there’s an important concept in cybersecurity that we call the privilege, the principle of least privilege. So, and that sort of dictates that a person really only needs access to the information that they need to do the role that they’re trained to do in their specific function. So if, if, if somebody is, you know, in I T, somebody who’s familiar with I T systems, uh they understand sort of the complexity involved and they may have access to privileged systems where they can perform things and have access to that sensitive data, but not the entire organization, right? And so we call that privileged access management. And sometimes, especially with today’s as we’ve moved into the cloud more when things get fired up and somebody spins up an app in the cloud, the cloud as well, generally have some basic role based permissions like the admin, you know, maybe a super user and then maybe some groups and then, and then just the regular users, right? You don’t want to give everybody admin rights. And so because then if somebody, if that just, that just provides more exposure and so these are small things that don’t take a lot of time or effort really to just sort of that, that’s a little bit beyond the basics though because um you know, and you know, for, you know, tech soup, for example, provides, you know, office 65 or 65 go for, for, for work space organizations. And once we, they provision, the next step is to really go in there and sort of harden them a little bit and lock them down and to go through that steps and understand what that looks like. So that um as people start doing things like maybe downloading spreadsheets that contain donor data or customer data that it’s not, somebody can’t accidentally just share that with somebody, you know, outside the organization or, or that becomes available on the general public internet.

[00:20:02.06] spk_0:
So how do we execute some of these things that are, that are more advanced, you know, beyond the backing up the multi factor authentication. Alright. So if you move into privileged access management, we need a, we, we either have a C T O which most listeners probably don’t or we need some outside help.

[00:21:13.19] spk_1:
No, actually, I think that a lot of these, you know, cloud based applications will provide guidance. The good news is is that they have an interest in protecting and wanting you as a, as a customer as well as, you know, the fact that it’s a shared data model. And so the the better that they do in terms of providing information about how this works, the better, you know, the, the the, you know, the people who use that product is going to benefit from it. And so generally in these, you know, you know, and these things aren’t if you have somebody who is at least responsible for the deployment of the technology and they don’t have to be an advanced, you know, computer scientists to do the work of the cloud app then. But somebody should be sort of designated within the organization to ensure some of the basics about the way data is handled. And, you know, getting to one of the export points, I wanted to bring up one of the most important things to understand for an organization is what data do they have? Where does it live and what is the value of it? And what is the value of Michael before we, before

[00:21:22.02] spk_0:
before we move to what, what’s our data inventory? I want to emphasize this, I wanna emphasize the value of being in the cloud. So there is there is value to using uh CRM databases that are cloud based versus server based at, in your office anymore.

[00:22:47.49] spk_1:
Correct. And for so many reasons and, you know, uh, and, and moving to that topic because a lot of the ways that systems are oftentimes breached is because what things we mentioned earlier, such as they’re not patched, there’s, um, not, not very good perimeter security on them. These things are taken care of for you, um, and they’re not backed up regularly. Um, those things, these things are taken care of for you in a sassy application. Um If it’s, if it’s a robust SAS application, like the kind that takes provides. And so when we, when we go to, you know, vet an offer that’s going to be in our marketplace, we we, we go through the list to ensure that this is gonna be a product that will serve the pole, the test of time and actually will, will be robust in, in the requirements necessary for our organization to protect their data. And so, and, and so that leads to, you know, also that making it more but maybe a little bit easier for organizations to then lock down their cybersecurity because they don’t have to have experts come into their closet or their data center and, and do this configuration and do all these updates are very technical on their firewalls and all the hardware and everything all the time in their own infrastructure, it can be managed within the cloud by people who are not necessarily have that sort of, you know, the Cisco CCN a sort of certification? Alright,

[00:23:07.85] spk_0:
thank you. I just, I wanted to drill down absolutely. Very

[00:23:11.75] spk_1:
good point.

[00:23:15.98] spk_0:
The value of from a security perspective, the value of the cloud. Alright, so let’s go to what you were, you were headed to what your data inventory, what what do you have? What what do we need to be? What do you want us to think about their?

[00:23:32.71] spk_1:
Yeah, so no data is not all data is not created equal, so to speak, right? So we have, we have data that it’s just things like, you know, my notes when I’m, you know, talking in a meeting or something like that. Okay. There’s nothing valuable with that. It’s, you know, generally not containing anything that’s sensitive. It’s sort of my notes from a meeting. Okay. Now, if that is something that, you know, maybe I don’t want to share, but it’s not something that, you know, if a hacker birds look at that so I can’t sell this and it doesn’t contain anything that’s gonna, I can do any harm with. Right.

[00:24:09.30] spk_0:
Well, it might depend, it might depend who’s leading the meeting. You might have different, you might have different sets of notes depending on who’s leading your meeting. You know, you might be commenting on the commenting on their uh I don’t know their, their capacity. I mean, not to suggest

[00:24:16.36] spk_1:
that people

[00:24:30.71] spk_0:
know, I’m actually, I’m actually having fun with you like, if somebody at tech soup was not a very good, not a very good speaker or supervisor, you know, then those notes you might not want in the public domain. But if the person is carrying their weight and they’re generally a good, good employee, you know, you have a brighter set of notes that you wouldn’t feel bad about getting exposed. That was my, my point. I guess I wasn’t, I wasn’t coming, I was coming across so dry. It was, it was desert, it was desert dry.

[00:27:18.46] spk_1:
No, I’m glad you brought into it. The, the, yeah, the types of data that you know, we think about when we think about the difference between data privacy and data protection to me, they’re very linked, right? So we, we have a responsibility to protect people’s data and the privacy of their data, but also to protect the security of that data. And so, you know, fundamentally speaking, generally in organizations in the sector, there’s gonna be some, you know, information that’s sensitive or may have some value and if we identify that and identify where that lives and then focus our energy on securing that, making sure that that data is backed up. Um and, and testing access to it, that’s, that’s, you know, if you have limited resources, that’s the place to really focus your attention. And then the other stuff is great. I mean, and use using robust tools like we provide um in our marketplace such as box for document repositories or even sharepoint, those can all be really configured for. So any type of theater, like even my notes from, you know that, you know, or my supervisor notes about me or your notes about me can be secured, you know, um you know, in a very robust way or shared. And one of the things we’re seeing, for example, especially the document collaboration software, it’s very easy to share things. They make it very easy to share with anybody, right? Just click and it always says like share with anybody with link, you know, you know, and so if you, if it’s something like, oh, you know, um uh oh somebody just sent me, you know, or they told me to put in my, you know, take a picture of my passport or something and, and stick it in here, right? And, and I, and the somebody has in the human resources once said, oh, I’m just gonna share this link and make it copied everybody. Now everybody has access to your past potential, everybody has access to your passport photo and I D so, you know, these are the things that we just have to sort of like start thinking twice, which brings me up to my next point. Um Security awareness within organizations, cybersecurity awareness, I cannot stress enough how important it is for organizations to have a cyber security awareness program within the organization. This these programs don’t cost a lot of money. They don’t take a lot of time and they go a long ways to prevent Uh an internal mistake that could lead to something 80% of cyber attacks happen from the inside.

[00:27:27.33] spk_0:
What does this cyber security awareness program look like?

[00:28:34.34] spk_1:
So essentially, so for example, um they’re usually conducted on point of like orientation for an employee that comes into an organization and they go through a video, you know, provided by a platform like no before which is in our marketplace. And, and what they do is they sort of go through this, this methodical sort of, you know, force to teach somebody about fishing about sensitive data about ways that people try to get access to information, either through cell phone, fishing through text fishing through um email phishing or through other means to or even on Slack to say, to try to fool you into providing some information um that they, that they can use a huge trend in this arena is what we call impersonation fishing. It’s a specifically targeted phishing email that looks like it’s coming from somebody within your organization such as your CEO, your CFO or uh the human resources director asking you to provide or update your banking information. And it’s very carefully crafted, crafted, it looks just like that and you really have to do a lot of due diligence to really go through there and say, oh, did this really come from our CEO having

[00:29:03.26] spk_0:
Haven’t there been cases where like a spoof email like this says, you know, wire $50,000 to this vendor account. You know, we’re, the payment is overdue. We need to wire this payment ASAP. And of course, it goes to the Bad Actors account. Isn’t there? Stuff like that? It looks like it’s like the treasurer saying, send a wire or the CEO saying, send, make a payment.

[00:29:40.35] spk_1:
That’s right. Exactly. And, and, and we’ve, um, and if you have an organization and people haven’t been trained to recognize that, you know, if somebody’s asking you for something and it’s something of value, double check it, you know, and, and to contact that individual in a different channel and say, did you really need me to send $50,000 in this wire transfer? I just want to check is this actually came from you? There’s other ways that they teach you in these orientation platforms or in these um security awareness platforms to check the email headers and, and the simple things, but essentially that’s the gist of it. And that’s why security awareness training is so important. So, so people are on their toes when they’re actually doing their work,

[00:30:03.43] spk_0:
do you recommend then ongoing training? You talked about orientation,

[00:30:51.51] spk_1:
there’s, there’s an orientation training and then, you know, most organizations will have it mandatory that they do an annual training and, and this just as a refresher course and also things change. So, you know, the space changes. Sometimes people are doing it now because of the trends more often like every six months. And then specifically for people who are in jobs where they’re doing data handling for, let’s say they’re doing data processing, they work in the donor uh services program or something where they’re managing sensitive data all day long. They’ll be specialized courses for people who are, are actually dealing with data on a day to day basis. So that’s a little bit more involved in terms of actually how to understand and, and that goes into things like, don’t download, you know, a C S V file on your computer and stick it onto a, you know, um, a thumb drive on your computer or transported or, you know, don’t, you know, send out, you know, via email to, to a coworker and, and these sorts of things that are specific to handling sensitive data.

[00:31:04.59] spk_0:
Okay. Interesting. Yeah. So even, even just emailing internally from employee to employee can be risky,

[00:31:37.20] spk_1:
yes, it can be stiff. It’s, and, and there’s because, for example, if, because that’s actually it’s going to stay within that email store wherever that is located. And it’s, um, if it’s unencrypted, it’s gonna be, it’s gonna be encrypted during transit, for example. Um, and, and encrypted at rest. But if somebody else had access to that access to your email server or a privileged access in your system, they could potentially go in and, you know, take over that account, log in as the CEO and have access to the deed and actually browse emails for, you know, and actually do queries and look for credit card information or, or look for email addresses and then they could potentially find information about donors or, or, or, or constituents that sensitive.

[00:35:08.08] spk_0:
It’s time for Tony’s take two. It’s time to get back in people’s faces. Again. Last month, I did a in person live face to face in person training on Long Island. I was in New York City for several days. What a joy. What a pleasure. What a difference, an improvement, you know, over virtual trainings. I mean, look zoom is, I’m all flustered. Zoom is, is necessary and I’m not saying necessary evil. It’s, it’s, it’s a part of the culture, whether it’s zoom or teams or Google meet, you know, whatever virtual meetings, they’re just a part of our lives now. No question about it. But don’t make those the default if you have the option to get back in front of people in person, I urge you choose that option. Uh You know, I could have passed on the opportunity to do the in person training, but I didn’t want to, I didn’t want to donor meetings to while I was in the city face to face meetings again, coffee lunches. It’s just so much better, so much more real than anything virtual can offer. Um I had a meeting, lunch meeting just about 10 days ago or so with someone from Heller consulting, which is gonna be Team Heller. They’re going to be our 23 NTC sponsors at the nonprofit technology conference coming up in Denver And the woman who works for Heller happens to live within 45 minutes of where I live in North Carolina. So we got together for a, a real lunch. We had lunch together over the same table. Remarkable. You know, it’s yeah, more real authentic. I urge you if you can meet someone in person instead of virtual, do it, do it. It makes the world of difference. It’s time to get back in people’s faces again. Don’t make virtual your your default. If there’s another way first, I urge you to do it. That is Tony’s take two. We’ve got Boo Koo but loads more time for beat back cyber attack with Michael Enos. Talk about not preserving data that you don’t need to preserve. Like credit card numbers, full numbers for instance, or dates of birth or other things that aren’t necessary for you to preserve. Isn’t there, isn’t there value in trimming down sensitive data that you don’t really need?

[00:35:40.17] spk_1:
Yes. And and one of the principal aspects of data handling is an optimization of data. So you know, there’s there’s transactional data that happens. And oftentimes, for example, with credit card things are processed nowadays, you’ll usually use a payment processor. So, you know, hopefully you’re not actually you know that server that actually storing that information is not on your box anymore because there’s, you know, you know, you can use an API and a web site and then it happened somewhere else and they take care of all that stuff for you. So, if your systems were hacked, they wouldn’t have access to the credit card data

[00:35:55.19] spk_0:
or,

[00:39:00.73] spk_1:
or Braintree or one of these sorts of services, you know? Exactly. And, and, and so those go to those payment processors and they manage all that, um, which is great because then you, it reduces the amount of exposure on your e commerce site or fundraising donor donation site. And if you’re using a donation software program, like, you know, donor perfect or one of these sites, that’s what they’re doing as well. You know. So they, you know, because, because they, they want to use because that you really have to have the best of breed technology to be able to make sure that that stuff gets that, that’s really super secure and they have higher standards and compliance standards by which they attest to the. Um, and so however though, let’s say you’re, you’re doing an email list to your constituents, right? Um You know, you’re gonna need some marketing data, you’re gonna, you know who to send this, this information to, but you don’t need everything about that individual. You don’t need things like that really. I mean, you may need the basics but you should be using a marketing provider that is secure and you should, you should transfer, get that information to them in a secure way and you should ensure that if that individual wants to opt out. Um and they, all these things should be an organization’s privacy policy so that people understand how their data is being used if they sign up for a newsletter or things of that nature. However, you know, I think your point specifically um oftentimes reports about, you know, activities, engagement, you know, that go into reports for executive or for things that are put into a PDF or in another format, the data should be anonymized. So the only thing that’s there is, you know, aggregated information about, you know, the engagement and not all they shouldn’t be able to drill down and see, oh who is this exact individual? Now if they need to know if it, if they want a donor report about, you know, I want to know exactly to see who um are the top donors and, and such, you know, there should only be limited people within the organization who have access to that data, to be able to see that information that goes back to my other point about um privileged access management. There are gonna be some, there’s gonna be some reason why people aren’t gonna wanna know specifically about, you know, who’s engaging with the community. And also oftentimes on the client level, we need to know that the people who are providing services to communities need to know exactly who these individuals are and more sense of information. And that’s why I was talking about earlier about, you know, understanding where that data lives and, and only having as much as you need to fulfill the function of that, you know, whatever you’re doing. Um and, and having that, you know, and making sure that’s really locked down when I worked in the food down. When I worked in the food and security sector, we had people going out in the communities and helping sign them up for, you know, um cal fresh, you know, essentially benefits, you know, for people to get, you know, you know, government assistance and they had to collect really sensitive information. But what they did is they had ways to you securely transmit that information to the local human resources agencies so that it was all encrypted, it was protected and then once we transmitted that we didn’t have access to it,

[00:39:44.68] spk_0:
what about vetting vendors? You know, if, if you’re offices using a male house, uh you know, some of the data that you just talked about for, for mailing? Um I can’t, I can’t think of other examples of vendors that could be. Well, events, events could have, could event management might have some sensitive data. What, how do you vet your vendors to make sure that they’re taking appropriate actions to prevent theft, fishing, you know, to, to defeat defeat, or at least you can’t defeat them, but at least minimize the threats. How do you, how do you check these third parties that you’re working

[00:41:16.80] spk_1:
with? Well, you know, that’s a big part of my roller tech soup. So whenever we, whenever we work with, with, whenever we’re going to be using a new product or app or something like that, it’s my job to go in and actually check and organizations, these, you know, these application providers will provide um on their site or they should and if they don’t, you shouldn’t use them, but most of them will provide on their site access to their information security program and what they do where their data is located, what they do to protect it, their compliance levels, their certification levels, um whether they do audits, whether or not they do penetration tests And what type of and, and, and everything to that order and that should be vetted by, by somebody before they onboard an aunt. And we do this all the time. We use a lot of different apps to Texas north of 100. And so we, every time we were on board one for some utility within the organization, we make sure that they meet this standard. There’s, and we actually, since we’re a third party vendor for other people, they have the same for us so that a lot of the work I do as well as to, you know, report out periodically to all the people who are using our, our platform to facilitate their data to organizations and you know, what sex, what tech soups information security program like. So this is, you know, because creates transparency, but it also helps people understand what the risks are, which helps when you’re in a situation where I needed to go and advocate for resources to institute a cybersecurity program.

[00:41:47.96] spk_0:
I want to ask you about the board’s role in all this. But, but is there anything more that you want before we get to the board? Anything more you want to talk about threat minimization policies? Anything we haven’t covered that you want folks to know about?

[00:44:14.11] spk_1:
Yeah, I think that one of the things that is, you know, that we haven’t mentioned yet is preparedness for an incident, essentially a security incident, incident response plan. This, you know, is another thing in that sort of list of five that an organization should understand. Um if you have a situation where your data’s been um breached. And, and one thing I do want to do is to describe quickly, even this kind of a dry topic is there is a difference between a security incident and a security data breach. A security incident is could be something as innocuous as somebody just knocking off your website and taking it down with a DDOS attack. Now that sounds in Oculus because it’s just, it doesn’t sound innocuous because it’s disruptive because nobody can get your website, but nobody’s taking the data. And as soon as that denial of service attack is stopped, your website maybe still functioning. Um But that’s an incident and a data breach is different because now you’ve got to do a couple different things. You’ve got to number one, find out how the breach occurred, which you should also do in case of the DDOS attack. Um But above that, you also need to then understand how to respond to, you know, what data was breached. What’s the scope of that data and who are the individuals and, and what’s our plan to reach out to those individuals and notify them about the breach? And was our policy around that? And who do we have to include in terms of communications internally and legally and, and to provide that transparency because for a number of different reasons, number one, it’s the right thing to do. Um and number two, because it actually helps build trust within, within communities because if people understand that, you know, these things happen and they happen to some very, very large organizations, right? We, we know about these, these really large breaches, but the more transparent they are the more the consumers or the constituents who used those products. Think gosh, they really responded well to this and they acted immediately, they communicated appropriately and they remediated, you know what happened and, and that was the responsible thing to do and you don’t wanna be doing that in the middle of a breach. So, having a plan up front helps during that process because otherwise it’s just too much at one time, everything and

[00:44:21.00] spk_0:
the plan is gonna lay out who’s in charge, who makes, what kinds of decisions, um,

[00:44:27.43] spk_1:
notify. Right. And what’s the playbook essentially? Yeah.

[00:44:52.19] spk_0:
Like, I mean, it could even, it could even break down to needing a remote place to work. I mean, go go that far or because we’re because we’re hopefully in the cloud we don’t like like if our physical infrastructure gets um compromised, do we need to go off site? And, and what’s the technology, the technology capabilities in our, in our off site work location?

[00:45:17.93] spk_1:
Well, that’s actually a little different. Um so we usually talk about that in terms of business continuity plan. So and, and that would be the same sort of plan you would enact case of a natural disaster or something like that. I mean, is a business continuity and, and that’s far exceeding the scope of what we can discussed today, although I’d be happy to discuss that. Let’s not let’s not

[00:45:22.65] spk_0:
I don’t want to panic folks. Okay. Alright.

[00:45:25.60] spk_1:
Alright. Alright,

[00:45:27.20] spk_0:
you got me focused on, you got me focused on like I don’t know, natural disasters and terrorism. All right, let’s

[00:48:44.52] spk_1:
go to the board. Okay. Alright. So, so one of the things that boards were all right. So organizations nowadays are let’s put cybersecurity is becoming and, and is becoming as important as sort of financial security with an organization. The two are becoming linked together An organization. And so for many years, as we all know, uh 501 C3 organizations in the us are generally bound to having a financial audit annually. Right. And then they report to the board and the board will make sure that, you know, there’s a financial audit to ensure that the funds are used judiciously. Um there’s oversight and governance over these matters. Cyber security is becoming as important as financial security because the two are linked together. If there’s a because it could affect it. If you have a ransomware attack, it could affect the viability and the business sustainability of an organization. So it’s a very serious matter. It’s becoming a very, very serious matter for organizations to then think about cybersecurity as a compliance issue, not just nice to have. And so helping the board’s understand that this has shifted from a situation where, oh, well, you know, there’s nobody’s going to attack a nonprofit and uh you know, and if they do, you know, it’s, our data isn’t very important. Um It’s things have shifted, right. So I think recently there was a community, um it’s one of these cities, for example, was an entire city was, has been locked down for days because our grants were attacked and so nothing can function within the city because, you know, um that’s going to affect everything within the city, not just their continuity and safety of people, but also um it’s gonna have a financial impact. So cyber security is becoming more like a compliance issue and a governance issue. And so I think if boards understood that, then they would understand the need to prioritize and to provide funding and resources for those within the organization. Whether that if a small organization that the CFO or the C 00 or even the CEO to then say, look, we need to carve out some resources to be able to understand our risk and the best way to do that would be to do a third party risk assessment and with, with somebody to come in and actually do an evaluation and say, because they’ll come in and do, you know and come in and say, hey, look, these are the, you know, we come in and, and these people are vetted, their, this is their job and you know, they’re safe to work with and go in and say this is where you really need to. These are the critical things, these are, you know, not important things and these are the nice to have and they’ll, they’ll lay it out for you and then you can develop as part of your strategic plan as an organization just like it should be part of your business plan and should be linked to the business plan because the strategic plan for the organization and then the funding, the budget resources, the resource planning and all these things should be baked into the operational strategic plan for an organization. That’s where we’re going in the sector.

[00:49:03.09] spk_0:
Okay. It belongs as part of your strategic plan, your business plan. Alright.

[00:49:50.46] spk_1:
Yeah, and, and that’s where I think that it’s um uh it’s just like I said, I think where a board comes in is to helps understand that so that they could then authorize and, and oversee and ensure that an organization is doing this work and it’s hard work because, you know, you may have limited resources where we’re gonna carve where we’re gonna carve this out. And however, the good news is that there are people who want to fund this, there are grantmakers who are super would be super happy to be able to say, look, I’m gonna help, I’m gonna capacity impact um grant to this organization to help improve their cybersecurity because of these trends that we’re seeing. And so, and then you can use that as a mechanism to possibly help fundraise to offset some of the funny. So it doesn’t have to come out necessarily of your operational costs.

[00:50:23.28] spk_0:
Okay. There are foundations that will fund fund this. Yeah. Alright. All right, we’re gonna leave it there, Michael. Thank you, Michael from Montana, Michael Eno’s Senior Director of Community.

[00:50:26.28] spk_1:
And it’s

[00:51:30.65] spk_0:
my pleasure to thank you, senior director of Community and platform for Techsoup Global he’s on Mastodon at Michael underscore Eno’s at public Good dot Social and Tech soup where you’d expect them to be techsoup dot org. Next week, I’m working on it. Uh, and I assure you that there will be a show next week because this is show number 630. And I’ve been producing a show every week for 13 years close to. So I assure you there will be a show next week. I just don’t know what it’ll be about, but don’t bet against me because there is gonna be a show. You know, you’re gonna lose if you bet against there being a show next week. If you missed any part of this week’s show, I beseech you find it at tony-martignetti dot com. Our creative producer is Claire Meyerhoff shows. Social media is by Susan Chavez, Mark Silverman is our web guy and this music is by Scott Stein. Thank you for that affirmation. Scotty B with me next week for nonprofit radio big nonprofit ideas for the other 95% go out and be great.

Nonprofit Radio for August 16, 2019: Manage Your Programs With A CRM & Co-Learning For Your Programs

I love our sponsors!

WegnerCPAs. Guiding you. Beyond the numbers.

Cougar Mountain Software: Denali Fund is their complete accounting solution, made for nonprofits. Claim your free 60-day trial.

Turn Two Communications: PR and content for nonprofits. Your story is our mission.

Get Nonprofit Radio insider alerts!

Listen Live or Archive:

My Guests:

Jake Grinsted, Leah Kopperman, Kai Williams & Medha Nanal: Manage Your Programs With A CRM
The right CRM can help you run day-to-day program operations: track client relationships and outcomes; host trainings; manage certifications; organize transportation; and more. Our panel was recorded at 19NTC and they’re Jake Grinsted from Simply 360; Leah Kopperman with Keshet; Kai Williams at The International Wildlife Rehabilitation Council; and Medha Nanal from Top Cloud Consulting.





Debra Askanase, LaCheka Phillips, & Kevin Martone: Co-Learning For Your Programs
This 19NTC panel encourages you to look at a more collaborative training culture, which pushes the bounds of who is the educator. They’re Debra Askanase at Oracle NetSuite Social Impact; LaCheka Phillips with TechSoup/NGOsource and Kevin Martone from JCamp180.





Top Trends. Sound Advice. Lively Conversation.

Board relations. Fundraising. Volunteer management. Prospect research. Legal compliance. Accounting. Finance. Investments. Donor relations. Public relations. Marketing. Technology. Social media.

Every nonprofit struggles with these issues. Big nonprofits hire experts. The other 95% listen to Tony Martignetti Nonprofit Radio. Trusted experts and leading thinkers join me each week to tackle the tough issues. If you have big dreams but a small budget, you have a home at Tony Martignetti Nonprofit Radio.

Get Nonprofit Radio insider alerts!

Sponsored by:

Cougar Mountain Software logo
View Full Transcript
Transcript for 453_tony_martignetti_nonprofit_radio_20190816.mp3 Processed on: 2019-08-17T15:38:37.521Z S3 bucket containing transcription results: transcript.results Link to bucket: s3.console.aws.amazon.com/s3/buckets/transcript.results Path to JSON: 2019…08…453_tony_martignetti_nonprofit_radio_20190816.mp3.32272577.json Path to text: transcripts/2019/08/453_tony_martignetti_nonprofit_radio_20190816.txt Hello and welcome to Tony martignetti non-profit Radio Big non-profit ideas for the other 95% on your aptly named host. I’m firing a listener. Steph Marie p. Left this iTunes review on March 11th 2018. Quote content is great. Okay, but universal. No. Gator cancels everything preceding it. Tony often chastises his guests or asks a question and then bulldozes them When they reply, it can get awkward and off putting. For example, a guest started off a response with good question, Tony. And he admonished the guest for saying that rude and weird. End quote. Steph, Marie P. Get off my show off. I want you to stop listening. I do not want you to be listening to my words. You don’t get me. I am in no way going to try to explain me to you because it would be over your head. You don’t have a sense of Well, maybe you do have a sense of humor. I’m not gonna go at home now. I’m not gonna go there. Maybe you have a lovely sense of humor. But you don’t share mine or you don’t even get mine. Let you don’t have to share it. You just have to understand it and you don’t. So I want you off the show. So here’s what I would implore you. I beseech you to do first. Unsubscribes Don’t stop yet. Don’t pause and stop yet. I want you to go. Whatever platform you’re listening is probably iTunes. That’s where your review was. Unsubscribes unsubscribes. Okay, now then you have to do that. Come back. Hit. Stop Not pause because we’re stopping. Stop and go away. Do not listen to this show again. Next thing I know, you’ll be chastising me because I’m lewd and weird to imaginary interns. You don’t get me and you never will. Please stop listening, Steph. Marie P. Get off my show. Oh, I’m glad you’re with me. Now that Steph miree P is gone. I can say that with enormous confidence I’d be hit with favoritism if you beaned me with the idea that you missed today’s show Its program day manager program with a c. R m. The Rite CR M can help you run day to day program operations, track client relationships and outcomes. Host training’s manage certifications, organized transportation and Maur. Our panel was recorded at 19 NTC and there, Jake Grinstead from simply 3 60 Leah kopperman with Cash, Chi Williams at the International Wildlife Rehabilitation Council and Meta Channel from Top Cloud Consulting and Co. Learning for Your Programs. This 19 ntcdinosaur encourages you to look at a more collaborative training culture, which pushes the bounds of Who is the educator. They’re Deborah askanase at Oracle Met Sweet the Sheik, A. Phillips with Tech Soup, NGO Source and Kevin Martin from J. Camp 1 80 on Tony’s Take two Living Trusts Responsive by Wagner, C. P A is guiding you beyond the numbers. Regular cps dot com By koegler Mountain Software Denali Fund Is there complete accounting solution made for non-profits tony dot m a slash Cougar Mountain for a free 60 day trial and by turned to communications, PR and content for non-profits, your story is their mission turned hyphen to DOT CEO. I feel so much better. Burden off my shoulders here is manage your programs with a C. R M. Welcome to Tony martignetti non-profit radio coverage of 19 and T. C. You know that it’s the 2019 non-profit Technology Conference. You know that we’re coming to you from the convention center in Portland, Oregon. What you don’t know is that I am now with Jake Grinstead, Leah kopperman, Chi Williams and Meta Channel, and their seminar topic is not just for fund-raising anymore. Managing programs With C R M zsystems You also know that all of our 19 NTC interviews are brought to you by our partners at ActBlue Free fund-raising Tools to help non-profits make an impact. Let’s meet the panel. They are again Jake Grinstead. He’s founder of simply 3 60 Leah kopperman, director of data and C. R. M at Kesha Chi Williams is the executive director at the International Wildlife Rehabilitation Council, and methanol is seated furthest from me. And she’s the principal at Top Cloud Consulting. Welcome. Happy to be here. Have all four of you. It’s a big panel, but way can accommodate Absolutely. Thank you. So I’m not sure is this is this, uh, let’s start down at the end with the metal. Is this is emerging, or is Am I just not aware that your C R M database can be used to manage programs? You’re welcome to say that I’m just not aware. Yeah. So it has been around for a while, but definitely in the nonprofit world, it is an emerging awareness that it can be used for a program metoo management. Okay. And what, Metta, Let’s stay with you. What do we need to have in place so that we can do this way? Just need us, C r m databases that it, or are there other things we need to have? No. So you have to have the right kind of serum because not all CR ends in the market right now are capable of supporting program data. So you need to have right tools and write features in the Sierra system to support this. Okay, Right kind of cr M. Okay. Uh, so we’ll come back to that because we have 1/2 an hour together. Um uh, let’s see. Hey, why don’t you sort of give us Ah, a headline and a lead? Uh, that anything more? You could say that to introduce us to this. Yeah, I think that while using serums for program management and it’s itself not new, it’s much more broadly recognized. My organization, I felt like even just four years ago, Coming on working on ours for five years ago, people were like, That’s Syrians are for fund-raising. And I’m like, No, this makes sense. This is how it’s gonna work for us. And I had this vision and I was able to find the people that work with, but it wasn’t a conversation anyone else was having. And now I go into a session and everybody’s like, Let’s talk about program management. So are you a pioneer or early adopter? Early A doctor. I think the pioneers were way before me. All right, All right. Leo, what’s the advantage of doing this? Well, I wanted to also remarked that the organization that I’m with Kesha we’ve been using C r. M to manage our program since 2012. So we were really early adopter Warren earlier. You weren’t. You sure you want a pioneer? Why can’t I personally wasn’t I was not with Kesha and 2012 with the organization. I would I would say so. Yeah, I think so. Okay. That’s not a scientific survey statement. It’s just got gut instinct. Think so? Okay. Yeah. Um, Lee also credits herself with being That makes it sound like nobody else believes it. I believe I do believe it. Teaching me how to sign a sign up for a Twitter. He had a start. My account on Twitter. Now we have Susan Chavez is my mind that the show and my company’s works from works as our social manager. But she was not the social manager in 20. We’re not sure where this 2014 or 15. We’ll have to look at what it will say. Joined. Right? Right. My name’s has joined it, I’m sure was maybe Susan can tell us. Okay, maybe she’ll look, I know it was not 16. I know. I’ve been on longer than 16. Okay. Uh, okay. And, uh, Jake, what’s the advantage to doing this? What? Why? Why? Why not just do it Separate different management for our programs? Sure. I think there are a few advantages of having a serum for non-profits programs, and one of them is allowing for more time for your program staff to really focus on what they do best. Focus on their passion, focus on why they were hired, and that’s to actually manage the programs that they have. So having a non-profit serum allows you to cut some of the administrative overhead that doing doing this type of work with multiple different systems, maybe on paper, maybe an excel, maybe in different databases. By bringing that together, you make it a lot simpler and cut down on that time. But what if the comparison is with ANAP location? That’s that’s designed for program management versus managing your program through the C. R. M? So I would argue that if it program is designed to manage your sorry if application is designed to manage the programs, it quite well might be a program crn that’s probably see around. We should probably back-up is giving you Siara here, Jake Constituent Relationship management. So it’s any application that helps manage the relationship that your organization has with your constituents and your constituents might be the people you serve in the fund-raising world. Obviously, it’s the donors and the people who help support you. But in the programme world, it’s those the people that are involved in your mission might be volunteers. It might be the people use serve. It might be others involved with whatever your mission is. All right. All right. So So since I got I gotta go, Leo. Because with grand grand, I’m sorry. I gotta go to Chi because of the grand theatrics that you gave Jake, I have to go back to you. So what are we? Wait, What are we talking about? Are we not talking about, Like, salesforce and razors edge yet for program management, right? We are we talking about Exactly. I would say that Razor’s edge doesn’t really support program blackbaud other blackbaud tools. D’oh! We’re talking about service. We are talking about a fund-raising C r m being used for a, uh, just just a c r M serum that theorems air, not natively just for fund-raising. Those xero ends there for any constituent management, although some are designed very much for fund-raising like Razor’s edge. But sales force. And that’s the reason my order, when we were doing all of our evaluations of many serums, they were out there in 2013. We ended up choosing that one because it was more of a platform that we could use for program management, Um, versus something that was just set up for fund-raising. But CR rims are for everything. I would argue that if you did not have a program cr em, you’re probably using sheets of paper or spreadsheets. That’s really the alternative. Okay. Okay. Well, that’s exactly what medicine to you have to have the right kind of cr m. Yes. Yeah, it’s time for a break, but, uh, Sam didn’t tell me. Now he did. Wagner CPS. They’ve got a free webinar on August 21st Fair labor standards act nuts, bolts and updates. Now, today is August 16th. So the odds of anyone listening live or archive, which means anybody, because that’s only two ways you can listen, if you could just say theon of anybody listening doesn’t matter. Live our archive. You’re wasting syllables here, Thea. Odds of anybody listening on August 21st are slim to xero. So watch the archive. Um uh, it’s a wagon or yeah, we call these waiting to call these things. These wagoner webinars webinars. So this wagon R is the Fair Labor Standards Act. Calculating regular rate of pay and overtime pay for employees or for yourself that counts. You count to understanding, paid versus unpaid time and a lot more. You’ll find this wagon are the archive thereof. At wagner cps dot com, you click resource is and then recorded events. Let’s do the live list or love. I feel like doing it early today. Um, starting native, starting domestic, I should say not. Maybe not native but domestic. Ah, Sacramento, California on Hollister, California and Tampa, Florida. And those were abroad will get their Hammond, Indiana, special Live listener love after Hammond, Indiana. Franconia, Virginia. Franconia, Alcohol Franconia. Know whether it is, um uh, no, that’s Peru. That’s abroad. I wish she would organize his better. Sam. Really? You could do a better job for me. What kind of support is this? It’s unbelievable. I don’t have interns or don’t even get producer support. So also all jumbled up between domestic and abroad. I gotta figure it out. Salt Lake City. All right, That’s, um I guess he would consider that domestic. Yeah. Salt Lake City, Utah Live. Listen, love. After you do New Bern, North Carolina Live love to the new burns. Ah, Hell’s Kitchen, New York. I love I love that Hell’s Kitchen shows up as a separate entity. It’s not New York, New York, it’s Hell’s Kitchen, and that’s the only neighborhood in New York where that happens. We don’t get we don’t see, um, Nomad or Dumbo or Upper East, but Hell’s kitchen specific. I love that. I admire that. How do you How do you do that helps get you probably even know what I’m ranting. I don’t even know what I’m talking about. Um Raleigh, North Carolina. Live love out to you as well. Cool. That’s a Carolina today. Um, Now let’s go abroad With which had a better organized list from Shanghai. Doesn’t do by continent during Times Hemisphere released. You could do atmosphere. That’s only four of those. For Christ sake, you could do atmosphere. It’s only four of them. Shanghai, Shanghai, China Showing how you with us often. Thank you so much for that For that loyalty. NI hao Ni Hao and Seoul SEOUL, South Korea Also so such loyal, loyal, live listener love the soul Annual haserot comes a ham Nida Mexico CITY, Mexico Witnessed our days when a star dies. Mexico City and Tehran, Iran. You’ve been checking in occasionally. Now, Tehran. Thank you for coming back. Um, our keep. Ah, Peru. That would be Ah, put yours up. Portuguese now? No, the only spanish. So I ve been a star days When a star days for arctic quip Peru Thank you for being with us. Um, that’s everybody abroad. And, uh so live lister, love. Thank you so much for being with us and the podcast pleasantries. Because we have over 13,000 people listening in the time shift and the pleasantries go out to you wherever we fit into your schedule. I’m grateful pleasantries to you, and we know that we are minus one. Where ah, 13. Like 13,500 minus one from now. Going forward. Not just this week. I’m not going to say her name anymore. Uhm And so why did I wait till you may be wondering why that we tell today this review from, uh, that person was march 11th 2018. I don’t check that often. I don’t I don’t look at the reviews like every month even, uh, but I have seen it. I have. I’ve seen it long before today. I just was ignoring it in the past. And then the last time I saw it, I don’t know. Whatever it was a month or so ago, it annoyed me. So So that’s why that’s why uh, no, I haven’t been annoyed for for these 18 months since March or something of last year. But I’ve been annoyed for the past week, a month or so, and now I’m over it. Therefore, we’re moving on to Ah, what we’re doing. We’re continuing, of course, with Jake Grinstead, Leah kopperman, Chi Williams and methanol talking about managing your programs with Sierra. One of the fundamental differences is that in fund-raising CR M in fund-raising world, right, The kind of fund-raising data that every organization maintains is fairly typical. So whereas for programs, that is a huge where I d And so your CNN system needs to be able to store and manage all those different kinds of data, that’s a prerequisite to be used as programs. Okay, Okay. Uh, so you were just backing up a little asking about, like, different kinds of Syrians. I’ve certainly worked in social service agencies where in the past they’ve had what’s called a case management system and that really is what the social service frontline staff would use to manage the clients that they work with. So that’s really very parallel Thio, the kind of idea that we’re talking about a program management system and the advantage of not having a separate program management system and a separate fund-raising system is often there’s overlap between who your constituents are, and somebody who participated in one of your programs may very well end up becoming a donor or somebody who participate. Somebody who’s a donor may become a volunteer, and if you’re managing your volunteer program and you’re managing your client base through the same system, then you have up to date information and email addresses. Postal address is interests, etcetera, and so you can use it both for the client and and for the fund-raising. All right, so I think I’m trainable here. But let’s make sure so you can have a generic C R M that will manage fund-raising and Andi program operations trainable. I would take this a step further and say, In addition to what Leo just said, your program crn might often be very helpful to your development. Your fund-raising department. There are so many times where your fund-raising team are going to need to ask the program team for certain statistics and reports and data about the programs that they run because they’re gonna need that for their grants and etcetera to do their fund-raising. And so if the data is in the same place. If everyone’s using the same tool, the same crn the development staff would be able to have access directly to the reports and the information about the programs that are being run without having to tie up program staff. Time to actually pull those that information separately. That’s another advantage of bringing those things together and what xero. OK, OK, in your program description. Have you done your program already? You have your on the downside. It’s great. Okay, um, nobody came with a glass of wine in the bar is open, even my drink. Okay, Jake, that is not water. I guess that’s vodka. Leah has a metal bottles. We don’t know what’s in that. Two women down the oak. That is already finished. I think I That’s Jim, not water. Alright, So good. I’m glad I’m not hindering the fun and excitement part of social part of 19 nineties E for any of you. Okay, so in your program, in your session description, you take off a whole bunch of things that can be run through a c. R. M. Tracking client relationships and outcomes run training’s manage certifications, organized transportation. Is it worth taking through. Is there enough to say about each of these about how the C R M should can be used to do each of those things? Or is that too much in the weeds? The way that we handled the panel was each of the four of us did like a case study, where we talkto sort of soup to nuts how we use our serum to manage one particular thing. I don’t think there’s enough time here to run through, but that that is how we handled it in case studies. My brief. I don’t know if you’ve got a little example of how shit uses when it might be helpful for sure so way. But we can. We could do brief examples. So you each have a different CR M doing something different. Yeah, because because all the organizations that we are working with or at our do different mission and Jake you’re the consultant here. No, I actually 36 from the founders simply for 60 were actually creating a C. R. M that is designed for programs. That’s why we started something for 60. I work from non-profit where we found it frustrating that we couldn’t find a good program. Cr m. And so with that organization I actually started and founded simply 3 60 to do that to fill that need. Okay, so in the session, I actually talks about one of our founding clients s O, That I use that as a case study and represented them talking about how having a program crn for them has been so helpful thing. American Camp Association of New York and New Jersey. Okay, Okay, I’m willing I’m willing to hear the case is from each of you, But you realize that we don’t have 75 minutes. So So I know on dhe. I appreciate that you aren’t all nodding, is it? But what happens when you start talking? You get into your stage hit, and all of a sudden you’re three minutes. Story becomes 12 minutes, and then we’re out of luck. So I have to cut off everybody else, and everybody will be pissed off at you. And they’ll wonder why they didn’t go to the drinks instead of coming here. Should have drinks. Why? I waste my time here because they didn’t get to tell the story. So everybody gets, uh, okay, so we’re 13 minutes. We’ll make this the longer sessions as 27 figure. We spent a minute bantering, so we’ll go to 28 which is about 15 divided by four. I’m impressed with math, but I haven’t finished it yet. 15 divided by four is less than four. It’s like three minutes and 1/2. So everybody gets about three and 1/2 minutes. I’m gonna I’m gonna try my best. All right? So everybody gets three minutes and 30 seconds on Duh. At the three minute mark, I’m gonna let you know that you only have 30 seconds left and we’re gonna hold you to this s o I since I feel bad. That meta is sitting at the end doesn’t have a devoted Mike. And I feel second bad for, um, for Kai, who also is has to share my So let’s start at the end. With Metta, you have three and 1/2 minutes to tell the story at, um top cloudgood. The top cloud consulting shared in the Okay. Get closer to the study of one of the clients I work with. The organization worked in the areas of health and wellness. They programs such as individual and group therapy for physical humans on wellness programs. So before I started working with them, they were managing their data. Alden spreadsheets. It was spread all throughout the organization with all the program teams. Every time that the team’s wanted to pull any kind of report, they were pulling that out of individual spreadsheets and manually formatting into the desert former and that was taking them days. Thio create a report. So number one it was a giant waste of organizations. Resource is on number two. Everybody knew that pulling the report was like pulling teeth, so they were not even using reports as much as they should. So after we moved there, they tied to the Syrian system. The reports were quick, instant, instantly available up to date, not for five days old on the organization started using reports as a feature much more frequently because it was available so much more easily. That’s so concisely I didn’t get to give you a warning. Uh, you’re here a little more You want to say Okay, tell our stories, and maybe, maybe maybe maybe the host will develop some questions. You black lackluster. Who’s No? No, you still get your three minutes? You still get your three? What? I say three and 1/2 actually. Three minute warning. He’s cutting it down, so I don’t know, You know, meta exceed XL, but you could be You’re welcome to be lackluster. Please. OK, eso I work with the International Wildlife Rehabilitation Council. We provide training and resource is on wildlife rehabilitation. We have membership. We have classes, we have certification. We have a practicum. We use our serum to manage all that often. It’s the same people doing all of that. And then maybe they have an extra $5 they’re helping us out with the $5. Or maybe they’re volunteering for us. So we get to see all of that before we have C R. M. We had an old system and we actually lose data. Wait, hold on. I’m sorry, Amy. Sabat Ward, Stop distracting the guest on top of radio. You had your chance. You had your shot. Just distracted CEO of intent is distracting, distracting Leah and J everybody making this wave on camera. All right, I’ll spot you an extra 15 2nd All right? Yeah. So before we had our modern serum. We were losing data like we have a registration that would get lost because the system in between one server and the computer, it would just disappear. So we have people showing up for classes and we have no record of them. Really. A lot of issues with trust, all sorts of problems. So with the modern serum were able Thio one have everything in one place. I know to trust our data. We haven’t come directly from our website into our system. We’re able to track our measure, tracked measurements, assessment of how the students are doing, how they’re engaging with us. It’s It’s quite an interesting set up, Andi, I guess I want to mention one interesting thing we found as we talk about our case studies because they’re all very different. You know, I’m contracting with hosts and doing sending certificates to students and all the stuff that happens in between there. But we found this similar framework. We are all even though our products are very different. The steps we need to go to are very similar and so we’re hoping to kind of create some data models for other non-profits to dues to be ableto have program management CR ems. And how are you? How are you collecting that? Well, I’m working with a couple of different groups on that, but user user studies just people. It’s really just people like the four of us getting together and walking through these scenarios and saying, Oh, okay. This flows into this, which is this, and this is always an assessment piece. Even if you might not call it assessment. This is your registration, your enrollment, something that sort. This is your program piece. Oh, this might be an add on. If you have a case management your assessment might be Did they find a resolution? But there’s these really core similarities, and so I’m excited to see where that goes. Okay, I appreciate that. You actually did accept my admonition. Thio keep things concise. Haven’t given a three minute warning yet. Okay, now, Leo, don’t blow it, okay? I’ll do my best. Really? Okay, so So it kiss it. We air the LGBT Q Jewish organization in the US, where national and focus on our mission Shin is too have full inclusion of LGBT Q Jews in Jewish life and one of our programs that we do is where we train the leaders of Jewish organizations to have more inclusive environments for sorry for Jews who are participating. And it’s not the water over the vodka. So we that we do in sort of regional programs and we do a year long program, say, in Chicago, where the Jewish Community Center and the bunch of synagogues and the, uh, I don’t know if there’s a Jewish community foundation. Whatever the Jewish organizations are in the area, they all commit to this year long program and we offer them training and help them set goals to make their organizations more inclusive. And we provide them with coaching services over the course of the year and the way that our Sierra Miss and then at the end of the year, they you know, sort of report back to us through a survey about, uh, how they felt about being participants. And so the way that we manage that program with our serum and we happened to use sales force is that we way use existing data in the sales force. Instance toe understand what communities might be the next ones to offer a program in right Well, look, we’ll see. OK, we have enough people, maybe in Cincinnati, that maybe that’s the next community. Well, where will offer a program? And then we can do marketing using that C R M to the all the Jewish professionals working in Cincinnati and and advertise the program and reach out and say, We’re going to be running this and will you enroll? Then we have a sign up process where organizations will sign up and add the that information about their organizations baseline measures of where their organization is at in terms of Do they have gender neutral bathrooms? Do they have a new LGBT clue of LGBT affirmative group in their community? Do they have a bullying policy? You know, all these different kinds of measures. We asked them up front when they fill out the form and they tell us where they are, is a baseline. And then they, during the program, set a bunch of goals. Those all their goals go into our serum and then our coach has access to all those goals and works with them over the course of the year. Two. Help them reach those goals. All those girls also populate a dashboard that we have in the serum, that our executive leadership can look at any time and see 80% of the current leadership project. Participants are you know, they have started on 40% of their goals. They are still waiting to start on 10 and they so we can see they can see the progress without having to ask anybody. That’s just there in the dashboard. And our fund-raising team can also use that to make a case to a donor because it’s just right there in front of them. They can log in any time and do that so and then at the end they do a survey and we and we find out one of the things we want to do is change mind set, openness, three minute warning, okay. And we want to change the mindset of the participating organizations. So we asked them at the end did they see new opportunities for LGBT inclusion in their communities. And one of our measures is what percentage of organizations reported that and we have about 80% of our participants reporting that they did see new opportunities for inclusion. So it’s been very successful all right, Jake. So yes. So one of my founding clients, the American Camp Association of New York and New Jersey. They are an affiliation of summer camps in the United States, and their mission is to help in rich lives through the camp experience. So they help train camp staff. They help parents figure out which camps to send their children to and just generally promote the can’t summer camp experience in United States. Um and so I want to touch on another potential benefit of a program serum that we haven’t been touched on already. But we haven’t properly articulated yet, which is the benefit that it can give to constituents themselves. So the people who are actually benefiting from the program can really benefit from their organization having a program xero. And I’m gonna give you an example of how at the American Camp Association of New York and New Jersey, they have this amazing program. This wonderful lady there named Rene, who is in charge of helping parents find the right summer camp for their children. And she works oftentimes one on one with parents to help them find the camp. It would be good for them and so what we were able to do once we had all of the camp, all the member camps that are affiliated with this organization into a program. Crn we were able to start exposing that information on their website directly and gave parents a chance to go to the website, fill out a form as to what their children might be interested in. You know how long the camp should be, How much it should cost nb be able to actually search for summer camps right there on because they had now this one see Iran, where all of their camps were together. They could trust that the information that was e-giving that was being given out on the website would be accurate to these parents. So then parents could actually indicate that they were interested in the camp camps, then had a member’s portal through the sea Iran that they could log into on dhe. Then camps could see which parents had indicated their interest. They could also now register for training events. They could basically take advantage of all the benefits that the was giving them. So by using simply 3 60 in this case, they were actually able to give both their member camps and the parents that they served better access to their own information to the information is in the system and better serve them with the programs that they have. Can anybody else site benefits to the those they’re serving constitutent people themselves? Well, maybe not people, but the environment. The what? I like Jakes. He didn’t say it, but he has one aboutthe texting. Oh, sure. So another organization I’ve worked with has they run programs for kids, toe, get kids out into the countryside for the summertime incredible organization on. And they they have bus loads of children that get on the buses at the Port Authority. But you work for me, work for any schools, or is this all play time for this is this is a thing. So what happened is I was in college in London and I found, became a counselor to summer camp, and that was it. Camp was like the rest of my life. I was obsessed with this. So this organization runs five summer camps, and the kid’s got on buses. They went out to the countryside, but then, when the buses came home There was often this situation where parents might be late to pick up their children or they didn’t know exactly when the buses would arrive. Maybe the buses would come early. And so, by using a program, Sierra and we suddenly had this ability to send out mass text messages. Two parents, as the buses were sort of a narrow waves. Often, arroway whatever and say, Hey, just so you know, your child’s on their way home, Can’t wait to see you. Please make sure your at this place at this time and that we hadn’t even anticipated that this could be something we could do with a program. Xero. So what we actually talked about in our in our session was this idea that there are sometimes these unexpected benefits as well on dhe. This was a great one for us. Yeah, you’ve been You’ve been listening for a while. You have a question, But you have a question you like to ask. Oh, okay. You know what? I’m gonna shut you out. What’s your name? Joanne. Joint. Crabtree joined Crabtree from Washington from Washington non-profits in Vancouver, Washington State of Washington. So Joanne missed a session not just for fund-raising anymore managing programs with the arm zsystems and came here to listen to this. 30 minutes, 30 minutes. Short version. Thank you, Joanne. Thank you very much. Check out non-profit radio. We have way. Have lots of good panels. Not This isn’t the only one we do lots of good stuff. Thank you, Joanne. Okay, Um, we just have Yeah, okay. Anybody else want to shout out? Ah, a constituent benefit. Because I think that we’re here for the people or the environment or the animals. We’re, you know, we’re serving anybody else Want to shout out a constituent benefit, but has to be in, like, 30 seconds? Okay, Get much closer in one of the organizations that I worked with the program data and fund-raising data was separated on the program. Later was once we combined the two systems and brought the program later into the CIA room along with the fund-raising data, it’s suddenly help. The organization will stop, get along with each other much better, because previously, there was a lot of this manual data exchange between the two teams and the teens were frustrated, like concentrated, questing and not receiving the data that they want benefit not only to the recipients, but to the provider’s as well. All right, we got to leave it there. Thank you so much. Thanks, Tony. Oh, my pleasure. My pleasure. Thank you’re welcome. They are Jake Grinstead, founder of simply 3 60 Leah kopperman, director of data. And see our Emmett Cash Guy Williams, executive director of the International Wildlife Rehabilitation Council. And Mitya Nadal, principal at Top Cloud Consulting. Thank you. Thank you. Thank you. Thank you for being with Tony martignetti non-profit Radio coverage of 19 NTC. Thank you, Joanne. Joanne Crawford. Thank you. Are our audience member for the panel. And of course, all our panels are brought to you by our partners. That act blew in while we’re here in 1990 Sea ActBlue free fund-raising tools to help non-profits make an impact. Thanks so much for being with us. Need to take a break. See how Sam gave me the proper proper See when I get good support, the show runs. If I could just get decent support from everyone, we need to take a break. Oh, I said that host sucks. Cougar Mountain software, Cougar Mountain software quote We use Denali Fund for non-profits. It’s easy to track how much is in each fund fairly simple to use, and the training to be helped the training to be very helpful. I need an intern so bad, so I have somebody to blame for this ship. Copy. It’s unbelievable, and the training is very helpful and thorough. Customer service has been responsive and caring. End quote. That’s Laurie D. Oh, God, Lord, he’s from a church. I’m sorry. I don’t know if Laurie Listen, Um, another quote. All the features of a sophisticated fund accounting system at a reasonable cost. End. Quote. That’s Kim T. From Lawrence Township Cookie Mountain software. That’s what this is all about. They have a free 60 day trial. You’ll find that on the list in our landing page at tony dot m a slash Cougar Mountain. Now time for Tony’s Take two living trusts. You start your plan giving program with charitable bequests. That’s definitely the place to start. You’ve heard that mantra many times from my lips. If you want to go further and you don’t have to, you could just stop with requests and have a very respectable, planned giving program. But if you want to go further living trusts or revocable living trust. That’s an excellent next step. It’s easy for everybody to understand, for you and for your donors. My Living Trust video is at tony martignetti dot com, and that is Tony’s Take two. Let’s do a live listener love update since we did it early Now more people have checked in Ann Arbor, Michigan is with us. New York, New York, New York. See, I’m sorry you can’t be in Hell’s Kitchen in New York, New York If you were in Hell’s Kitchen, you would have got you. We got shouted out as Hell’s Kitchen, but you’re elsewhere. Just New York, New York. But glad you’re with us. Live, love to you. And also Osaka, Japan, Japan. Checking in. Thank you, Konnichi wa and young son, South Korea. On your haserot comes a ham Nida. Thank you for joining us Live love to all of our live listeners. And now it’s time for Cole earning for your programs. Welcome to Tony martignetti non-profit Radio coverage of 1990. See, that’s 2019 non-profit Technology Conference. We are in the Convention Center in Portland, Oregon. All of our 19 ntcdinosaur views are brought to you by our partners at ActBlue Free fund-raising Tools to help non-profits make an impact with me Now our Deborah askanase, Latika Phillips and Kevin Martin. Seated next to me is Debra. She’s the social impact manager for capacity building programs at Oracle. That Sweet Shikha is a program manager at NGO Source and grantmaker. Success four. NGO Source and grantmaker maker Success at Tech Soup, NGO Source and Kevin Martone is technology program manager at Jay Camp 1 80 a program of the Harold Grinspoon Foundation that was the longest I’m out of breath already with dellaccio sources into Kevin is a program, but he’s not the foundation, but he’s a program Oracle Met Suites. Two words. I’m exhausted already. Introductions. OK, your program topic was Reinvigorate your programs through multi directional learning. Let’s start with down the end. Kevin Martin, Please let’s define our terms. What are we talking about? This multi directional learning? Great. So Avery jargon e-giving drug in jail on non-profit radio. It will get the three of you out of jail in our session. We definitely We started pretty early explaining what that actually meant. So Okay, so I’m not the only one I know So So, um, really, the the session in this topic is really about his, you know, Traditionally, sessions are one way there’s someone on stage, whether it’s a lecture or in a webinar or some other training’s environment, who all the knowledge is going from that person who’s the expert to the audience. The learner, right? So multi directional is. I’m not assuming that that person has all the knowledge in the room that instead you’re embracing the fact that everyone in a training program has knowledge and expertise. And so you have learning from learning toe Lerner, Lerner, the teacher and teachers. So it’s all different direction, really, So So can I expect to pay less for conferences in the future. And I’m part of the training staff. I should be Compton right Free hotel E. Get free airfare. Compton. That would be good. I’m teaching. I’m in the audience, so it’s still hard work. It’s hard work. Thio create facilitated session that does multi directional, But I’m in the audience. I gotta work hard too. I should be to learning more my voice just alright, theoretical. I’m learning more. All right. Um, Jessica, why don’t you help us? Uh, bring us into the topic little bit. Give it like a headline in the lead. So why we needed this session? Well, we definitely needed the session. I think that it’s time to begin the show organizations how how to turn traditional events into something that is Maur engaging something on opportunity for everyone to contribute to these different solutions. And I was needed for organizations non-profit or for-profit. But I was as to be a part of it because I attended two different multidirectional events through next week. Oracle build a thon events of four NGO sores and in that in those opportunities for me because they were multidirectional and because it wasn’t just someone just giving me information. Given my team information for us to download and and to turn around and apply, I was actually with a team of people I was learning at the same time they were learning, and my goal throughout this whole process was to basically eliminate the time or decrease the time living in time. But decrease the time that I was spending on a billing for NGO source. And when I started this process, it took me over 30 hours a month. So process building for our team. And because of the multi directional opportunities with nets with Oracle, I’ve been able to get down my building process to less than 10 hours. Now, had I been in just a one on one session with another person, it probably would have taken me a lot longer to get to where I am now. But we had we working in teams, and so we’re all learning we were all contributing to this process. So that’s how that’s how I see it working. And I think that if we begin to we non-profits begins to look at what we’re considering. Traditional events, for instance, Webinars and think of ways that how we can actually turn those upside down to have Maur engagement to have more involvement from everyone. One. Okay, Debra, um, this sounds to me like anarchy. Why not? Why not gonna be a free for all? Well, trouble, trouble. It always sounds like gold, but it isn’t. The session was designed with the belief that everybody in the room has the answers. Right. So you walk into whatever you’re designing, whatever programmer event you’re designing with this theory that at the end of it, everyone’s experience is so much more enriched because his answers aren’t coming from the quote unquote experts. They’re coming from the people who are also doing the work out in the field or living the experience. And they have just as much validity with what they have to share as others. So a good facilitator. You have more of a facility, Kevin. Kevin was getting to this. You have more of a facilitator than a presenter. There can be some presentation elements. Like a good facilitator has figured out how to make the experience a shared facilitated latto next-gen facilitate these. I have facilitated you. Have you facilitated or just attend? Have Kevin Martin still three facilitators here? Well, as well as attendees in Yeah, yeah, yeah. Okay. I’m focused on. Yeah, one step at a time. I know. I just stands multiple. We all can learn from each other and you multi directional. All right, is co learning the Is that just a synonym for multi directional or is co learning something different? Anybody? I would say it’s elearning. It’s similar. Um, so yeah. All right, so we’re expanding the idea of who’s the present? We’re gonna learn from elearning elearning for everybody. Um, the advantages. I made them clear. We all have something to contribute. Not only the person on the lectern, but we all Okay, so should we talk about how to organize your next staff training? That’s so so that so that it can be co directional slash multi directional slash red, amber green. Kind of learning. I don’t know what traffic lights. No way. Like our next staff training. So I remember our wedding too small and midsize non-profits. That could be just two people. They’re called learning all the time, but let’s say it’s university. Some Let’s colleges, universities, hospitals call mid size. They’re doing lots of staff trainings. They have faculty meetings. They have dr meetings. They have, uh, other provider meetings. Learnings. Training’s right in service. We can We can use this. Yeah, yeah, yeah. Okay. At our session, we actually have people to read is I’m just nothing. All right. Even though I suppose the, uh but all right, I’m stuck in the old model like I’m a dinosaur. I mean, an anachronism. Um, the person at the I’m gonna put in health care setting. But the person on stage has her master’s degree in nursing degree. She has a master’s degree in nursing. She’s got an MBA, and staff is all you know. They’re the B s ends and the R ends. No masters degrees. We still should not all be learning from the person with the MBA and the Russian downstage. And we should also be we not all should be learning from the person with the MBA and the master degree in nursing. Doesn’t she have the most into a part in the room where we’re just all a bunch of B s ends and our ends? I would say that well, number one, there is still a place for the traditional, right? There’s gonna be times where somebody is the expert who’s coming in, and the goal of that session is to get their knowledge to other people. But in the example that you just gave, those are ends who were in the crowd they have experienced in the field. And so some of that experience might be helpful to add to what the expert is saying may potentially in more theory, where’s they have more on the ground experience so they can share that with each other and with the presenter. And like never says that enriches everyone’s now the thing that was a bad example. Also that ahead of the training right, there’s this belief. The expert often has the belief of what the people in the audience want to learn. And so there’s work ahead of the training, with Cole earning as well where you can ask people. Well, what would you like to be happening in the training? And what would you like to get out of the training? And I believe that’s a piece of it, too. That’s multidirectional where that their their direction is coming from their audience. Okay, okay, let’s start with Jessica because it’s been a while since you got a chance, Doc. So we’re going to set up this staff in service training? Um, let’s keep it in the health care vicinity. What we wear. Deborah’s just saying lead. There’s lead time preparation time. How do we get started setting up our next staff training this way? Um, great question. And we did talk about this in our session I raised for I feel like for great points. Okay, They were they were not ego problem. It’s good thing we stuck you in the middle. So s so to get started. My recommendation was the number one. It’s the first of all. Think of the roadblocks. What roadblocks do you think? Well, actually, let me if I can rewind just a bit, I’d say that the number one step would be to discuss what is the goal? What is the overall world coming together? What is what do we want to get out of this? Okay. And then from from that, then start to think about what are some of the roadblocks that would actually hinder us from turning this traditional event into a multi directional. What are some potential role blocks? And then I said that we need to think about the time, the time. That is gonna the time that is going to take for this to happen. What are the time restrictions for this? What time needs to be invested in the beginning? Because I know. And for me, when I participated in the opportunities with Oracle Net suite, there was so much time invested into our team beforehand. I mean, at least 10 hours, and so that’s something to think about. You know? Are you willing to invest that time and then distributing that, distributing those responsibilities? And then I say that we need to think about what are some of the disadvantages actually of flipping and event, because there could be, You know, as Kevin said, there is definitely still a place for those traditional events. So we have to think about that. And then, of course, what are some of the advantages? So I think once you map out those four things in addition to the goal, I think that’s definitely a great a great start. So in the instance where we are having a you said, that’s a staff meeting and we’re gonna have something. So then again identify what is the goal? What are we trying to learn? And then, I think, identify people within the community who have some experience in that they may not be an expert, so to speak, but they have a lot of experience, and so I think that that’s also helpful. And then there. I think that it’s also helpful to have people who may not necessarily have hands on experience, but they do have some knowledge of what we’re talking about, because then they also have, uh, some, you know, they’re able to make some type of contribution. Okay. Okay. Uh, Debra, what are what are some of the potential roadblocks that mentioned might exist? Thio Converting your training thio, multi directional, multi directional multidirectional. Debating what the training is, of course, will be different road blocks ahead of time. There’s the time that you put into it by redesigning, rethinking, getting out of your space that you’re used to thinking about. I think that’s hard. It’s also it can be challenging to get buy-in from your organization for this new kind of not only just programming event, think about like a fundraiser that you’re having. How would you incorporate it multidirectional in that If there’s a near some training element of that, it can be challenging to get some buy-in. The other roadblocks that ah, that could happen is so you have the multi directional training and it turns out the other directions are not so interested in contributing right. What happens then? I think that that’s very real. That has never actually been my experience Does That has never actually happened. But you do have sometimes less participation than you would desire. For example, time for our last break turn to communications, PR and content for your non-profit. They help you tell your compelling stories and get media attention on those stories, as well as build support for your work for your mission. They do media relations, content marketing, communications and marketing strategy and branding strategy. There a turn hyphen to dot CEO. Finally, a sponsor message that was uneventful. Chase got butt loads more time for Cole earning for your programs. I want it. Well, I’m gonna go to Kevin and I want to talk about some of the crew’s some of the advantages of doing this aside from what we’ve already identified a few times, everybody learning from everybody else. And there’s so many different perspectives in the audience, and we bring all those perspectives in What are there other psycho social advantages that we haven’t talked about? Whatever. I mean, I would say things you just talked about are the main advantages. But I know those are off the table. Yeah, so for in terms of our attentions fan, I think I know leaving a lot of sessions and helping with managing conference conferences. Phones come out pretty early in a lecture. And so, by having these multi directional options where you stop speaking from the stage and you give everybody option the top talk and share it gets them back engaged in the energy level gets up often in the session. That seems to be the other big. Yeah, I could see different voices. I mean, I know when I speak, I have not done go learning, of course. Not sure that I ever will. But big ego ego problems, you know, But, um, irrespective. So what I’ve done so far, You know, I noticed attention perks up when I start asking questions. I started asking, and I don’t I don’t like to leave questions till the end. I take questions. So I guess I should say, When I start accepting questions, people start raising their hands. There’s different voice, you know? Said, Let’s start popping up the other. The other half of the audience wakes up, you know, I’ve got results to speak of it. That was funny. Labbate would have to sleep off the street. Nobody, nobody, nobody Just take it seriously. I probably I could see I think that is true. I could see that. At least they weren’t using their phones way. You know, I just point I do see voices or, you know, people broke up with other voices are heard throughout the room in questions. Yes. We’re gonna mention think about the traditional weapon off. Right. And you were right. And you can see your analytics. Where, like, Oh, look at all these people. They’re not Actually. Live your weapon on what you can’t say. You can see. So if you can think of turning the webinar upside down dafs multidirectional learning, I suspect the engagement will go away. Okay. Okay. Um, time limits time. Need other Latika. Talk about that. Okay, let’s let’s go to That’s our preparation. So where do we go now? It’s a day off. Are we in day of way. You know what? There was one thing some, uh mentioned pulling. You talk about pulling in advance, finding not only what you want to learn, but whether whether people will participate, can you? Let’s talk about how do you find out whether people will actually participate? So you don’t end up one U unit directional when it’s you intended go. Directional defendant Multi direct depends on what it is for the build with on events that we run, for example, we make it really clear. First of all, we assign a team captain on the net sweet side. And then we assign a point of contact on the non-profit side. And we say at the end of this event, you will have to present not the employees but the actual non-profit customers so that they present their learnings to the other customers and we sort of designed the day. So there are no surprises. It’s really clear this is what’s going to happen if you’re participating in it. And so I think you complain. I mean it that way, where everybody walks in with a showed expectation of what’s gonna happen. Okay, Okay. I was envisioning an event that’s different where it’s not all everybody presents at the end. But we’re the role learning from each other during Kevin run by an event like that can happen. Okay, How do you make sure that audience members are gonna participate in the way I just described? I think I mean, it’s well liked. Ever said it’s definitely part of its preparation. So like there’s actually a book called The Art of Gathering by Preah Parker. And she talks about the meeting or the training or whatever the gathering is. Starts as soon as you invite someone and yours should be spending time preparing them to let them know So, for example, there’s a there’s a communications training that I do. And in one of the first communications I have with any of those participants, I asked them to send a photo of themselves. And I’m very clear. I’m saying, when we do webinars when that photo shows up, that means you have to speak. And so it’s like you’re gonna get called on. And so it’s sort of prepping them to say It’s not just me talking. You have to be ready. T share your experience. And so there’s little steps like that you could do in advance to just prime them for when they get there that they’re gonna be speaking and not just listening. Okay, Okay, what do you do? Anything. Anything different in terms of preparing the audience? E. I think that it’s also good to identify everyone’s role. So if we are looking at the model that we’ve talked about teacher, teacher, the Lerner, Lerner, the teacher and learn it’s a learner. But even within that, I think that rolls should be defined for day of plain that a little bit. So when we participated in the build a thon, it was very important for us. Well, for me, toe have a note taker. There was so much information being exchanged, and it was just impossible to gather information to retain it and also apply it all at the same time. So there was one person that we designated to be one that was actually documentation. So that way, when we leave, we have steps. We have everything documented for the future and to move forward. And I also think that it’s important to identify who is actually going to be. If it’s if it’s an event set up where you can actually begin to apply and move forward with action steps at that time, that I think it’s important to have who is going to be that person? Luckily, we were able during the building down to actually go live with a lot of the different things that we were building, you know, we didn’t have to wait for testing. We were able to go live with that. But it was important to identify who was gonna be that person. Also, to identify who’s going to be in charge of accountability and follow-up. Because once we leave here, then then what happened? So it’s important to know what the next steps are. And did this actually work? Was this really beneficial? And it’s hard to really? Well, I was going to say it’s hard to tell day of for me. I I knew at that that day of the building time that this was very beneficial for my team. I just knew it. But you actually really see the results weeks and months after the fact. So the follow-up is very important. So just identifying rolls and who’s doing what, even though we’re all learning and we all have the answers. But then how else are we contributing here? All right, all right. So we go to a day off now. Okay. Let you go. Stay with you. What? What is this? What does it look like? Day off is It’s like this is the room, like, start with the room. Is it set up the same way with a traditional seminars. Yes, it set up the same way it could actually be set up in and broken off into groups that I don’t really think that there is a right or wrong way to set up something like that. I think that if it is set up in a traditional, for instance, classroom style or meeting south, I think that you can also even incorporated a workshop section where people actually kind of break off. So I think that that’s fine. I don’t think that the way that this set up is that Okay, that was a question. Well, it was interesting to me. I’m a newcomer. Yeah. In our session, they were in the traditional meeting style set up. And when we asked them to do some of the breakout work, right, the co learning, we thought we said, Turn to the person next to you. We said sorry. Away from the like, turn to the person next to you. And instead they all said, Well, can we just get up in form groups based on what we want to talk about? And they did. Oh, yeah. Okay. Well, anarchy way. Well, let’s just go with it. Well, yeah. Community wants it. We’re supposed to hold it. It’s supposed to be supposed to be learner, too. What did you say? Audience to learn a teacher. I was wondering if you’d said no. You lose all your bona, fide, all your credibility Credibility. Yeah. No, it was so much fun, to be honest, I don’t know. I’m lecturing. We’re doing it my way. Um, okay. What else? What else do you want to go, Debra Day of? Tell me about what they have. Looks like we still got a few more minutes. Why don’t you want to give me a model? Work with her? You wouldn’t listen. General Health care. Mom, Your healthcare mind your model. Our nurses, nurses training day on on infection prevention, post surgery. So a couple of key pieces start with sending expectations. Make sure you have different voices the day off, and then make sure that there’s time built in for the teacher. Loner, loner, loner, loner, teacher. Right. So if you start with setting the expectations that setting up the room at the beginning, what’s gonna happen is structured time now, as Lucia was describing. But is it always where there’s structured time for the cold learning or you can’t just raise your hand and say, I have a point that I had used my downstage hand again. I have a point that, uh, that I want to make to the group. It doesn’t work like that. I think that’s informal elearning if you want to set it up for sort of formalized elearning that I do think we need some structure. Okay, Yeah. And so once you set up the day and then perhaps you’ve set the stage for what is actually gonna happen. So maybe there is a little bit of a training for 15 minutes. In the beginning, that’s like, this is the information you have to know. And then and then the important pieces. Well, how are you going to take that and add to it by the goodness of the intelligence of the people in the audience? And you have to build. You have to bake that in in some way, whether it’s an activity and there’s lots of great books on, like how to plan these kinds of activities where people learn from each other, um, or whether it’s an ideation exercise right and people spitball ideas. And then they turn to each other and talk about them. And then they iterated again, whatever it is. So that’s their learning from each other. And then at the end of the day, there has to be some way in which the learning is consolidated. So there’s the learning, Frito, that happens, happen stance in different groups. But then they have to learn from each other. Like, how did the groups each develop? And how did they exchange of information with each other? So you have to You just have to organize it. Facilitated is there Is there a resource that you gave out or that we can refer people to their white paper? Awesome, Reese. Okay, what is it? Tell us. Where can we find I? Actually, the first name that I can’t That was the multi multi directional bingo card. Okay, I know. It’s just basically a It’s a chart. And we, um we list 88 different traditional events, and then we have every every dynamic teacher to learn a learn a teacher Lerner, Lerner and so in the chart, the goal was to have the participants took him. Plead how feels different exchanges are happening for each one of these different traditional events. And so, yeah, we do wear working. Listeners find that it’s on. It’s in the collaborative, knows that it is in the collaborative notes. So you go to end 10 dot or GE go to the euro in the 19 multi-channel half, and then you know you’re well, we’re in 1980 CEO, and then your your session hash tag is multi path. Okay? And that’s where this resource is. That bingo card called a bingo card anymore. It doesn’t look like you find only because we were using that as our as our game as I workshop piece help the because depends to begin to start rebuilding their events. All right, we’re gonna leave it there. We’ve identified the resource. We’ve defined what the anarchy looks like. So I encourage you do not have the ego that I have and actually attempt this. Try this because we can all learn from each other. You couldn’t learn from each other. There wouldn’t be podcasts. That’s what much Give your altro out your outro. Deborah askanase, seated next to me is social impact Manager for capacity building programs. at Oracle Net. Sweet Machiko Phillips, his program manager for NGO source and grantmaker success at Tech Soup, NGO Source and Kevin Martin is the technology program manager for Jay Camp 1 80 which is a program of the Harold Grinspoon Foundation. Thank you so much, Thank you. Thank you so much. Thanks to you for being with Tony martignetti non-profit Radio coverage of 19 NTC. All are 19 ntcdinosaur views are brought to you by our partners Act Blue Free fund-raising Tools to help non-profits make an impact Thanks for being with us next week. Another good one. No firings. If you missed any part of today’s show, I beseech you, find it on tony martignetti dot com Responsive by Wagner c. P A is guiding you beyond the numbers. Regular cps dot com by Cougar Mountain Software The Knowledge E fundez They’re complete accounting solution made for non-profit tony dot m a slash Cougar Mountain for a free 60 day trial and by turned to communications, PR and content for non-profits, your story is their mission. Turn hyphen to dot CEO. Our creative producer is Claire Meyerhoff. Sam Liebowitz is the line producer. Shows social media is by Susan Chavez. Mark Silverman is our Web guy, and this music is by Scott Stein be with me next week for non-profit radio. Big non-profit Ideas for the other 95% Go out and be great. You’re listening to the talking alternate network. You’re listening to the Talking Alternative Network. Are you stuck in a rut? Negative thoughts, feelings and conversations got you down. Hi, I’m nor in Sumpter potentially ater. Tune in every Tuesday at 9 to 10 p.m. Eastern time and listen for new ideas on my show Beyond potential. Live Life, Your Way on Talk radio dahna N Y C. I’m the aptly named host of Tony martignetti non-profit Radio. Big non-profit ideas for the other 95% fund-raising board relations, social media. My guests and I cover everything that small and midsize shops struggle with. If you have big dreams and a small budget, you have a home at Tony martignetti non-profit Radio. Friday’s 1 to 2 Eastern at talking alternative dot com. Hey, all you crazy listeners looking to boost your business. Why not advertise on talking alternative with very reasonable rates? Interested? Simply email at info at talking alternative dot com are you a conscious co creator? Are you on a quest to raise your vibration and your consciousness arm? Sam Liebowitz, your conscious consultant, and on my show, that conscious consultant, our awakening humanity. We will touch upon all these topics and more. Listen, live at our new time on Thursdays at 12 noon Eastern time. That’s the conscious consultant. Our Awakening Humanity. Thursday’s 12 noon on talk radio dot You’re listening to Talking Alternative Network at www dot talking altum dot com. Now broadcasting 24 hours a day. Yeah, Do you love, or are you intrigued about New York City and its neighborhoods? I’m Jeff Goodman, host of Rediscovering New York Weekly showed that showcases New York’s history, and it’s extraordinary neighborhoods. Every Tuesday live at 7 p.m. We focus on a particular neighborhood and explore its history, its vibe, it’s feel and its energy tune and live every Tuesday at 7 p.m. On talk radio dahna. You’re listening to the Talking Alternative Network