GEOList Summary: IT Security
I am interested to find out what other foundations do from an IT security perspective. Please let me know if you work with an IT security analyst, what types of security do you put into place to safeguard your foundation’s information.
Log in to continue reading
Log InStay informed of the emerging trends and promising practices from the field of philanthropy through GEO’s publications and research.
Sign up for a preview
A limited selection of GEO publications are available to the public. You can access these resources by filling out the form below.
GEO members can save time and access all GEO publications plus hundreds of philanthropy related resources by logging in to their member accounts. If this is your first time visiting the GEO site, you will need to register for your member access account.