CYBERWISE DISCOVERY
Who are you talking to today?
Selecting a persona calibrates the guidance throughout the conversation. You can change this anytime.
โ›ช
The Pastor
Stewardship and trust, not threat. Lead with the weight of what they protect.
๐Ÿ“‹
The Executive Director
Cost clarity is table stakes. Right-sizing is the differentiator.
โš™๏ธ
The Operations Manager
She already knows what's broken. Speak peer-to-peer. Honor that.
๐Ÿ”ง
The Volunteer IT Tech
Partner, not sidelined. Build on what he's already put in place.
๐Ÿ›๏ธ
The Board Chair
Brevity and credibility. Governance frame, not technical.
CYBERWISE
Edit Content
HTML tags are supported. Changes save to this browser and persist on next visit. Use "Reset to default" to undo your changes to a field.
01The Setup

Frame the problem, then land it in their world. Lead with curiosity, not conclusions.

โ–ถ
Open with a question, not a pitch
Ask about their world first. "Tell me about how your organization handles technology day to day."

This is the most important moment. You are here to listen. Nobody asks them this. When you do, they relax.

Opening Questions
"Tell me a little about how your organization handles technology day to day. Who's involved? What's working?"

"What does a typical week look like for your team?"

"What's the mission? Who do you serve?"
For the Pastor
He talks about technology the way most people talk about their gutters โ€” he knows it matters, he suspects it needs attention, and he hopes someone else handles it before it becomes a crisis. Ask about Mike. Ask about the streaming setup. Ask about the donor database they moved to the cloud last year. Listen for the moment he mentions the children's ministry records or the pastoral counseling files. That's the conversation. When you hear it, don't press โ€” just name what you heard: "It sounds like you have some things in good shape and some places where you're carrying more exposure than you probably realize. That's normal. It's fixable. And it doesn't require Mike to become a cybersecurity expert."
For the Executive Director
Ask about the organization before the technology. What's the mission? Who do you serve? What does a typical week look like? Let her talk about the board pressure and the funder questions before you say anything about security. Then, when the technology conversation opens, ask the one question that stops her: "If your email went down right now, could your staff reach you in an emergency?" She won't know. Don't make her feel bad about it. "Most organizations in your position can't answer that confidently. It's one of the things we look at."
For the Operations Manager
This conversation often happens after the executive director has said "you should talk to Janet โ€” she handles all of this." Do not arrive expecting to brief her. Expect to listen for ten minutes while she tells you, with quiet precision, exactly what is not working and why. Take notes visibly. When she finishes: "Everything you've just described is exactly what the assessment is designed to surface. What you already know is going to make this faster and more useful." That's the moment. She feels, possibly for the first time in a while, like the right person finally got her message.
For the Volunteer IT Tech
Ask what he built and how it works. Be actually interested, not performatively respectful โ€” he will know the difference. He has done real work with limited resources and he knows it. Let him walk you through the setup. Do not lead with what he got wrong. Your job is to listen carefully and then find the seam: "Most of the real exposure isn't in the infrastructure at all โ€” it's the people layer. And that's the part that's nobody's actual job." He can hear that. It is not a challenge to his competence.
For the Board Chair
This conversation almost always happens through the executive director or at a board meeting. Do not try to be clever. She has a finely calibrated radar for people who know a lot versus people who actually understand the problem. Give her three things to know and one thing to do. Answer her questions directly and without hedging. The line that opens the conversation: "Every organization that takes data security seriously got there because someone at governance decided it was a fiduciary responsibility, not just an IT problem."

Listen more than you talk. Let them tell you where the concerns are before you name them.

โ–ถ
The Old World: Security by Obscurity
"Too small, too poor, too boring for hackers." Ten years ago, that was valid.
Talk Track
"For a long time, nonprofits operated on a philosophy I call 'Security by Obscurity.' The idea was: we are too small, too poor, and too boring for hackers to care about.

And honestly? Ten years ago, that was a perfectly valid strategy. Hackers were humans. They chose banks and big corporations because that's where the money was. You were safe because you were invisible."
โ–ถ
The Shift: Automated Dragnets + AI
Bots don't know you're a nonprofit. They just know the door is unlocked. AI makes fakes too good to spot.
Talk Track
"The landscape has shifted, quietly but completely.

Bad actors now use bots that scan the internet 24 hours a day. The bot doesn't know you are a nonprofit; it only knows your digital door is unlocked. You aren't targeted because of who you are, but because of what you are: an opportunity.

Then came the AI factor. Today, AI allows attackers to write perfect, personalized emails to your staff in seconds. They can mimic your ED's writing style. They can clone voices for phone scams. The fakes are now too good for 'sharp eyes' alone."
โ–ถ
The Data (pick one or two, don't stack)
NGOs: #2 most targeted. 68% of breaches = human element. 80% of donors stop giving after a breach.

Choose one or two that land for this person.

  • NGO sector: #2 most targeted by nation-state actors worldwide (31%), behind only IT. (Microsoft Digital Defense Report)
  • 68% of breaches involved a human element: clicking a link, reusing a password. Not a tech problem; a people problem.
  • 80% of donors say that if they become aware of a breach, they will not give. (give.org) This changes the math for any organization that depends on donor trust.
  • For a business, a breach costs money. For you, it costs trust. Trust is the one asset you can't buy back with insurance.
For the Pastor
Lead with the trust line, not statistics. If you have a specific example of a congregation whose building fund was emptied through a phishing email, or whose counseling records were exposed, that lands far harder than any percentage. Statistics he will politely nod at and forget by Tuesday. The donor stat is worth using if the church depends on congregational giving โ€” but always land it in the human consequence: "Imagine making that phone call to your congregation."
For the Executive Director
The give.org donor stat is your strongest single play โ€” she lives in funder relationships and immediately understands what 80% does to next year's annual campaign. Pair it with the 68% human element stat: this reframes security away from expensive technology and toward the people-first approach she can actually sustain with her team. Two statistics maximum. She will remember both.
For the Operations Manager
She doesn't need statistics โ€” she has specific examples. Use this moment to validate rather than educate. "What you've been noticing for the past two years is backed up by the data. 68% of breaches involve a human element. Which means the work you're already trying to get people to do is exactly the right work."
For the Volunteer IT Tech
The 68% human element stat is your bridge. It validates his infrastructure work and points to the one area that was never his job: the people layer. "The infrastructure you've built addresses a real piece of the risk. The thing that gets most organizations isn't the firewall โ€” it's the staff member who clicks something. That's the part nobody owns. That's what the assessment looks at."
For the Board Chair
The NGO targeting stat (#2 most targeted) and the donor trust stat (80%) together make the fiduciary case in two sentences. She will hear both and sit up slightly. Then stop. She does not need three more statistics. She needs one clear answer to: "What is the responsible governing response?" Give her that.
โ–ถ
The Stakes: Security by Stewardship
Reframe from tech problem to trust problem. Same care with digital keys as physical ones.
Key Reframe
"In the corporate world, a breach costs money. You pay the fine, fix the glitch, move on.

But you operate on a different currency: trust. The trust of a donor who writes a check. The trust of a volunteer who gives their time. If your data is leaked, or your email is used to scam your community, you can't write a check to fix that.

We need to move from 'Security by Obscurity' to 'Security by Stewardship.' It's not about becoming a fortress; it's about treating your digital keys with the same care you treat your physical keys."
For the Pastor
This is his language โ€” he already has a theology of stewardship. It governs the building, the finances, the congregation's personal moments. The move is simply to extend it: the counseling files, the children's roster, the donor records. These are not IT problems. They are the digital expression of the trust his community has placed in him. Same responsibility, different keys. You don't need to explain this to him. You just need to name it.
For the Executive Director
She already carries the weight of this โ€” she just hasn't had a frame for it as a security concern. The people her organization serves are not abstract. For a refugee resettlement program, it's location data. For a domestic violence shelter, it's the address of someone hiding from someone dangerous. For a community health clinic, it's a teenager's HIV status. The reframe: cybersecurity is a form of care for the same populations she has already committed to protecting.
For the Operations Manager
She doesn't need the reframe โ€” she already lives in it. What she needs to hear is that someone with authority agrees with her. Use this moment to validate: "What you've been trying to surface is exactly this. The organization's digital practices are a form of care for the people it serves. That's the case you've been making."
For the Volunteer IT Tech
Move him from infrastructure to mission. "The thing that makes your church or nonprofit different from the company you work for is that when something goes wrong here, the people who get hurt are the ones you specifically set out to protect." That lands differently than any technical argument. It also gives him a reason to care about the people layer that has nothing to do with his competence.
For the Board Chair
The stewardship reframe is exactly the governance language she already uses. Cybersecurity is not an IT matter โ€” it is a board-level stewardship responsibility. Most organizations have never heard it described that way. Most board chairs, when they hear it, sit up slightly. That's the opening. Don't fill it immediately. Let it settle.
027-Point Snapshot

Seven questions that reveal more about security posture than most full audits.

1
Ownership
Is there one specific person named as responsible for IT security?
โ–ถ
If No
If everyone owns it, no one owns it.
Quick Win
Name a "Dispatcher." One person who owns the relationship with IT.
2
Access
Does everyone use MFA on email?
โ–ถ
If No
Passwords are dead. MFA stops 99.9% of automated attacks.
Quick Win
Turn it on for Finance and Director emails this week.
3
Offboarding
Do you have a checklist to remove access when staff leave?
โ–ถ
If No
Old accounts pile up. Easiest backdoor.
Quick Win
Sticky note list of top 5 apps. Use it every departure.
4
Backups
Automated backups stored separate from your main network?
โ–ถ
If No
Ransomware locks backups too if they're on the same network.
Quick Win
Check cloud backup for version history with 30-day rewind.
5
Privacy
Are sensitive docs in a central system, not personal devices?
โ–ถ
If No
Can't secure a volunteer's personal laptop. They lose it, you lose the data.
Quick Win
One folder called "Confidential." Sensitive data lives only there.
6
Verification
Do staff call and verify financial requests before paying?
โ–ถ
If No
The #1 scam. Relies on helpfulness, not hacking.
Quick Win
"I will never ask for money via email without a phone call first."
7
AI Safety
Clear rule against putting private data into public AI tools?
โ–ถ
If No
AI learns from what you feed it. Don't feed it names, finances, or passwords.
Quick Win
One email: "Play with AI, but never paste names, finances, or passwords into it."
Yes0No0Skip0
03Closing Pivot

Move from the snapshot to the next step. Match your close to their readiness.

โ–ถ
If 0-1 "No" answers
Top 10%. Emergency essentials covered. Next step is optimization.
Talk Track
"You are in the top 10% of organizations I see. The Foundations Assessment can help you build on that, but you're starting from strength."
โ–ถ
If 2+ "No" answers
Open windows. Quick wins are temporary bandages. The full picture covers 14 domains.
Talk Track
"We have a few open windows here. The quick wins are temporary bandages. The Foundations Assessment gives you the complete picture: 14 domains across your technology, business practices, and people."

If donor trust came up: 80% of donors won't give after becoming aware of a breach. Closing those windows protects the relationships that fund the mission.

โ–ถ
What the Full Assessment Covers
Three layers: Tech (locked?), Business (liable?), People (do they know?).
Talk Track
"The Foundations Assessment covers the three layers where risk lives:

The Tech: Website, email, devices, backups.
The Business: Vendor contracts, insurance, finance systems.
The People: Onboarding, policies, AI use."
โ–ถ
What They Walk Away With
Report + Action Plan + Review Conversation. Never left staring at a document without guidance.
Talk Track
"You receive two clear tools:

The Foundations Report: Narrative summary across 14 domains. Plain English.
The Action Plan: Prioritized by effort and impact.

And a review conversation. You will never be left staring at a document without guidance."

Fixed fee: $1,200 to $1,800. No surprises, no scope creep.

โ–ถ
The Low-Pressure Close
No deadline, no urgency theater. The first step is a conversation, not a commitment.
Talk Track
"There's no deadline. The first step, if it feels right, is scheduling the assessment: 30 to 60 minutes with whoever knows how your organization operates day to day.

If this isn't the right moment, that's fine. I have something I'd like to leave with you."
โ–ถ
๐Ÿ“„ Leave the Readiness Brief
Every conversation ends with something tangible. Link or print. Partnership without pressure.
Handoff Language
"I want to leave you with something. This is our Readiness Brief. It has the 7 questions we walked through, plus three readiness lenses: operational capacity, cultural appetite, and emotional bandwidth. You can share it with your board or team without needing me in the room."

Online: cyberwisesolutions.net ยท /services ยท /pricing

Printed: Hand it over. Physical artifacts carry weight. A printed brief on the table is proof of investment in the relationship.

The Readiness Brief demonstrates the Cyberwise ethic: a self-assessment tool before the formal engagement, so they can decide for themselves.

For the Pastor
Printed version lands well. He'll put it in his stack. It surfaces when the board asks.
For the Executive Director
She'll share with ops manager and board chair. Point her to the pricing page.
For the Board Chair
Designed for her reading style. The 7-Point Reality Check is her decision tool.
04Objection Handling

Every one is real, sympathetic, and understandable. None are arguments to be won. Clear, candid, calm, and supportive โ€” always.

โ–ถ"We don't have the budget."
What They Actually Mean
Sometimes this is literally true. More often it means: "We haven't yet decided this is worth the money, and we're using budget as a way to close the conversation before it gets uncomfortable." This objection tends to appear earliest, before trust is established, and it rarely survives a direct conversation about what effective security for an organization like theirs actually costs.
Response Approach
Anchor in cost clarity before the objection even arrives. The fixed-fee structure is a genuine differentiator: no surprises, no scope creep, no "depends on what we find." Then reframe what security actually costs at their size โ€” the most effective measures are simpler and more affordable than the industry's sales pitch would suggest. Some of them are free. The budget objection often dissolves once the actual cost of effective security is separated from the cost of enterprise security theater.
Talk Track
"The most effective security measures available to your organization are probably not what you've been quoted before. The Foundations Assessment is a fixed fee โ€” $1,200 to $1,800. No surprises. No scope creep. We tell you the number before you have to ask. And the most important things we'll recommend won't require a new platform or a monthly subscription. Some of the highest-impact changes your team can make are free."
โ–ถ"It's too complicated. We don't have the capacity."
What They Actually Mean
They have tried to engage with cybersecurity before and encountered impenetrable jargon, unrealistic recommendations, or a process that felt like it would require a full-time staff member to maintain. They are not wrong to be skeptical. They have been failed by the industry, repeatedly and in ways that were rarely acknowledged. Their skepticism is not ignorance โ€” it is experience.
Response Approach
Empathy before response. This objection deserves acknowledgment before it gets an answer โ€” not a correction. The Cyberwise approach is specifically built for organizations with limited capacity: 30 to 60 minutes, no technical background required, completed by someone with a broad operational view, not a technical one. "Built for small teams" does real work here. So does "fundamentally different approach" โ€” because it signals this is not the enterprise model scaled down. It is a different model entirely.
Talk Track
"The complexity you've encountered before was never designed for you. Most of what gets sold to nonprofits and faith communities assumes a technology budget and a staff capacity that doesn't exist at your size โ€” and probably never will. The Foundations Assessment takes 30 to 60 minutes and can be completed by whoever understands how your organization actually operates day to day. No technical background. No jargon. Built for exactly the team you have."
โ–ถ"We're worried about what we'll find."
What They Actually Mean
The most honest objection in the list, and one of the most common. They suspect they have problems. They are not sure they are ready to see them clearly. On some level, not knowing feels safer than knowing. This is human and it deserves the most careful handling of any objection. It is not a problem to be argued away. It is a feeling to be met.
Response Approach
Do not rush to reassure. Meet the feeling first. The question is not whether gaps exist โ€” every organization has them, including the ones that look most put-together from the outside. The organizations without gaps are the ones that haven't looked yet. The frame is not "you probably have serious problems." It is: let's find out exactly where you stand so you can stop carrying this uncertainty and start making decisions with clarity. Clarity, in practice, is almost always less frightening than the uncertainty that came before it.
Talk Track
"Every organization we work with has gaps. That's not a failure. It's reality โ€” including the ones that look the most put-together from the outside. What the assessment gives you is clarity. And clarity, in our experience, is almost always less frightening than the uncertainty that came before it. You don't have to fix everything at once. You just have to be able to see clearly what's there."
โ–ถ"We're probably fine. We haven't had any problems."
What They Actually Mean
A combination of genuine optimism, motivated reasoning, and sometimes genuine good luck. The "we haven't been hacked yet" strategy is extraordinarily common in mission-driven organizations. It is also one of the more dangerous assumptions in the sector โ€” because organizations that are not yet aware of a breach are not necessarily the ones that haven't had one.
Response Approach
Validate the feeling before offering anything else. They are not wrong to feel generally safe โ€” most organizations are not in active crisis. The question worth exploring is whether the confidence is based on clarity or on an absence of visible problems. Those are different things. Only one of them holds up under scrutiny. The 7-Point Reality Check is the low-stakes, non-threatening entry: it lets them answer for themselves whether their confidence is founded.
Talk Track
"The good news is that you're probably not in crisis โ€” most organizations aren't. The question worth asking is whether your confidence is based on clarity, or on the fact that you haven't looked closely yet. Those are different things. I have a quick seven-question check I'd love to walk through with you right now. Takes about five minutes. It'll tell you more about your actual security posture than most full audits do."
โ–ถ"We know we should do something. We just haven't gotten to it."
What They Actually Mean
The apathy-awareness gap โ€” the most common dynamic in the sector. They understand the risk intellectually. They intend to address it. The urgency never quite rises above the threshold required to actually schedule something. This can persist for years without any crisis forcing the issue. It is not negligence. It is the natural result of working in an environment where the immediate demands of the mission are always more visible than the invisible risks.
Response Approach
Reduce friction as far as possible. The first step should be small, specific, and easy to calendar. The discovery conversation is a low-commitment entry point: one hour to understand the current situation, no slide decks, no urgency theater, no deadline that expires on Friday. The 7-Point Reality Check can be done before a call and often catalyzes the motivation that general awareness did not. Do not add pressure โ€” this objection does not need urgency. It needs a door that is easy to walk through.
Talk Track
"The first step is a conversation, not a commitment. An hour to understand your current situation and whether this is the right moment. No slide deck. No urgency deadline. Just a straightforward conversation about where you are. If it feels right after that, we take the next step. If it doesn't, you still walk away with clarity."
โ–ถ"We have someone who handles that."
What They Actually Mean
They have an IT person, a volunteer, a managed service provider, or someone's nephew. They believe the situation is covered. It may be, partially. It almost certainly is not, completely. This is the IT Guy objection in disguise โ€” and it requires the most careful handling in the list, because the person they're describing almost always genuinely cares about the organization.
Response Approach
Never position Cyberwise as a replacement for or adversary to whoever is already in that role. The Foundations Assessment is a leadership-level view of the organization's security posture โ€” designed to complement the work of whoever handles day-to-day IT, not to evaluate or replace them. Most IT generalists, no matter how capable, were trained in enterprise environments and apply enterprise assumptions to contexts that are nothing like what they were designed for. That is not their fault. It is a structural mismatch between the industry they learned from and the organizations they now serve.
Talk Track
"The person you have is almost certainly doing their best and genuinely cares about the organization. This isn't about replacing that relationship or evaluating their work. It's about giving you, as a leader, the clearest possible picture of where you stand. Most IT generalists were trained in enterprise environments โ€” bigger budgets, bigger teams, different threats. They apply those assumptions here with great intentions, and the assessment is designed to work alongside what they've already built."
05Assessment Info

The Foundations Assessment covers 14 domains across people, systems, data, and emerging tools. Each one is there for a reason.

โ–ถ
What it is โ€” and what it is NOT
Reality-mapping tool. Not a compliance audit. Not pass/fail. Not a performance review.

It IS: A clear, calm picture of where the organization stands today โ€” so they can make thoughtful decisions about tomorrow. Use the word "clarity." The instrument is standardized across all clients. Only the report and action plan are bespoke.

It is NOT: A compliance audit. A pass/fail score. An assessment of staff performance. A measure of how "behind" they are. Avoid the word "audit" entirely.

Time: 30โ€“60 minutes. Who: The person with the broadest operational view โ€” executive director, ops manager, office administrator. Technical expertise not required.

โ–ถ
Deliverables
Report + Action Plan + Review Conversation + Path Forward. Never left staring at a document without guidance.

Foundations Report: Narrative summary across all 14 domains. Plain English. Designed for leaders, board members, and non-technical staff.

Action Plan: Prioritized next steps โ€” immediate, short-term, and long-term. Sized for small teams and real capacity.

Review Conversation: A guided walk-through of findings. They will never be left staring at a document without guidance.

Path Forward: Partner with Cyberwise for implementation support, or move independently. No pressure either way.

Pricing: $1,200โ€“$1,800 fixed fee. Implementation Support: Guided $250/mo ยท Partnered $400/mo ยท Embedded $600/mo.

โ–ถ
1. Governance & Oversight
Leadership, roles, and responsibilities that shape digital behavior.

Cybersecurity without clear ownership is nobody's job. This domain asks who is actually responsible for the digital environment โ€” and how that responsibility is understood by leadership and the board. The structures that govern every other area of an organization's work also determine how well it responds when something goes wrong digitally. If the honest answer to "who owns this?" is "kind of everyone," the practical answer is that no one does.

โ–ถ
2. Data Management & Storage
Where information actually lives โ€” not where policy says it lives.

Data you cannot find, you cannot protect. This domain maps where organizational information actually lives in practice โ€” not where the policy says it should live, but where it ends up. Personal devices, personal email accounts, informal cloud storage, the shared folder that predates the last three executive directors. Good data hygiene is one of the highest-return investments a small organization can make, and it costs considerably less than almost everything else on the action plan.

โ–ถ
3. Accounts & Access Controls
Who has access to what โ€” and whether any of those doors are still open when they shouldn't be.

Every account that was ever created, every login that was ever shared, every system that was never properly locked down when someone left โ€” this domain maps the full landscape of access across the organization. It examines how accounts are managed, whether multi-factor authentication is in place, how shared credentials are handled, and what the offboarding process actually looks like in practice versus what the policy describes. The most common attack vector in the sector is an unlocked door that nobody remembered to close.

โ–ถ
4. Devices
Every phone, laptop, and tablet that touches organizational work is a potential entry point.

This domain looks at how devices are managed, secured, and tracked โ€” including personally-owned devices that staff use for work. The most common vulnerabilities here are the ones nobody thought to address because they never came with an official label: the volunteer's personal laptop, the outdated phone, the device that left the organization but still has access to shared systems. If you can't see it, you can't secure it.

โ–ถ
5. Email, Messaging, & Communication
The front door for the majority of successful attacks โ€” and often the least scrutinized.

Email is the primary vector for the vast majority of successful cyberattacks โ€” and the back door that is most often left unlocked. This domain examines how email is configured, who has access, whether multi-factor authentication is in place, and how communication tools beyond email (Slack, WhatsApp, group texts) are used for organizational business. The gap between official policy and actual practice is often widest here. It is also where the most consequential quick wins live.

โ–ถ
6. Backup & Recovery
The domain that separates organizations that can recover from those that cannot.

When ransomware locks every file on a network, the backup strategy is the difference between paying a ransom and restoring from yesterday. This domain examines not just whether backups exist, but whether they are automated, isolated from the main network, tested, and accessible when needed. An untested backup is an assumption. Most organizations discover the difference between assumption and reality at the worst possible moment.

โ–ถ
7. Finance & Donor Systems
Where sensitive data and direct financial risk intersect.

Financial systems and donation platforms sit at the intersection of the most sensitive data and the most significant risk of direct, immediate loss. This domain examines how financial tools are secured, who has access, how unusual transactions are verified, and whether the people handling money know what a financial scam looks like before it arrives. The most common financial attack is not a technical exploit โ€” it is an email that looks like it came from the executive director and asks accounts payable to wire a payment.

โ–ถ
8. Website & Domain Security
Your public presence โ€” and how attackers can use it against you.

The organization's website and domain are its public face. They are also infrastructure that attackers can use against it โ€” by exploiting vulnerabilities in the site, by impersonating the domain in phishing campaigns, or by hijacking email sent on the organization's behalf. This domain looks at who controls that infrastructure, how access is managed, how current the software is, and whether domain security records are properly configured. Most organizations discover these gaps only after someone has already impersonated them.

โ–ถ
9. Physical Security
The layer closest to the ground โ€” and the one most often left out of the security conversation.

Physical access is digital access. A device left on a desk in an unlocked office, a visitor with unescorted access to the server room, a laptop sitting in a car โ€” these are not IT problems, they are physical ones with digital consequences. This domain examines how the organization manages physical access to technology, sensitive documents, and systems. The organizations that handle this well treat physical and digital security as the same conversation, because at the boundary they are.

โ–ถ
10. Incident Response
How you identify, report, and respond when something goes wrong.

Most organizations don't discover a security problem from a dramatic alarm. They discover it because a staff member noticed something odd and knew to say something โ€” or didn't say something because they weren't sure it mattered, or were afraid of being blamed. This domain looks at whether there is a clear path from "I think something happened" to "here is what we do next." The organizations that respond best to incidents are the ones that knew the path before they needed it.

โ–ถ
11. Sensitive Populations & Privacy
How you protect information that requires heightened care โ€” because of whose data it is.

Many mission-driven organizations hold data that demands exceptional care โ€” not merely because of regulation, but because of whose data it is. Client files, case histories, location data, medical information. The address of a survivor who has told no one else. This domain examines how that data is identified, stored, and protected, and whether the people handling it understand why it matters. The exposure of this data is not a compliance problem. For most of these organizations, it is a moral catastrophe.

โ–ถ
12. AV, Streaming & Physical Tech
The technology most security frameworks ignore โ€” often carrying sensitive data and access.

The livestreaming setup. The event registration system. The tablet at the check-in desk. The A/V cart rolled out for Sunday services or the annual gala. These systems often carry sensitive data and are almost always the least scrutinized in any security conversation. This domain asks whether the technology used for programs and events is as carefully considered as the technology used for administration. For most organizations, the honest answer is: not yet.

โ–ถ
13. Vendor & Third-Party Risk
Every vendor with system access is an extension of your security perimeter.

Every vendor, contractor, or platform with access to the organization's systems is part of its security story โ€” whether the organization thinks of them that way or not. This domain examines how external relationships are managed: who has been granted access, whether that access is still appropriate, and what agreements actually say about data handling and security responsibilities. The vendor breach is one of the most common pathways to organizational exposure, and one of the least frequently examined.

โ–ถ
14. AI & Emerging Technology
Where unofficial tools and emerging technology create exposure nobody has named yet.

Staff across every organization are using AI tools in their daily work โ€” often without formal policy, often without awareness of what they are sharing with those tools. Client names, financial data, case notes, grant strategies, the home address of someone whose privacy matters. This domain examines how the organization is navigating AI adoption, what guidance exists, and where unofficial tool use may be creating exposure that hasn't been named yet. The organizations that handle this well are not the ones that ban AI. They are the ones that talk about it honestly.

06Persona Notes

Deep reference for calibrating your approach. Read them as characters before you write for them.

โ–ถ
โ›ช The Church Pastor โ€” David or Gary
Lead with stewardship. "The people who trust you deserve this level of care." Not threat. Responsibility.

Portrait: He has led his congregation through a building campaign, two staff transitions, and a pandemic pivot to online services. He coordinated the streaming setup himself during COVID because someone had to. He is not a technophobe. But technology is a means, not an interest. He has a part-time office administrator, a volunteer IT person named Mike who also drives a sensible SUV, and a board that ranges from deeply engaged to showing up four times a year with strong opinions about the budget. He is the one who signs the check. He is also the one who would have to make the phone call if something went wrong.

How he talks about security: In the language of stewardship โ€” once you give him the frame. Before that, the way most people talk about their gutters. He does not use "threat surface" or "multi-factor authentication." If you use them unprompted in the first conversation, you will lose him. He has been talked down to by vendors before. He will not engage with that energy a second time.

The fear underneath: Not the breach itself. The phone call. A congregant whose personal information was exposed. A staff member asking why the church didn't have better safeguards. A story in the local community paper. A donor who quietly stops giving. The children's ministry roster โ€” names, addresses, medical notes, pickup authorizations โ€” is the thing that keeps him up if he lets himself think about it too hard. The counseling files sitting in a shared folder nobody has audited since the last associate pastor left.

What moves him: Story, not statistics. If you describe, plainly and specifically, what happens when donor data is exposed or when a phishing email empties the building fund, he will not forget it. He also responds to being treated as a thoughtful person who is capable of making good decisions once he has the right information. He understands the weight of trust better than most of your readers ever will.

The conversation that works: Open with a question. Ask about Mike, the streaming setup, the donor database. Listen more than you talk. Somewhere in the middle, ask one question about the counseling files or the children's ministry records, and watch his expression shift slightly. Don't press. Just name what you heard: "It sounds like you have some things in good shape and some places where you're carrying more exposure than you probably realize. That's normal. It's fixable. And it doesn't require Mike to become a cybersecurity expert."

โ–ถ
๐Ÿ“‹ The Executive Director โ€” Sandra or Michelle
Cost clarity is table stakes. Right-sizing is the differentiator. Never make her feel like she should have done this sooner.

Portrait: She has been running the organization for seven years. She was there when they grew from four staff to fourteen, when the board cycled through three chairs, and when the pandemic forced remote operations in eleven days with a technology budget that was already thin. She has a master's in social work or public policy. She thinks strategically, advocates effectively, and can read a 990 as fluently as most people read the news. Cybersecurity has been on her list for three years. Her board is starting to ask. A major funder included a data security question in last year's grant application for the first time.

How she talks about security: In terms of liability, responsibility, and compliance โ€” usually in the context of what funders expect. She has absorbed enough sector anxiety to know she should be worried. She has not yet been given a reason to believe the solution is within reach for an organization like hers.

The fear underneath: The people her organization serves. She runs a refugee resettlement program, or a domestic violence shelter, or a community health clinic. The data she holds is not abstract โ€” it is the address history of a woman hiding from someone dangerous, or the HIV status of a teenager who told the clinic and nobody else. She carries this. The secondary fear: if a breach becomes public, the damage to donor and foundation confidence is not recoverable on a short timeline.

What moves her: Cost clarity, before anything else. Being given a fixed, transparent price before she has to ask is not a small thing โ€” it signals she is dealing with someone who understands how her world works. The second thing: "right-sized." She has been failed by solutions designed for organizations ten times hers. Being told that good security for her team does not look like enterprise security scaled down โ€” that it is a fundamentally different approach built for her actual risk and her actual people โ€” is genuinely new information. She leans in.

The question that stops her: "If your email went down right now, could your staff reach you in an emergency?" She will pause. She will not know. Don't make her feel bad about it. "Most organizations in your position can't answer that confidently. It's one of the things we look at." She books the assessment before the call ends.

โ–ถ
โš™๏ธ The Operations Manager โ€” Janet
She already knows. Speak peer-to-peer. Her operational knowledge is a genuine asset โ€” tell her that explicitly.

Portrait: She has been with the organization for six years โ€” longer than anyone except the executive director. She knows where every vendor contract lives, which staff members actually use the shared drive versus their personal laptop (three of them, no matter how many times she's asked), and the reason the Wi-Fi password is still "FaithHope22" is that changing it would require a conversation with the volunteer IT person that she has been too tired to have. She is operationally brilliant in the quiet way that keeps organizations functional. She does not write strategy documents or present at board meetings. She makes those things possible by keeping everything else from falling apart.

How she talks about security: Practically and skeptically, usually at the same time. She has watched enough technology initiatives arrive with great fanfare and leave with a shrug to have earned her skepticism. When she talks about security, she talks about specific situations: the staff member who forwards everything to personal Gmail, the shared password spreadsheet on the server that technically anyone can access, the laptop a former employee might still be able to log into.

The fear underneath: Being blamed. If something goes wrong, the question will move quickly toward: who was responsible for this? Janet often carries that exposure without it ever being formally acknowledged. She has raised concerns before and been told "we'll look into it" by people who did not look into it. She has stopped raising them as loudly. She has not stopped noticing.

What moves her: Specificity. Concrete next steps. The sense that whoever she is talking to actually understands how an organization like hers operates day to day, and is not going to recommend a solution that requires three staff members and a $500-a-month platform to maintain. "Simple" does a lot of work for this persona. So does "built for small teams." She also responds strongly to being treated as a peer โ€” she has a finely calibrated radar for condescension. If you talk down to her, even slightly, you will not get her back. If you treat her operational knowledge as the asset it actually is, she will become one of the most effective internal advocates for the work.

The conversation that works: This often happens after Sandra says "you should talk to Janet โ€” she handles all of this." Jim arrives expecting to brief her. Instead, he listens for ten minutes while she describes, with quiet precision, exactly what is not working. He takes notes. He says: "Everything you've just described is exactly what the assessment is designed to surface. What you already know is going to make this faster and more useful." She feels, possibly for the first time in a while, like the right person got her message.

โ–ถ
๐Ÿ”ง The Volunteer IT Tech โ€” Mike
Partner, not sidelined. "Most real exposure isn't in the infrastructure. It's the people layer โ€” and that's nobody's actual job."

Portrait: He is a deacon, or a board member, or a congregant with a day job in IT at a mid-size company and a genuine desire to contribute. He set up the church's network in 2019. He got them onto Microsoft 365. He configured the email. He is the first call when anything breaks, and he takes those calls without complaint. He drives a sensible SUV and has strong opinions about the router brand the organization should have bought instead of the one they bought. He means well. Genuinely. This is the most important thing to hold onto in any conversation involving him.

The structural problem: He is operating under a set of assumptions he absorbed from his day job โ€” an environment with a dedicated IT department, a security team, and a procurement budget not measured in hundreds of dollars. He applies those assumptions to the church with great enthusiasm and genuine care. The result is a security posture that looks more sophisticated than it is and protects against fewer things than anyone realizes. This is not malice. It is the natural result of applying enterprise assumptions to a context they were not designed for.

The fear underneath: Being exposed. Having his limitations surfaced in front of leadership he has invested in for years. His identity as the competent, reliable person who handles this is real and earned โ€” and the prospect of that identity being complicated by an outside assessment is genuinely threatening. He may not say he is opposed. But he can slow or derail the process through lukewarm endorsement, inaction, or the kind of quiet skepticism that makes leadership uncertain.

What moves him: Being brought in as a partner, not sidelined. "We want to build on what you've already put in place" does more work than almost any other sentence. He also responds to evidence: specific, non-accusatory examples of where well-intentioned setups create real exposure. Not "your setup is wrong" โ€” but "here's a pattern we see often in organizations like this one, and here's what it looks like when it becomes a problem."

The pivot that works: "You've clearly done a lot with limited resources. The thing I find with organizations like this is that most of the real exposure isn't in the infrastructure at all โ€” it's the people layer. And that's the part that's nobody's actual job. That's what the assessment is designed to look at." He can hear that. It is not a challenge to his competence. It is an acknowledgment that the problem is bigger than any one person, and that he has been carrying more than his share of it. Mike with a sense of ownership becomes an asset. Mike on the outside of the process becomes friction.

One rule, always: Never write content that ridicules or diminishes this persona, even obliquely. The humor in the IT Guy piece lands on the industry and on Jim himself, never on Mike. Hold that line.

โ–ถ
๐Ÿ›๏ธ The Board Chair โ€” Patricia
Brevity and credibility, in that order. Governance frame. She will tell Sandra they should move forward.

Portrait: She is a retired attorney, or a community banker, or the kind of businessperson who joined this board because she genuinely believes in the mission and has spent the last three years discovering that governance is a different skill than management. She reads the financial statements. She chairs the compensation committee. She takes her fiduciary responsibility seriously enough that it occasionally makes the executive director nervous. Cybersecurity landed on her radar because a foundation asked about it in a grant application, or because something similar happened to another organization she knows about and the story spread through her professional network.

How she talks about security: In the language of governance, liability, and institutional reputation. She uses words like "exposure," "due diligence," and "fiduciary responsibility." She does not use technical terms โ€” and she will quietly discount you if you use them without immediate translation. She wants to understand risk in terms she already knows how to think about. She wants to know what the responsible governing response is.

The fear underneath: Personal liability and reputational damage to the institution. She understands, at a level her fellow board members sometimes do not, that a serious breach does not stay contained. It follows the organization into funder conversations, into staff recruitment, into the community's perception of the institution's competence. And in some circumstances, it follows board members personally.

What moves her: Brevity and credibility, in that order. If you can tell her the most important thing about the organization's security posture in two sentences, she will trust you with the next ten minutes. If you cannot, she will wonder whether you actually understand the problem or just know a lot about it. She is very good at distinguishing between the two. She responds to the governance frame specifically: cybersecurity is not just an operational matter. It is a board-level stewardship responsibility. Most organizations have never heard it described that way. Most board chairs, when they hear it, sit up slightly.

The conversation that works: Give her three things to know and one thing to do. She will ask two questions. They will both be good ones. Answer them directly, without hedging. She then tells Sandra they should move forward. The sentence that opens the door: "Every organization that takes data security seriously got there because someone at governance decided it was a fiduciary responsibility, not just an IT problem. That shift usually happens because of a conversation like this one."