Is This a Magnetometer Moment for Grantee Security?

magnetometer

Written by Dan Callahan

I am a Senior Technical Advisor to CGNET. Formerly, I managed our Cybersecurity and Cloud Services businesses, and provided consulting to many clients over the years. I wear a lot of hats. Professionally, I'm a builder of businesses. Outside of work, I'm a hobby farmer, chef, skier, dog walker, jokester, woodworker, structuralist, husband and father.

June 30, 2022

OK, I admit it. I was watching the US House of Representatives January 6th Committee and geeked out over the word “magnetometer.” I have called them “metal detectors” but magnetometer is a way cooler name. But what does this have to do with grantee security?

We are all connected, as never before. A magnetometer was used to screen the Presidential rally crowd for weapons, as a protective measure for the President and other speakers. In a similar fashion (metaphorically anyway) I have argued that grantee security is part of your organization’s security defense.

Join Me at TAG to Talk About Grantee Security

I have been discussing grantee security—what it is, how to get it done—for a couple of years now. So, I thought the topic would be interesting for those attending the Technology Association of Grantmakers (TAG) annual conference this fall. And I just heard back that my proposal for a conference session on this topic has been accepted. Awesome!

It is always more interesting when someone besides me does the talking about grantee security at a session like this. I have invited Karen Graham (recently promoted at Tech Impact, way to go Karen!) and Robert (Bob) Hybben, of the Patrick and Aimee Butler Family Foundation, to join me and liven up the proceedings.

We want to talk about security from a couple of perspectives.

  • What does grantee security mean?
  • What are its limits?
  • Why should a foundation care about grantee security?
  • How can the funding be worked out?

The session is short, so we will have to be direct and to the point!

What Are Your Thoughts?

What are your thoughts on grantee security? Have you tried doing it? How did it work out? Can you get involved without “owning” the problem or feeling like you are pushing your grantee around? What about the power dynamics?

Those are just some of the questions that have come to my mind. I would like your inputs here! We want to make sure our session is as valuable to attendees as possible. And you can make that happen with your comments and questions. Anything grantee security-related is fair game.

Get in touch and let me know what you would like to hear about during our session!

Written by Dan Callahan

I am a Senior Technical Advisor to CGNET. Formerly, I managed our Cybersecurity and Cloud Services businesses, and provided consulting to many clients over the years. I wear a lot of hats. Professionally, I'm a builder of businesses. Outside of work, I'm a hobby farmer, chef, skier, dog walker, jokester, woodworker, structuralist, husband and father.

You May Also Like…

You May Also Like…

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Translate »
Share This
Subscribe