SlideShare a Scribd company logo
1 of 19
Wednesday, February 12, 2020, NISO Webinar
NFAIS Forethought: Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Welcome!
There are two components to this virtual conference:
1. The online presentation:
Congratulations, you have logged in successfully! You will see the slides for today’s event
and be able to ask questions via the Zoom webinar interface.
2. The audio portion:
Zoom promises a higher quality of audio over VOIP networks so use of your computer
speakers may be a more positive option than in the past.
Alternatively, you can
Listen in via Telephone: Dial in the U.S. +1 669 900 6833 or +1 646 558 8656
International Callers should consult Zoom Support for the appropriate number.
Technical assistance is available by:
Contacting support.zoom.us. (Live Chat)
NISO’s webinar id today is: 177-785-995
Some Frequently Asked
Questions
Will Slides Be Made Available Following This Session?
Yes!
Is This Segment Being Recorded
So That I Can View It Later?
Yes!
You will receive an e-mail with links & information on how to
access those links within 24-48 hours of today’s event.
Keep Current with NISO
Educational Events
March 2020
Two-Part Webinar: Labor and Capacity and Building Data Science Skills
• Labor and Capacity, Research Data Management, Wednesday, March 11, 1:00pm –
2:30pm
• Labor and Capacity, Building Data Science Skills, Wednesday, March 18, 1:00pm –
2:30pm
Virtual Conference: Researcher Behaviors and the Impact of Technology
Wednesday, March 25, 12:00 Noon – 4:00pm
April 2020
NFAIS Forethought: Artificial Intelligence, Planning for Implementation
Wednesday, April 8, 1:00pm – 2:30pm
Virtual Conference: Making Content Accessible: How Can Publishers and Libraries
Better Satisfy the Obligation
Wednesday, April 15, 12:00 Noon – 4:00pm
NISO Plus Conference Now Sold Out!
Baltimore, MD, Feb 23-25, 2020
The Lord Baltimore Hotel
https://niso.plus
Check Out the Content on IO!
https://www.niso.org/niso-io
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Your Questions
Please submit your questions and
concerns for discussion by our roundtable
participants in the Q&A panel of the Zoom
interface
NISO Webinar
NFAIS Forethought
Cybersecurity: Protecting Your Internal Systems
Wednesday, February 12, 2019, 1:00 am – 2:30 pm
Roundtable Participants
• Daniel Ayala, Founder, CISO/Chief Privacy Officer, Secratic
• Blake Carver, Senior Systems Administrator, LYRASIS
• Christian Kohl, Principal, Kohl Consulting
• Hong Ma, Head, Library Systems, Loyola University of Chicago
• Wayne Strickland, Acting Associate Director at Department of Commerce,
National Technical Information Service
• Becky Yoose, Principal, LDH Consulting Services
8
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
As an opener, can we define “cybersecurity”
and what it covers?
9
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
What might be problematic vocabulary when discussing
cybersecurity in a cross-sector environment?
• Hostile users, threat actors
• Threat modeling
• Hacking / Cracking
• Breach vs. leak vs. unauthorized access
10
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
In your respective roles as consultants, IT people
and administrators, what are your thoughts on
balancing a desire for transparency and the need
for some degree of shielding of a system’s
defenses?
11
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
How much transparency can or should be
expected of vendors?
12
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
What are some of the differences in building in
cybersecurity protections at an institutional level
vs building security at web-scale? Is that
nuance sufficiently recognized?
13
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
From a practical standpoint, the information community likely
encounters issues of security arising from
• Backwards compatibility
• Need for cost controls.
• Prioritizing an alternate social good
• Introduction of smart technology (lightbulbs, etc.) into
buildings, etc.
How might stake-holders (content providers, platform providers,
librarians) be factoring those constraints into their thinking about
and collaboration on cybersecurity?
14
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Are utility, cost and convenience truly inimical to
the needs of cybersecurity?
What are the trade-offs?
15
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Who ultimately holds responsibility for ensuring
protected systems? Is it a user issue, a provider
vendor issue, or an institutional issue?
16
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
How might stakeholders adequately convey to users
the risks, the responsibilities, etc. associated with
protective measures surrounding a system?
How do we convey to users that security may be more
important than features?
17
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Tweet emerging from a recent cybersecurity conference: “Cybersecurity policy is
a bottom up approach. Standardization is a strategic tool. We need to commit to
create standards that meet market needs, consumer needs and global needs.”
Bringing that down into the context of the information community,
whose/which/what set of needs are currently under threat? Whose needs
should be articulated and/or prioritized?
• How might we determine appropriate priorities?
• What things have the greatest potential for harm?
How can NISO help stakeholders collaborate to resolve the various existing
problems?
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Questions & Discussion
Slides will be posted to the NISO website following the close
of today’s segment:
https://www.niso.org/events/2020/02/nfais-forethought-
cybersecurity-protecting-your-internal-systems
Thanks to all of our attendees for joining us today.
We look forward to hearing from you!
THANK YOU

More Related Content

What's hot

"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"Tawny Brown
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction FIA2010
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEidsecconf
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...Bloxx
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 ThreatsKim Jensen
 

What's hot (20)

"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Information infrastructures
Information infrastructuresInformation infrastructures
Information infrastructures
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Technology & Social work
Technology & Social workTechnology & Social work
Technology & Social work
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to NISO Roundtable Discussion, Cybersecurity, February 12 2020

HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti
 
Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?lisbk
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptmamathajagarlamudi2
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
Building Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesBuilding Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesAspire Systems
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board DeckRichard Smiraldi
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAPNIC
 

Similar to NISO Roundtable Discussion, Cybersecurity, February 12 2020 (20)

NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Building Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesBuilding Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 Technologies
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board Deck
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 

More from National Information Standards Organization (NISO)

More from National Information Standards Organization (NISO) (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
 
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
 
Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"
 
Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"
 
Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

NISO Roundtable Discussion, Cybersecurity, February 12 2020

  • 1. Wednesday, February 12, 2020, NISO Webinar NFAIS Forethought: Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Welcome! There are two components to this virtual conference: 1. The online presentation: Congratulations, you have logged in successfully! You will see the slides for today’s event and be able to ask questions via the Zoom webinar interface. 2. The audio portion: Zoom promises a higher quality of audio over VOIP networks so use of your computer speakers may be a more positive option than in the past. Alternatively, you can Listen in via Telephone: Dial in the U.S. +1 669 900 6833 or +1 646 558 8656 International Callers should consult Zoom Support for the appropriate number. Technical assistance is available by: Contacting support.zoom.us. (Live Chat) NISO’s webinar id today is: 177-785-995
  • 2. Some Frequently Asked Questions Will Slides Be Made Available Following This Session? Yes! Is This Segment Being Recorded So That I Can View It Later? Yes! You will receive an e-mail with links & information on how to access those links within 24-48 hours of today’s event.
  • 3. Keep Current with NISO Educational Events March 2020 Two-Part Webinar: Labor and Capacity and Building Data Science Skills • Labor and Capacity, Research Data Management, Wednesday, March 11, 1:00pm – 2:30pm • Labor and Capacity, Building Data Science Skills, Wednesday, March 18, 1:00pm – 2:30pm Virtual Conference: Researcher Behaviors and the Impact of Technology Wednesday, March 25, 12:00 Noon – 4:00pm April 2020 NFAIS Forethought: Artificial Intelligence, Planning for Implementation Wednesday, April 8, 1:00pm – 2:30pm Virtual Conference: Making Content Accessible: How Can Publishers and Libraries Better Satisfy the Obligation Wednesday, April 15, 12:00 Noon – 4:00pm
  • 4. NISO Plus Conference Now Sold Out! Baltimore, MD, Feb 23-25, 2020 The Lord Baltimore Hotel https://niso.plus
  • 5. Check Out the Content on IO! https://www.niso.org/niso-io
  • 6. NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Your Questions Please submit your questions and concerns for discussion by our roundtable participants in the Q&A panel of the Zoom interface
  • 7. NISO Webinar NFAIS Forethought Cybersecurity: Protecting Your Internal Systems Wednesday, February 12, 2019, 1:00 am – 2:30 pm Roundtable Participants • Daniel Ayala, Founder, CISO/Chief Privacy Officer, Secratic • Blake Carver, Senior Systems Administrator, LYRASIS • Christian Kohl, Principal, Kohl Consulting • Hong Ma, Head, Library Systems, Loyola University of Chicago • Wayne Strickland, Acting Associate Director at Department of Commerce, National Technical Information Service • Becky Yoose, Principal, LDH Consulting Services
  • 8. 8 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question As an opener, can we define “cybersecurity” and what it covers?
  • 9. 9 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question What might be problematic vocabulary when discussing cybersecurity in a cross-sector environment? • Hostile users, threat actors • Threat modeling • Hacking / Cracking • Breach vs. leak vs. unauthorized access
  • 10. 10 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question In your respective roles as consultants, IT people and administrators, what are your thoughts on balancing a desire for transparency and the need for some degree of shielding of a system’s defenses?
  • 11. 11 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question How much transparency can or should be expected of vendors?
  • 12. 12 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question What are some of the differences in building in cybersecurity protections at an institutional level vs building security at web-scale? Is that nuance sufficiently recognized?
  • 13. 13 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question From a practical standpoint, the information community likely encounters issues of security arising from • Backwards compatibility • Need for cost controls. • Prioritizing an alternate social good • Introduction of smart technology (lightbulbs, etc.) into buildings, etc. How might stake-holders (content providers, platform providers, librarians) be factoring those constraints into their thinking about and collaboration on cybersecurity?
  • 14. 14 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Are utility, cost and convenience truly inimical to the needs of cybersecurity? What are the trade-offs?
  • 15. 15 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Who ultimately holds responsibility for ensuring protected systems? Is it a user issue, a provider vendor issue, or an institutional issue?
  • 16. 16 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question How might stakeholders adequately convey to users the risks, the responsibilities, etc. associated with protective measures surrounding a system? How do we convey to users that security may be more important than features?
  • 17. 17 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Tweet emerging from a recent cybersecurity conference: “Cybersecurity policy is a bottom up approach. Standardization is a strategic tool. We need to commit to create standards that meet market needs, consumer needs and global needs.” Bringing that down into the context of the information community, whose/which/what set of needs are currently under threat? Whose needs should be articulated and/or prioritized? • How might we determine appropriate priorities? • What things have the greatest potential for harm? How can NISO help stakeholders collaborate to resolve the various existing problems?
  • 18. NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Questions & Discussion Slides will be posted to the NISO website following the close of today’s segment: https://www.niso.org/events/2020/02/nfais-forethought- cybersecurity-protecting-your-internal-systems
  • 19. Thanks to all of our attendees for joining us today. We look forward to hearing from you! THANK YOU