SlideShare a Scribd company logo
1 of 19
Wednesday, February 12, 2020, NISO Webinar
NFAIS Forethought: Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Welcome!
There are two components to this virtual conference:
1. The online presentation:
Congratulations, you have logged in successfully! You will see the slides for today’s event
and be able to ask questions via the Zoom webinar interface.
2. The audio portion:
Zoom promises a higher quality of audio over VOIP networks so use of your computer
speakers may be a more positive option than in the past.
Alternatively, you can
Listen in via Telephone: Dial in the U.S. +1 669 900 6833 or +1 646 558 8656
International Callers should consult Zoom Support for the appropriate number.
Technical assistance is available by:
Contacting support.zoom.us. (Live Chat)
NISO’s webinar id today is: 177-785-995
Some Frequently Asked
Questions
Will Slides Be Made Available Following This Session?
Yes!
Is This Segment Being Recorded
So That I Can View It Later?
Yes!
You will receive an e-mail with links & information on how to
access those links within 24-48 hours of today’s event.
Keep Current with NISO
Educational Events
March 2020
Two-Part Webinar: Labor and Capacity and Building Data Science Skills
• Labor and Capacity, Research Data Management, Wednesday, March 11, 1:00pm –
2:30pm
• Labor and Capacity, Building Data Science Skills, Wednesday, March 18, 1:00pm –
2:30pm
Virtual Conference: Researcher Behaviors and the Impact of Technology
Wednesday, March 25, 12:00 Noon – 4:00pm
April 2020
NFAIS Forethought: Artificial Intelligence, Planning for Implementation
Wednesday, April 8, 1:00pm – 2:30pm
Virtual Conference: Making Content Accessible: How Can Publishers and Libraries
Better Satisfy the Obligation
Wednesday, April 15, 12:00 Noon – 4:00pm
NISO Plus Conference Now Sold Out!
Baltimore, MD, Feb 23-25, 2020
The Lord Baltimore Hotel
https://niso.plus
Check Out the Content on IO!
https://www.niso.org/niso-io
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Your Questions
Please submit your questions and
concerns for discussion by our roundtable
participants in the Q&A panel of the Zoom
interface
NISO Webinar
NFAIS Forethought
Cybersecurity: Protecting Your Internal Systems
Wednesday, February 12, 2019, 1:00 am – 2:30 pm
Roundtable Participants
• Daniel Ayala, Founder, CISO/Chief Privacy Officer, Secratic
• Blake Carver, Senior Systems Administrator, LYRASIS
• Christian Kohl, Principal, Kohl Consulting
• Hong Ma, Head, Library Systems, Loyola University of Chicago
• Wayne Strickland, Acting Associate Director at Department of Commerce,
National Technical Information Service
• Becky Yoose, Principal, LDH Consulting Services
8
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
As an opener, can we define “cybersecurity”
and what it covers?
9
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
What might be problematic vocabulary when discussing
cybersecurity in a cross-sector environment?
• Hostile users, threat actors
• Threat modeling
• Hacking / Cracking
• Breach vs. leak vs. unauthorized access
10
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
In your respective roles as consultants, IT people
and administrators, what are your thoughts on
balancing a desire for transparency and the need
for some degree of shielding of a system’s
defenses?
11
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
How much transparency can or should be
expected of vendors?
12
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
What are some of the differences in building in
cybersecurity protections at an institutional level
vs building security at web-scale? Is that
nuance sufficiently recognized?
13
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
From a practical standpoint, the information community likely
encounters issues of security arising from
• Backwards compatibility
• Need for cost controls.
• Prioritizing an alternate social good
• Introduction of smart technology (lightbulbs, etc.) into
buildings, etc.
How might stake-holders (content providers, platform providers,
librarians) be factoring those constraints into their thinking about
and collaboration on cybersecurity?
14
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Are utility, cost and convenience truly inimical to
the needs of cybersecurity?
What are the trade-offs?
15
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Who ultimately holds responsibility for ensuring
protected systems? Is it a user issue, a provider
vendor issue, or an institutional issue?
16
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
How might stakeholders adequately convey to users
the risks, the responsibilities, etc. associated with
protective measures surrounding a system?
How do we convey to users that security may be more
important than features?
17
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Tweet emerging from a recent cybersecurity conference: “Cybersecurity policy is
a bottom up approach. Standardization is a strategic tool. We need to commit to
create standards that meet market needs, consumer needs and global needs.”
Bringing that down into the context of the information community,
whose/which/what set of needs are currently under threat? Whose needs
should be articulated and/or prioritized?
• How might we determine appropriate priorities?
• What things have the greatest potential for harm?
How can NISO help stakeholders collaborate to resolve the various existing
problems?
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Questions & Discussion
Slides will be posted to the NISO website following the close
of today’s segment:
https://www.niso.org/events/2020/02/nfais-forethought-
cybersecurity-protecting-your-internal-systems
Thanks to all of our attendees for joining us today.
We look forward to hearing from you!
THANK YOU

More Related Content

What's hot

"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"Tawny Brown
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction FIA2010
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEidsecconf
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...Bloxx
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 ThreatsKim Jensen
 

What's hot (20)

"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Information infrastructures
Information infrastructuresInformation infrastructures
Information infrastructures
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Technology & Social work
Technology & Social workTechnology & Social work
Technology & Social work
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to NISO Roundtable Discussion, Cybersecurity, February 12 2020

HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti
 
Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?lisbk
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptmamathajagarlamudi2
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
Building Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesBuilding Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesAspire Systems
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board DeckRichard Smiraldi
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAPNIC
 

Similar to NISO Roundtable Discussion, Cybersecurity, February 12 2020 (20)

NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Building Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesBuilding Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 Technologies
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board Deck
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 

More from National Information Standards Organization (NISO)

More from National Information Standards Organization (NISO) (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
 
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
 
Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"
 
Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"
 
Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"
 

Recently uploaded

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

NISO Roundtable Discussion, Cybersecurity, February 12 2020

  • 1. Wednesday, February 12, 2020, NISO Webinar NFAIS Forethought: Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Welcome! There are two components to this virtual conference: 1. The online presentation: Congratulations, you have logged in successfully! You will see the slides for today’s event and be able to ask questions via the Zoom webinar interface. 2. The audio portion: Zoom promises a higher quality of audio over VOIP networks so use of your computer speakers may be a more positive option than in the past. Alternatively, you can Listen in via Telephone: Dial in the U.S. +1 669 900 6833 or +1 646 558 8656 International Callers should consult Zoom Support for the appropriate number. Technical assistance is available by: Contacting support.zoom.us. (Live Chat) NISO’s webinar id today is: 177-785-995
  • 2. Some Frequently Asked Questions Will Slides Be Made Available Following This Session? Yes! Is This Segment Being Recorded So That I Can View It Later? Yes! You will receive an e-mail with links & information on how to access those links within 24-48 hours of today’s event.
  • 3. Keep Current with NISO Educational Events March 2020 Two-Part Webinar: Labor and Capacity and Building Data Science Skills • Labor and Capacity, Research Data Management, Wednesday, March 11, 1:00pm – 2:30pm • Labor and Capacity, Building Data Science Skills, Wednesday, March 18, 1:00pm – 2:30pm Virtual Conference: Researcher Behaviors and the Impact of Technology Wednesday, March 25, 12:00 Noon – 4:00pm April 2020 NFAIS Forethought: Artificial Intelligence, Planning for Implementation Wednesday, April 8, 1:00pm – 2:30pm Virtual Conference: Making Content Accessible: How Can Publishers and Libraries Better Satisfy the Obligation Wednesday, April 15, 12:00 Noon – 4:00pm
  • 4. NISO Plus Conference Now Sold Out! Baltimore, MD, Feb 23-25, 2020 The Lord Baltimore Hotel https://niso.plus
  • 5. Check Out the Content on IO! https://www.niso.org/niso-io
  • 6. NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Your Questions Please submit your questions and concerns for discussion by our roundtable participants in the Q&A panel of the Zoom interface
  • 7. NISO Webinar NFAIS Forethought Cybersecurity: Protecting Your Internal Systems Wednesday, February 12, 2019, 1:00 am – 2:30 pm Roundtable Participants • Daniel Ayala, Founder, CISO/Chief Privacy Officer, Secratic • Blake Carver, Senior Systems Administrator, LYRASIS • Christian Kohl, Principal, Kohl Consulting • Hong Ma, Head, Library Systems, Loyola University of Chicago • Wayne Strickland, Acting Associate Director at Department of Commerce, National Technical Information Service • Becky Yoose, Principal, LDH Consulting Services
  • 8. 8 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question As an opener, can we define “cybersecurity” and what it covers?
  • 9. 9 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question What might be problematic vocabulary when discussing cybersecurity in a cross-sector environment? • Hostile users, threat actors • Threat modeling • Hacking / Cracking • Breach vs. leak vs. unauthorized access
  • 10. 10 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question In your respective roles as consultants, IT people and administrators, what are your thoughts on balancing a desire for transparency and the need for some degree of shielding of a system’s defenses?
  • 11. 11 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question How much transparency can or should be expected of vendors?
  • 12. 12 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question What are some of the differences in building in cybersecurity protections at an institutional level vs building security at web-scale? Is that nuance sufficiently recognized?
  • 13. 13 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question From a practical standpoint, the information community likely encounters issues of security arising from • Backwards compatibility • Need for cost controls. • Prioritizing an alternate social good • Introduction of smart technology (lightbulbs, etc.) into buildings, etc. How might stake-holders (content providers, platform providers, librarians) be factoring those constraints into their thinking about and collaboration on cybersecurity?
  • 14. 14 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Are utility, cost and convenience truly inimical to the needs of cybersecurity? What are the trade-offs?
  • 15. 15 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Who ultimately holds responsibility for ensuring protected systems? Is it a user issue, a provider vendor issue, or an institutional issue?
  • 16. 16 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question How might stakeholders adequately convey to users the risks, the responsibilities, etc. associated with protective measures surrounding a system? How do we convey to users that security may be more important than features?
  • 17. 17 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Tweet emerging from a recent cybersecurity conference: “Cybersecurity policy is a bottom up approach. Standardization is a strategic tool. We need to commit to create standards that meet market needs, consumer needs and global needs.” Bringing that down into the context of the information community, whose/which/what set of needs are currently under threat? Whose needs should be articulated and/or prioritized? • How might we determine appropriate priorities? • What things have the greatest potential for harm? How can NISO help stakeholders collaborate to resolve the various existing problems?
  • 18. NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Questions & Discussion Slides will be posted to the NISO website following the close of today’s segment: https://www.niso.org/events/2020/02/nfais-forethought- cybersecurity-protecting-your-internal-systems
  • 19. Thanks to all of our attendees for joining us today. We look forward to hearing from you! THANK YOU