SlideShare uma empresa Scribd logo
1 de 15
Thursday, November 3, 2022 09:40 AM EST
Cybersecurity 101:
What Every Librarian Needs to Know
about Protecting Networks, Data, and
Access
Rick Anderson
University Librarian, Brigham Young University
Brian Kelly
Virtual Chief Information Security Officer, Compass IT Compliance
Matthew Ragucci
Associate Director of Product Marketing, Wiley
Carlota Sage
Founder & Community Chief Information Security Officer, Pocket CISO
Rick Anderson
Introductions & University Library
Perspective on Cybersecurity
University Librarian
Wiley Green External 2021-10.potx
3
Introductions & University Library perspective
University CISO perspective
Cybersecurity expert perspective
Publisher perspective
Questions
Agenda
Brian Kelly
University vCISO Perspectives on
Cybersecurity on Campus
Virtual Chief Information
Security Officer
Wiley Green External 2021-10.potx
5
From No to Know
This Photo by Unknown author is licensed under CC BY-NC.
This Photo by Unknown author is licensed under CC BY.
Do you know?
 Your Information Security colleagues?
 Do they know you?
We've been saying no for far too long...
Culture of collaboration... getting to yes
Carlota Sage
Founder & Community Chief
Information Security Officer
Community CISO Perspectives
on Cybersecurity
Wiley Green External 2021-10.potx
7
What the Security Industry Gets Wrong...
Wiley Green External 2021-10.potx
8
Security is more than Technology
Matthew Ragucci
Associate Director,
B2B Product Marketing
Publisher Perspectives on
Cybersecurity
Wiley Green External 2021-10.potx
10
Publisher Perspective
• We can have both!
• Abuse monitoring systems
• Obligations to protect user
and institutional data
• Compromised credentials
• Disruptive IP blocks
• False/inflated usage data in
COUNTER reports
• Ransomware attacks
• Going offline and diminished
usage
• Consider EZproxy
Pseudonymous ID
• SAML-based authentication,
Federations,
Shibboleth/OpenAthens
• Friction reduction (GetFTR,
Seamless Access and
Content Syndication)
Institutional
Scenarios
Content Protection
& Privacy
Solutions
Wiley Green External 2021-10.potx
11
About the Scholarly Networks Security Initiative
 The Scholarly Networks
Security Initiative (SNSI)
brings together publishers
and institutions to solve
cyber-challenges
threatening the integrity
of the scientific record,
scholarly systems and the
safety of personal data.
 Members include large
and small publishers,
learned societies and
university presses,
libraries and others
involved in scholarly
communications.
ACADEMIC
IT SECURITY
LIBRARY
RESEARCH
PUBLISHING
Wiley Green External 2021-10.potx
12
SNSI tips for academic librarians on building strong information
security defenses at your institution
https://tinyurl.com/SNSITips
Questions?
Ask the panelists
Thank You !

Mais conteúdo relacionado

Semelhante a Charleston 2022 - Cybersecurity 101 - What Every Librarian Needs to Know about Protecting Networks, Data, and Access.pptx

Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
Anastasija Nikiforova
 

Semelhante a Charleston 2022 - Cybersecurity 101 - What Every Librarian Needs to Know about Protecting Networks, Data, and Access.pptx (20)

Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
Marco Armoni AIPSI - SMAU Milano 2017
Marco Armoni AIPSI - SMAU Milano 2017Marco Armoni AIPSI - SMAU Milano 2017
Marco Armoni AIPSI - SMAU Milano 2017
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-security
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Kali linux cookbook
Kali linux cookbookKali linux cookbook
Kali linux cookbook
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellman
 
Trends & Innovation in Cyber and Digitaltech
Trends & Innovationin Cyber and DigitaltechTrends & Innovationin Cyber and Digitaltech
Trends & Innovation in Cyber and Digitaltech
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Security
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Learn Online Cyber Security Courses With Certificates in Delhi..pdf
Learn Online Cyber Security Courses With Certificates in Delhi..pdfLearn Online Cyber Security Courses With Certificates in Delhi..pdf
Learn Online Cyber Security Courses With Certificates in Delhi..pdf
 
CCNA-Security Official Exame Cetification Guide
CCNA-Security Official Exame Cetification GuideCCNA-Security Official Exame Cetification Guide
CCNA-Security Official Exame Cetification Guide
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptx
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 
A Child Like Approach to Grid Cybersecurity
A Child Like Approach to Grid CybersecurityA Child Like Approach to Grid Cybersecurity
A Child Like Approach to Grid Cybersecurity
 

Mais de Matthew Ragucci

Mais de Matthew Ragucci (17)

NISO Plus 2023 - Publisher Perspectives on Metadata Quality and Completeness....
NISO Plus 2023 - Publisher Perspectives on Metadata Quality and Completeness....NISO Plus 2023 - Publisher Perspectives on Metadata Quality and Completeness....
NISO Plus 2023 - Publisher Perspectives on Metadata Quality and Completeness....
 
NASIG 2022 - Common Ground
NASIG 2022 - Common GroundNASIG 2022 - Common Ground
NASIG 2022 - Common Ground
 
NISO Plus 2022 - Content Platform Migrations Working Group Update
NISO Plus 2022 - Content Platform Migrations  Working Group UpdateNISO Plus 2022 - Content Platform Migrations  Working Group Update
NISO Plus 2022 - Content Platform Migrations Working Group Update
 
ER&L 2022 - Set It and Forget It: Librarian, Publisher, and Vendor Perspectiv...
ER&L 2022 - Set It and Forget It: Librarian, Publisher, and Vendor Perspectiv...ER&L 2022 - Set It and Forget It: Librarian, Publisher, and Vendor Perspectiv...
ER&L 2022 - Set It and Forget It: Librarian, Publisher, and Vendor Perspectiv...
 
Charleston 2021 - Hit the ground running - Best practices for navigating cont...
Charleston 2021 - Hit the ground running - Best practices for navigating cont...Charleston 2021 - Hit the ground running - Best practices for navigating cont...
Charleston 2021 - Hit the ground running - Best practices for navigating cont...
 
NASIG 2021 Don't wait automate! Industry perspectives on KBART automation
NASIG 2021   Don't wait automate! Industry perspectives on KBART automationNASIG 2021   Don't wait automate! Industry perspectives on KBART automation
NASIG 2021 Don't wait automate! Industry perspectives on KBART automation
 
AMIGOS 2021 - Oh the Places You'll Go: Improving the Content Platform Migrati...
AMIGOS 2021 - Oh the Places You'll Go: Improving the Content Platform Migrati...AMIGOS 2021 - Oh the Places You'll Go: Improving the Content Platform Migrati...
AMIGOS 2021 - Oh the Places You'll Go: Improving the Content Platform Migrati...
 
CIL 2020 - Bringing Collections to the Screen
CIL 2020 - Bringing Collections to the ScreenCIL 2020 - Bringing Collections to the Screen
CIL 2020 - Bringing Collections to the Screen
 
ER&L 2020 - When the grass is greener
ER&L 2020 - When the grass is greenerER&L 2020 - When the grass is greener
ER&L 2020 - When the grass is greener
 
NASIG 2020 - Walk this way
NASIG 2020 -  Walk this wayNASIG 2020 -  Walk this way
NASIG 2020 - Walk this way
 
CONRICYT 2020 - Charla para bibliotecarios: Referenica virtual como servicio ...
CONRICYT 2020 - Charla para bibliotecarios: Referenica virtual como servicio ...CONRICYT 2020 - Charla para bibliotecarios: Referenica virtual como servicio ...
CONRICYT 2020 - Charla para bibliotecarios: Referenica virtual como servicio ...
 
SANLIC 2019 - 99 Knowledgebase problems: a KBART crash course
SANLIC 2019 -  99 Knowledgebase problems: a KBART crash courseSANLIC 2019 -  99 Knowledgebase problems: a KBART crash course
SANLIC 2019 - 99 Knowledgebase problems: a KBART crash course
 
SANLIC 2019 - Dressing your library for success: the Importance of electronic...
SANLIC 2019 - Dressing your library for success: the Importance of electronic...SANLIC 2019 - Dressing your library for success: the Importance of electronic...
SANLIC 2019 - Dressing your library for success: the Importance of electronic...
 
ER&L 2019 - Forming a More Perfect Knowledgebase: A Tale of Publisher, Vendor...
ER&L 2019 - Forming a More Perfect Knowledgebase: A Tale of Publisher, Vendor...ER&L 2019 - Forming a More Perfect Knowledgebase: A Tale of Publisher, Vendor...
ER&L 2019 - Forming a More Perfect Knowledgebase: A Tale of Publisher, Vendor...
 
PSP 2018 - The Changing discovery landscape: Tools and services from wiley
PSP 2018 - The Changing discovery landscape: Tools and services from wileyPSP 2018 - The Changing discovery landscape: Tools and services from wiley
PSP 2018 - The Changing discovery landscape: Tools and services from wiley
 
CONRICYT 2018 - Formacion de formadores (para bibliotecarios y referencista d...
CONRICYT 2018 - Formacion de formadores (para bibliotecarios y referencista d...CONRICYT 2018 - Formacion de formadores (para bibliotecarios y referencista d...
CONRICYT 2018 - Formacion de formadores (para bibliotecarios y referencista d...
 
ER&L 2017 - Evidence based acquisition: a real life account of managing the p...
ER&L 2017 - Evidence based acquisition: a real life account of managing the p...ER&L 2017 - Evidence based acquisition: a real life account of managing the p...
ER&L 2017 - Evidence based acquisition: a real life account of managing the p...
 

Último

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Charleston 2022 - Cybersecurity 101 - What Every Librarian Needs to Know about Protecting Networks, Data, and Access.pptx

  • 1. Thursday, November 3, 2022 09:40 AM EST Cybersecurity 101: What Every Librarian Needs to Know about Protecting Networks, Data, and Access Rick Anderson University Librarian, Brigham Young University Brian Kelly Virtual Chief Information Security Officer, Compass IT Compliance Matthew Ragucci Associate Director of Product Marketing, Wiley Carlota Sage Founder & Community Chief Information Security Officer, Pocket CISO
  • 2. Rick Anderson Introductions & University Library Perspective on Cybersecurity University Librarian
  • 3. Wiley Green External 2021-10.potx 3 Introductions & University Library perspective University CISO perspective Cybersecurity expert perspective Publisher perspective Questions Agenda
  • 4. Brian Kelly University vCISO Perspectives on Cybersecurity on Campus Virtual Chief Information Security Officer
  • 5. Wiley Green External 2021-10.potx 5 From No to Know This Photo by Unknown author is licensed under CC BY-NC. This Photo by Unknown author is licensed under CC BY. Do you know?  Your Information Security colleagues?  Do they know you? We've been saying no for far too long... Culture of collaboration... getting to yes
  • 6. Carlota Sage Founder & Community Chief Information Security Officer Community CISO Perspectives on Cybersecurity
  • 7. Wiley Green External 2021-10.potx 7 What the Security Industry Gets Wrong...
  • 8. Wiley Green External 2021-10.potx 8 Security is more than Technology
  • 9. Matthew Ragucci Associate Director, B2B Product Marketing Publisher Perspectives on Cybersecurity
  • 10. Wiley Green External 2021-10.potx 10 Publisher Perspective • We can have both! • Abuse monitoring systems • Obligations to protect user and institutional data • Compromised credentials • Disruptive IP blocks • False/inflated usage data in COUNTER reports • Ransomware attacks • Going offline and diminished usage • Consider EZproxy Pseudonymous ID • SAML-based authentication, Federations, Shibboleth/OpenAthens • Friction reduction (GetFTR, Seamless Access and Content Syndication) Institutional Scenarios Content Protection & Privacy Solutions
  • 11. Wiley Green External 2021-10.potx 11 About the Scholarly Networks Security Initiative  The Scholarly Networks Security Initiative (SNSI) brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.  Members include large and small publishers, learned societies and university presses, libraries and others involved in scholarly communications. ACADEMIC IT SECURITY LIBRARY RESEARCH PUBLISHING
  • 12. Wiley Green External 2021-10.potx 12 SNSI tips for academic librarians on building strong information security defenses at your institution

Notas do Editor

  1. Brian's slide