Digital Security, Part One: Securing Library Systems


About This Two Part Webinar

November 9, Digital Security, Part One: Securing Library Systems

November 16, Digital Security, Part Two: Protecting Library Resources From Piracy

In our connected environment, security is tremendously important element of any system.  Institutions large and small have been targets of attack and libraries are a significant vector of approach for some institutions, because of their bias toward access and sharing of resources. In addition to personal information about patrons, library systems contain a variety of valuable information and provide gateways to numerous other resources.  All of these realities require information specialists to be aware of potential risks and how to address them. 

This two-part webinar program will focus on what best practice activities libraries should be implementing to ensure that their services are protected and secure.  Part one of this webinar will be focused on management of internal systems and methods of securing library systems and the data that they hold. 

The second session of this program will be focused on the issue of privacy and methods for protecting content from unauthorized distribution, including digital rights management systems, social DRM, and other approaches to preventing piracy.

Event Sessions

IT Security: An Introduction For Librarians


Blake Carver

Senior Systems Administrator
LYRASIS Technology Services

We all know we should use good passwords, keep everything updated and follow other basic precautions online. Understanding the reasons behind these rules is critical to help us convince ourselves and others that the extra work is indeed worth it. Who are the bad guys? What are tools are they using? What are they after? Many of the most effective strategies for IT security are free and easy to learn for any sized library. We’ll also cover a few security myths and excuses.

IT Security at Georgia Tech Library: Current Efforts and Emerging Practices


Doug Goans

Department Head, Information Technology and Development
Georgia Tech Library, Georgia Institute of Technology

Chris Helms

Network Support Engineer Senior
Georgia Tech Library, Georgia Institute of Technology

Georgia Tech Library has been working on several initiatives which incorporate IT security practices. IT security actions are becoming more integrated into library technology services as we manage security training and practices including authentication, authorization and access control. Risk assessment and attention to vendor contracts regarding data stewardship and security are also being included in our practices. This presentation provides some background on those efforts and highlights the IT security practices the library implements via partnerships with campus IT security.

Additional Information

  • Cancellations made by Day, Date, Year will receive a refund, less a $35 cancellation. After that date, there are no refunds.

  • Registrants will receive detailed instructions about accessing the virtual conference via e-mail the Friday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.

  • If you have not received your Login Instruction e-mail by 10 a.m. (ET) on the day before the virtual conference, please contact the NISO office at for immediate assistance.

  • Registration is per site (access for one computer) and includes access to the online recorded archive of the conference. You may have as many people as you like from the registrant's organization view the conference from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.

  • If you are registering someone else from your organization, either use that person's e-mail address when registering or contact to provide alternate contact information.

  • Conference presentation slides and Q&A will be posted to this event webpage following the live conference.

  • Registrants will receive an e-mail message containing access information to the archived conference recording within 48 hours after the event. This recording access is only to be used by the registrant's organization.

For Online Events

  • NISO has developed a quick tutorial, How to Participate in a NISO Web Event. Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event.
  • You will need a computer for the presentation and Q&A.

  • Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.

Please check your system in advance to make sure it meets the Cisco WebEx requirements. It is your responsibility to ensure that your system is properly set up before each webinar begins.