About this Two Part Webinar
Identity Management and Authentication Strategies, Part One:
Organizations and institutions holding licensed content or other sensitive forms of data -- regardless of whether the data may be hosted in a library or in a proprietary service or platform setting -- must do so with the intent of minimizing any risk of leakage or unauthorized incursion by third parties. One solution consistently put forward in recent years is the use of federated identity management systems. An application verifies the user’s right to interact with a particular system by engaging with another system storing individual credentials and the various access rights associated with those credentials.
However, depending upon the institution’s role and resources, hesitation may arise about the trustworthiness of such federated identity systems. This roundtable will feature discussion by a variety of stakeholders (chief technology officers, information professionals, producers of content and service providers) to talk about available system options, their reliability and the benefits gained in their use. Welcome to EditPad.org - your online plain text editor. Enter or paste your text here. To download and save it, click on the button below.
Talking to Your Organization’s IT Group When You’re Not an IT Person, Part Two:
Libraries may not always be blessed with their own dedicated information technology unit. Those lucky enough to have such internal access are in a better position to discuss complex issues, such as those surrounding identity management and authentication. But what if you or your colleagues are dependent upon an external IT group, one that has different professional priorities? What might be the best tips and tricks for communicating library needs and concerns to those IT groups? They may be using the same vocabulary but associating a different definition with the terminology. This event will be a roundtable discussion between professionals with the intent of easing those exchanges in order to reach shared goals.
Part 1 of this Webinar, Identity Management and Authentication Strategies, will be held on Wednesday January 15, 2020. Visit this page to see speaker abstracts.
Part 2 of this Webinar, Talking to Your Organization’s IT Group When You’re Not an IT Person, will be held on Wednesday, January 22, 2020. Visit this page to see speaker abstracts.
NOTE: Members of NISO automatically receive sign-on credentials for both halves of this two-part event as a member benefit. There is no need to register separately. Check your institutional membership status here.
Cancellations made by January 8, 2020 will receive a refund, less a $35 cancellation. After that date, there are no refunds.
Registrants will receive detailed instructions about accessing the webinar via e-mail the Friday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.
If you have not received your Login Instruction e-mail by 10 a.m. (ET) on the day before the webinar, please contact the NISO office at email@example.com for immediate assistance.
Registration is per site (access for one computer) and includes access to the online recorded archive of the webinar. You may have as many people as you like from the registrant's organization view the webinar from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.
If you are registering someone else from your organization, either use that person's e-mail address when registering or contact firstname.lastname@example.org to provide alternate contact information.
Speaker presentation slides and Q&A will be posted to this event webpage following the live broadcast.
Registrants will receive an e-mail message containing access information to the archived recording within 48 hours after the event. This recording access is only to be used by the registrant's organization.
For Online Events
You will need a computer for the presentation and Q&A.
Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.
It is your responsibility to ensure that your system is properly set up before each webinar begins.