Home | News & Events | Events | 2016 Events | 2016 NISO Webinars | November 9: Digital Security Part 1: Securing Library Systems

NISO Two-Part Webinar: Digital Security

Part 1: Securing Library Systems 

Wednesday, November 9, 2016
1:00 p.m. - 2:30 p.m. (Eastern Time)

Part 2 of this webinar, Protecting Library Resources From Piracy, will be held on Wednesday, November 16.

System Requirements:

  • NISO has developed a quick tutorial, How to Participate in a NISO Web Event. Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event.
  • You will need a computer for the presentation and Q&A.
  • Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.
  • Please check your system in advance to make sure it meets the Cisco WebEx requirements. It is your responsibility to ensure that your system is properly set up before each webinar begins.  

About the Webinar

In our connected environment, security is tremendously important element of any system.  Institutions large and small have been targets of attack and libraries are a significant vector of approach for some institutions, because of their bias toward access and sharing of resources. In addition to personal information about patrons, library systems contain a variety of valuable information and provide gateways to numerous other resources.  All of these realities require information specialists to be aware of potential risks and how to address them. 

This two-part webinar program will focus on what best practice activities libraries should be implementing to ensure that their services are protected and secure.  Part one of this webinar will be focused on management of internal systems and methods of securing library systems and the data that they hold. 

The second session of this program will be focused on the issue of privacy and methods for protecting content from unauthorized distribution, including digital rights management systems, social DRM, and other approaches to preventing piracy.

Agenda & Event Slides


Todd Carpenter, Executive Director, NISO

Confirmed Speakers: 

IT Security: An Introduction For Librarians
Blake Carver,Senior Systems Administrator, LYRASIS Technology Services.

We all know we should use good passwords, keep everything updated and follow other basic precautions online. Understanding the reasons behind these rules is critical to help us convince ourselves and others that the extra work is indeed worth it. Who are the bad guys? What are tools are they using? What are they after? Many of the most effective strategies for IT security are free and easy to learn for any sized library. We’ll also cover a few security myths and excuses.

Blake Carver is Systems Administrator at LYRASIS Digital Technology Services, where he manages the servers and infrastructure that support their hosted ArchivesSpace, Isandora and CollectionSpace. Blake holds an MLS from SUNY Buffalo, and has worked as an academic librarian, as a programmer at a dot.com startup, and as a records manager. He's also known as the guy behind LISNews, LISWire, and LISHost. Blake was one of the first librarian bloggers (he created LISNews in 1999) and is a member of Library Journal’s first “Movers & Shakers” cohort. Blake has presented widely at professional conferences, talking about open source systems, Drupal, WordPress, and IT security for libraries.

IT Security at Georgia Tech Library: Current Efforts and Emerging Practices
Doug Goans, Department Head, Information Technology and Development, and Chris Helms, Network Support Engineer Senior, Georgia Tech Library;

Georgia Tech Library has been working on several initiatives which incorporate IT security practices. IT security actions are becoming more integrated into library technology services as we manage security training and practices including authentication, authorization and access control. Risk assessment and attention to vendor contracts regarding data stewardship and security are also being included in our practices. This presentation provides some background on those efforts and highlights the IT security practices the library implements via partnerships with campus IT security.

Doug Goans is the Head of Information Technology & Development at Georgia Tech Library. He was formerly the Head of Digital Library Services at Georgia State University Library.

Doug holds a master's degree in Library and Informational Science from the University of Missouri.

Chris Helms is the Application Development Manager for Information Technology & Development at Georgia Tech Library. With 16 years of experience in IT infrastructure from physical to virtual, programming, service integration, and product deployment in support of library services.



* * * * * * * *  

Event Q&A



Registration closes on Wednesday, November 9, 2016 at 12:00 p.m. (ET)

Registration for both parts

SAVE! Register for both parts of this two-part webinar and save 25%!

If paying by credit card, register online for both parts.

If paying by check, please use this PDF form for both parts.

  • NISO Voting Members*
    • $143.00 (US and Canada)
    • $164.00 (International)
  • NASIG Member
    • $143.00
  • Non-Member
    • $188.00 (US and Canada)
    • $224.00 (International)
  • Student
    • $74.00

Registration for Part 1 only

If paying by credit card, register online for Part 1 only.

If paying by check, please use this PDF form for Part 1 only.

  • NISO Voting Members*
    • $95.00 (US and Canada)
    • $109.00 (International)
  • NASIG Member
    • $95.00
  • Non-Member
    • $125.00 (US and Canada)
    • $149.00 (International)
  • Student
    • $49.00

* LSA members - extra access link fee

Additional information

  • Registration closes at 12:00 p.m. (ET) on Wednesday, November 9, 2016. Cancellations made by Wednesday, November 2, 2016 will receive a refund, less a $25 cancellation. After that date, there are no refunds.
  • Registrants will receive detailed instructions about accessing the webinar via e-mail the Monday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.
  • If you have not received your Login Instruction email by 10 a.m. (ET) on the Tuesday before the webinar, at please contact the NISO office at nisohq@niso.org for immediate assistance.
  • Registration is per site (access for one computer) and includes access to the online recorded archive of the webinar. You may have as many people as you like from the registrant's organization view the webinar from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.
  • If you are registering someone else from your organization, either use that person's e-mail address when registering or contact NISO Office to provide alternate contact information.
  • Library Standards Alliance (LSA) members receive one free webinar connection as part of their membership and DO NOT need to register for the event for this free connection. Your webinar contact will receive the login instructions the Monday before the event. You may have as many people as you like from the member's library view the webinar from that one connection. If you need additional connections beyond the free one, then you will need to enter a paid registration (at the member rate) for each additional connection required.
  • Webinar presentation slides and Q&A will be posted to the site following the live webinar.
  • Registrants and LSA member webinar contacts will receive an e-mail message containing access information to the archived webinar recording within 48 hours after the event. This recording access is only to be used by the registrant's or member's organization.