Difference between revisions of "LFI Course Materials/Week 7: Cybersecurity for librarians"

From Library Freedom Wiki Page
Jump to navigation Jump to search
m
(Tasks)
 
(3 intermediate revisions by 2 users not shown)
Line 3: Line 3:
  
 
==== Overview ====  
 
==== Overview ====  
Hack. Breach. Ransomware. These words appear in the headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff, Cyber Analyst at GSK, will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt.
+
Hack. Breach. Ransomware. These words appear in the headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt.
  
 
==== Learning objectives ====
 
==== Learning objectives ====
Line 13: Line 13:
  
 
==== Readings ====
 
==== Readings ====
* What You Need To Know About Cybersecurity In 2018 (Published: 30 March 2018 | Source: Forbes)
+
 
https://www.forbes.com/sites/laurencebradford/2018/03/30/why-people-should-learn-about-cybersecurity-in-2018/#62adf9e75d00
+
[https://www.forbes.com/sites/forbestechcouncil/2019/03/22/five-tech-trends-driving-cybersecurity-in-2019/ Five Tech Trends Driving Cybersecurity In 2019]
* Taking the pulse of your information security culture (Published: 29 March 2018 | Source: CSO)
+
 
https://www.csoonline.com/article/3048321/security/taking-the-pulse-of-your-information-security-culture.html
+
[https://www.forbes.com/sites/quora/2019/04/02/what-are-the-biggest-cybersecurity-threats-in-2019/#3cfae1354b30 What Are The Biggest Cybersecurity Threats In 2019?]
 +
 
 +
[https://www.thesslstore.com/blog/80-eye-opening-cyber-security-statistics-for-2019/ 80 Eye-Opening Cyber Security Statistics for 2019]
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Tracy Z. Maleeff, Cyber Analyst at GSK
+
Tracy Z. Maleeff, infosec professional and former librarian
  
 
==== Discussion ====
 
==== Discussion ====
Line 29: Line 31:
 
* Lecture, readings, discussion forum, and small group work
 
* Lecture, readings, discussion forum, and small group work
 
* Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines
 
* Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines
 +
* Schedule one-on-one checkins with Alison

Latest revision as of 00:06, 7 June 2019

Week 7: Cybersecurity for librarians[edit]

  • Real time lecture: July 5th 10 am Pacific/1 pm Eastern

Overview[edit]

Hack. Breach. Ransomware. These words appear in the headlines daily, causing much fear and anxiety. This week, librarian-turned-cybersecurity professional Tracy Z. Maleeff will take us through the security side of things, which overlaps with privacy but has some important differences. She’ll help us get an understanding of Information Security vocabulary and best practices for the protection of personal and library data. She’ll cover what resources are available for the purposes of news monitoring, collection development, or training. You will come away from this session empowered with knowledge of how to create some defenses and deal with Information Security matters without fear, uncertainty, or doubt.

Learning objectives[edit]

  • Learn best practices for cybersecurity
  • Get an overview of the Information Security industry
  • Learn basic industry vocabulary to help comprehend industry news or create alerts
  • Get a list of recommended infosec resources
  • Take a deeper dive into passwords, social engineering, physical security, and end user security awareness/training

Readings[edit]

Five Tech Trends Driving Cybersecurity In 2019

What Are The Biggest Cybersecurity Threats In 2019?

80 Eye-Opening Cyber Security Statistics for 2019

Guest lecturer[edit]

Tracy Z. Maleeff, infosec professional and former librarian

Discussion[edit]

  • How do privacy and security overlap? How do they differ?
  • How might you incorporate cybersecurity competencies into privacy classes?
  • How is your library already practicing cybersecurity? How could it improve?

Tasks[edit]

  • Lecture, readings, discussion forum, and small group work
  • Post on the discussion forum about your small group work progress, including links to relevant drafts or outlines
  • Schedule one-on-one checkins with Alison