Andrew McDonald is the lead software developer at SILS. He will explain why SILS chose custom software solutions for its member library websites and consortial mobile apps. This choice comes with clear benefits, but also tradeoffs and risks which will be outline throughout the presentation.
SILS uses Kibana to present Polaris data in a way that's easy to understand, encourages staff engagement, and helps our libraries make informed decisions. This presentation will give an overview of the Kibana tools that bring library data to life with visualizations and dashboards. It will cover why dashboarding has become an integral component of our reporting toolset, why we chose Kibana over alternative products, how we use Elastic with Polaris and other data sources, and the challenges we've encountered along the way.
Whether you're a systems administrator leading a team or a lone librarian in multiple roles, the steps to create effective cybersecurity are available to you. Using ISO27001 as the underlying framework and emphasizing a proactive, 20/80 approach (20% effort for 80% results), this session will cover the fundamental knowledge for ensuring a more secure IT environment and how to specifically create an effective data security program at your institution.
The session will begin with Data Security. What is data security? What are we securing against? What is a good backup? How often does one take backups? And of what? I'll bring up the usefulness of Amazon S3 for this purpose, since it is effective and cheap but will provide other cloud solutions they may already have access to.
To begin a Data Security program, participants will need to conduct an audit. Because there is so much data, it's important to sit down with various stakeholders in your institution and find out what data is truly essential to their activities. I'll show a simple worksheet to help manage this discussion with stakeholders and help rank which data and services are essential. I will also give participants a simple email template they can send to their vendors to ask them what steps are being taken to secure their data. These responses from vendors can be used to fill in the worksheet. During this portion we will briefly break down the ISO27001 document since vendors will often cite it.
Having the essential data infrastructure mapped out, the next step is the Disaster Response planning meeting: a simple sit down meeting with various stakeholders to discuss possible responses. I will use the worksheet from the previous section to show how participants can guide this discussion and get a useful outcome that should greatly assist in responding to high-impact cybersecurity events.
You know Sierra and have your API key: now what? Join Ray and Jeremy as they showcase real-world projects you can implement right away at your library. Learn how to harvest and export large data sets, perform batch updates that Global Update can't handle, and streamline your workflows. This session is beginner-friendly and will walk you step by step through tapping into Sierra's REST APIs with Python.
Data Curation Librarian, Minuteman Library Network
Data Curation Librarian for the Minuteman Library Network, former Steering Committee Member, Beacon Award Winner, SQL oversharer, and owner of far too many comics.