8405 Pulsar Place
Sponsored by the OLC’s Information Technology Division and Ohio Public Library Information Network (OPLIN)
Register @ my OLC | Registration Deadline: Nov. 15
Member Fee: $85* | Non-Member Fee: $170
*Individual members or staff of OLC institutional member libraries
Intended Audience: Ohio library information technology staff, technology coordinators, and decision makers
What’s Included: All handouts as provided by the presenters. Ice Breaker event (the evening prior), morning coffee, light refreshments and lunch will be provided.
Continuing Education Credits: For those working toward their Ohio Public Librarian or Ohio Public Library Staff Re-certification, this workshop counts as six (6) contact hours.
Accommodations: For a list of hotels in the area, please email email@example.com or call 614-410-8092.
Right Click 2019 Overview:
Right Click 2019 features presentations from professionals, government entities and library IT professionals from around Ohio. This one-day workshop is a unique opportunity for library IT professionals, administrators and support staff to share their knowledge and discuss current technology challenges. Connect with your IT Colleagues from around the state, and come away with solutions to current issues that you can apply at your library.
Submit a Forum Discussion Question:
A question and answer discussion forum will take place during the event. Submit your question now for the afternoon forum. Example questions include: What are some backup solutions for VMs? What are people using for digital signage? What are some solutions for network security and monitoring? Have a question you would like answered at the conference? Submit one now.
8:00 – 8:45 a.m. | Registration / Networking / Refreshments
8:45 – 9:00 a.m. | Welcome and Introductions
9:00 a.m. – 9:45 a.m. | Keynote Session
The Ohio Cyber Collaboration Committee (OC3)—Helping Ohio Achieve World Class Cyber Security
Mark Bell is the Cyber Security Outreach Coordinator for the Ohio Adjutant General’s Office. During his keynote presentation, Bell will discuss the OC3’s cyber security programs and how their efforts in: Education and Workforce Development; Building the Ohio Cyber Range; Creating Cyber Response Teams, and Policy and Public Awareness of cyber security, can partner with and support library programs and efforts around Ohio. The OC3’s efforts support educational programming at the library level as well as help to keep library networks and data safe from cyber criminals.
About the Keynote:
Mark Bell primarily works with a wide range of partners throughout Ohio, organized into the Ohio Cyber Collaboration Committee (OC3) to improve the cyber security posture of the state through education and workforce development, the creation of a Cyber Range in Ohio, the development of cyber response teams for Ohio, and the sharing of best cyber practices and policies throughout the state. Prior to working for the Ohio National Guard, Mark worked as District Director and Deputy Chief of Staff for Congressman Patrick Tiberi. In addition to his work at the Ohio National Guard, Mark continues to serve in the US Army Reserve as the Command Sergeant Major of a Military Police Battalion located in Columbus.
9:55 a.m. – 10:25 a.m. | Cyber Policy Guidelines
Presenter: Dr. Loren Wagner, Senior Executive: Risk & Business Development, CentrComm
Cyber security and related events have become part of the daily news digest. Regulatory mandates and guidelines are quickly following. As a result, we are facing more demands on managing cyber security risk. A significant part of this is the implementation of institutional policies reflecting management philosophies for the security and privacy of digital assets and related human interaction. This presentation will discuss some of the most likely policies you need to be familiar with and why. Policy constructs will be discussed. Examples will be provided with references to assist in further policy development and understanding.
- Distinction between policies, guidelines, and procedures
- Why I should care about cyber policies
- Key types of policies
- Policy construction and examples
- References to assist in policy development
10:35 – 11:05 a.m. | Gaming and eSports at Cleveland Public Library
Presenter: Tristan Wheeler, Audiovisual & Event Planning Specialist, Cleveland Public Library
During this session, Wheeler will explain the history and development of the gaming and eSports events at the Cleveland Public Library, along with information on how to develop game-related programs and events at your library.
11:15 a.m. – 11:45 a.m. | Geauga County Public Library Mobile Memory Lab
Presenter: Michael Pope, IT Manager, Geauga County Public Library (GCPL)
During this session, Pope will explore the process for creating GCPL’s Mobile Memory Lab, including:
- What is a Memory Lab and how can it benefit your library patrons;
- Equipment and software for GCPL’s Memory Lab;
- Developing training for library staff and library patrons;
- Other discoveries made along the way!
11:55 a.m. – 12:25 p.m. | Developing the New Dayton Metro Library Mobile App
Presenter: Matthew Jones, Web Developer, Dayton Metro Library
In this program, Jones will explore the app development journey at Dayton Metro Library. You will learn how he utilized Google’s Flutter framework to develop for both iOS and Android using a single code base. Plus, you’ll learn how he leveraged the Polaris API. Since the initial release in July 2019, the response from both patrons and staff has been overwhelmingly positive. The app allows users to:
- Search the Catalog
- Place and View Requests
- View Checked Out Items
- Access Their Library Card
- Find Library Locations
- View Library Hours
- Contact the Library
12:25 – 1:15 p.m. | Lunch
1:15 – 1:45 p.m. | CIS and the MS-ISAC
Presenters: Kelly Morris, Member Success Program Manager and Paul Jones, Account Management Specialist, Center for Internet Security and Multi-State Information Sharing and Analysis Center
Morris and Jones will join the session remotely to discuss the cyber security resources available from the Center for Internet Security (CIS). CIS offers government organizations free Secure Suite Membership, which combines and automates the CIS Benchmarks, CIS Controls, and CIS-CAT Pro into one powerful, time-saving cyber security resource. Libraries are also eligible for free membership in the Multi-State Information Sharing and Analysis Center (MS-ISAC), whose mission is to improve the overall cyber security posture of government organizations through focused cyber threat prevention, protection, response, and recovery. Join them in a discussion of these free resources.
1:50 – 3:30 p.m. | Q&A Open Forum – Submit Questions and Topics
Please submit questions and topics that you would like to discuss during this moderated forum.
Example questions include:
- What are some backup solutions for VMs?
- What are people using for digital signage?
- What are some solutions for network security and monitoring?
Have a question you would like answered at the conference? Submit one now!