Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Things like

  • Identify/recommend secure IU solutions for your use case.
  • Build/facilitate custom solutions for your use case.
  • Comply with cybersecurity rules and regulations and IU policies.
  • Review data security plans you have designed are developing yourself.
  • InterpretĀ  cybersecurity requirements in grants, contracts, data use agreements.
  • Put you in touch with the right people.
  • Partner with you on cybersecurity projects.
  • Communicate your needs to offices authorities engaged in security and data governance.
  • Anything ... in other words, anything where cybersecurity/compliance stands in the way of research.

...