Things like
- Identify/recommend secure IU solutions for your use case.
- Build/facilitate custom solutions for your use case.
- Comply with cybersecurity rules and regulations and IU policies.
- Review data security plans you have designed are developing yourself.
- InterpretĀ cybersecurity requirements in grants, contracts, data use agreements.
- Put you in touch with the right people.
- Partner with you on cybersecurity projects.
- Communicate your needs to offices authorities engaged in security and data governance.
- Anything ... in other words, anything where cybersecurity/compliance stands in the way of research.
...