Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Things like

  • Identify/recommend secure IU solutions for your use case.
  • Build/facilitate custom solutions for your use case.
  • Comply with cybersecurity rules and regulations and IU policies.
  • Review data security plans you are developing yourself.
  • InterpretĀ  cybersecurity requirements in grants, contracts, data use agreements.
  • Put you in touch with the right people.
  • Partner with you on cybersecurity projects.
  • Communicate your needs to authorities engaged in security and data governance.
  • ... in other words, anything where cybersecurity/compliance stands in the way of research.


Navigation Tip

To go back to the home page, you can click the small IU icon at the top of the sidebar or use breadcrumbs above the title.

  • No labels