Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

  • Identify secure IU solutions for your use case.
  • Build/facilitate custom solutions for your use case.
  • Comply with cybersecurity rules and regulations and IU policies.
  • Review data security you have designed yourself.
  • InterpretĀ  cybersecurity requirements in grants, contracts, data use agreements.
  • Put you in touch with the right people.
  • Partner with you on cybersecurity projects.
  • Communicate your needs to offices engaged in data governance.
  • Anything where cybersecurity/compliance stands in the way of research.
  • No labels