- Identify secure IU solutions for your use case.
- Build/facilitate custom solutions for your use case.
- Comply with cybersecurity rules and regulations and IU policies.
- Review data security you have designed yourself.
- InterpretĀ cybersecurity requirements in grants, contracts, data use agreements.
- Put you in touch with the right people.
- Partner with you on cybersecurity projects.
- Communicate your needs to offices engaged in data governance.
- Anything where cybersecurity/compliance stands in the way of research.
Manage space
Manage content
Integrations