Things like
- Identify/recommend secure IU solutions for your use case.
- Facilitate custom solutions for your use case.
- Comply with cybersecurity rules, regulations, and IU policies.
- Help with/review data security plans you are developing yourself.
- Interpret cybersecurity requirements in grants, contracts, data use agreements.
- Tell you if IU can support specific cybersecurity requirements.
- Put you in touch with the right people on campus.
- Communicate your needs to authorities engaged in security and data governance.
... in other words, anything where cybersecurity/compliance stands in the way of research.
Search for a recipe:
Navigation Tip
To go back to the home page, you can click the small IU icon at the top of the sidebar or use breadcrumbs above the title.