Search for tag: "data security"

Securing HIPAA Workflows on UITS Systems

Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…

From  ittrvid IT Training Video on May 29th, 2018 78 plays 0  

CIBER Focus: "Information Governance around the World" with Scott Shackelford -- May 3, 2018

Scott Shackelford serves as a professor of business law and ethics at the Indiana University Kelley School of Business. He is also the Cybersecurity Program Chair and Director of the Cybersecurity…

From  IIB Institute for Intl Business on May 1st, 2018 27 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance

Optimal Investment in Cybersecurity (Alex Alexeev, Prof. Kerry Krutilla) Link to paper: http://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10289/Optimal%20Investment%20in%20Cybersecuri...

From  David Price on May 3rd, 2017 5 plays 0  

Authoritarian Soft Power? Russia, International Cyber Conflict, and the Rise of “Information Warfare - Jackie Kerr

This talk examines Russia’s evolving information strategy abroad, examining the variety of different tools now being used to try to influence the domestic political discourse and media space of…

From  David Price on April 28th, 2017 21 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017

Security of the Internet of Things: The Roles of Market Forces, Regulations and Technology (Prof. Nir Kshetri, University of North Carolina at Greensboro) Discussant: Worku Gedefa Urgessa (University…

From  David Price on April 28th, 2017 8 plays 0  

Why Two-Step Login?

Curious about what two-step login is, and how it keeps your personal information safe? Follow the adventures of Tracey Two-Step and learn more about two-step login at Indiana University!

From  ittrvid IT Training Video on November 29th, 2016 111 plays 0  

Use of Administrative Accounts

Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least Privilege: kb.iu.edu/d/amsv…

From  ittrvid IT Training Video on October 28th, 2016 267 plays 0