Search for tag: "data security"

Securing HIPAA Workflows on UITS Systems

Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…

From  ittrvid IT Training Video A year ago 70 views 0  

CIBER Focus: "Information Governance around the World" with Scott Shackelford -- May 3, 2018

Scott Shackelford serves as a professor of business law and ethics at the Indiana University Kelley School of Business. He is also the Cybersecurity Program Chair and Director of the Cybersecurity…

From  IIB Institute for Intl Business A year ago 27 views 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance

Optimal Investment in Cybersecurity (Alex Alexeev, Prof. Kerry Krutilla) Link to paper: http://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10289/Optimal%20Investment%20in%20Cybersecuri...

From  David Price 2 Years ago 5 views 0  

Authoritarian Soft Power? Russia, International Cyber Conflict, and the Rise of “Information Warfare - Jackie Kerr

This talk examines Russia’s evolving information strategy abroad, examining the variety of different tools now being used to try to influence the domestic political discourse and media space of…

From  David Price 2 Years ago 21 views 0  

Why Two-Step Login?

Curious about what two-step login is, and how it keeps your personal information safe? Follow the adventures of Tracey Two-Step and learn more about two-step login at Indiana University!

From  ittrvid IT Training Video 2 Years ago 108 views 0  

Use of Administrative Accounts

Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least Privilege: kb.iu.edu/d/amsv…

From  ittrvid IT Training Video 2 Years ago 264 views 0