Search for tag: "data security"

Securing HIPAA Workflows on UITS Systems

Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…

From  Group IT Training Video 212 plays 0  

CIBER Focus: "Information Governance around the World" with Scott Shackelford -- May 3, 2018

Scott Shackelford serves as a professor of business law and ethics at the Indiana University Kelley School of Business. He is also the Cybersecurity Program Chair and Director of the Cybersecurity…

From  Group Institute for Intl Business 35 plays 0  

CIBER Focus: "Sustainable Development Part 2: The Cybersecurity Landscape in Dubai" with Marios Efthymiopoulos - January 26, 2018

Dr. Efthymiopoulos is an Associate Professor of International Security and Strategy and former Dean of the College of Security and Global Studies, at the American University in the Emirates. He holds…

From  Group Institute for Intl Business 23 plays 0  

Simon_Cancer_Center_mtg_20170726.mp4

Scheduled recording

From  Sharon Dendler 24 plays 0  

IT Pro Water Cooler - June 2017 - Security, Pt. 1

In part one of June 13th's security themed water cooler event, Nathan Byrer and Tim Goth (Security affinity group) give an overview of NMap. Kim Milford (REN-ISAC) gives her "state of the…

From  Group IT Community Partnerships 25 plays 0  

HIPAA TEDMED 06052017 1517

From  Michael Jasiak 9 plays 0  

HIPAA TEDMED 06052017 1517

From  gmeres GME Resources 2,828 plays 0  

HIPAA TEDMED 05302017 1637

From  Group LT Video Production 21 plays 0  

HIPAA TEDMED 05252017 1530

From  Group LT Video Production 13 plays 0  

mbp_am_20170512.mp4

Scheduled recording

From  Alain Barker 48 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance

Optimal Investment in Cybersecurity (Alex Alexeev, Prof. Kerry Krutilla) Link to paper: http://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10289/Optimal%20Investment%20in%20Cybersecuri...

From  David Price 5 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance

Advancing the Science of Cybersecurity Risk Assessment through Holistic, Dynamic Modeling (Prof. Diane Henshel, Mariana Cains, & Alex Alexeev)

From  David Price 5 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance

Sometimes Three Rights Really Do Make a Wrong: Measuring Cybersecurity and Simpson’s Paradox (Prof. Eric Jardine, Virginia Polytechnic Institute & State University)

From  David Price 6 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance

Too-Big-To-Fail 2.0: Cybersecurity & Online Platforms (Prof. Nizan Geslevich Packin, City University of New York)

From  David Price 14 plays 0  

Authoritarian Soft Power? Russia, International Cyber Conflict, and the Rise of “Information Warfare - Jackie Kerr

This talk examines Russia’s evolving information strategy abroad, examining the variety of different tools now being used to try to influence the domestic political discourse and media space of…

From  David Price 26 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017

Becoming an Information Security Engineer (Ashwin J. Mathew, Packet Clearing House) Discussant: Prof. Barbara Cherry (IU)

From  David Price 3 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017

Security of the Internet of Things: The Roles of Market Forces, Regulations and Technology (Prof. Nir Kshetri, University of North Carolina at Greensboro) Discussant: Worku Gedefa Urgessa…

From  David Price 11 plays 0  

Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017 -Opening Welcome

Welcome from Prof. Scott Shackelford; Welcome from Federica Carugati, Ostrom Workshop Associate Director, & Introductions; Initial Brainstorming Session: Big Issues in Cybersecurity and…

From  David Price 6 plays 0  

2017_02_21_Webinar-MSCybersecurity (2/22)

From  Scott Shackelford 64 plays 0  

Eyebloc SharkTank S5E13. Cut

From  Regan Stevenson 131 plays 0  

Why Two-Step Login?

Curious about what two-step login is, and how it keeps your personal information safe? Follow the adventures of Tracey Two-Step and learn more about two-step login at Indiana University!

From  Group IT Training Video 143 plays 0  

Dyn DDoS attack

From  Bipin Prabhakar 61 plays 0  

Use of Administrative Accounts

Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least Privilege: kb.iu.edu/d/amsv…

From  Group IT Training Video 285 plays 0  

Cybersecurity Business Source Premier - 2016 Sep 03 06:47:45

From  Terry Campbell 20 plays 0