Search for tag: "data security"
Securing HIPAA Workflows on UITS SystemsLearn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…
From Group IT Training Video
231 plays
0
|
|
CIBER Focus: "Information Governance around the World" with Scott Shackelford -- May 3, 2018Scott Shackelford serves as a professor of business law and ethics at the Indiana University Kelley School of Business. He is also the Cybersecurity Program Chair and Director of the Cybersecurity…
From Group Institute for Intl Business
35 plays
0
|
|
CIBER Focus: "Sustainable Development Part 2: The Cybersecurity Landscape in Dubai" with Marios Efthymiopoulos - January 26, 2018Dr. Efthymiopoulos is an Associate Professor of International Security and Strategy and former Dean of the College of Security and Global Studies, at the American University in the Emirates. He holds…
From Group Institute for Intl Business
24 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet GovernanceOptimal Investment in Cybersecurity (Alex Alexeev, Prof. Kerry Krutilla) Link to paper: http://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10289/Optimal%20Investment%20in%20Cybersecuri...
From David Price
5 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet GovernanceAdvancing the Science of Cybersecurity Risk Assessment through Holistic, Dynamic Modeling (Prof. Diane Henshel, Mariana Cains, & Alex Alexeev)
From David Price
5 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet GovernanceSometimes Three Rights Really Do Make a Wrong: Measuring Cybersecurity and Simpson’s Paradox (Prof. Eric Jardine, Virginia Polytechnic Institute & State University)
From David Price
7 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet GovernanceToo-Big-To-Fail 2.0: Cybersecurity & Online Platforms (Prof. Nizan Geslevich Packin, City University of New York)
From David Price
14 plays
0
|
|
Authoritarian Soft Power? Russia, International Cyber Conflict, and the Rise of “Information Warfare - Jackie KerrThis talk examines Russia’s evolving information strategy abroad, examining the variety of different tools now being used to try to influence the domestic political discourse and media space of…
From David Price
26 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017Becoming an Information Security Engineer (Ashwin J. Mathew, Packet Clearing House) Discussant: Prof. Barbara Cherry (IU)
From David Price
3 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017Security of the Internet of Things: The Roles of Market Forces, Regulations and Technology (Prof. Nir Kshetri, University of North Carolina at Greensboro) Discussant: Worku Gedefa Urgessa…
From David Price
11 plays
0
|
|
Inaugural Ostrom Workshop Colloquium on Cybersecurity and Internet Governance April 27–28, 2017 -Opening WelcomeWelcome from Prof. Scott Shackelford; Welcome from Federica Carugati, Ostrom Workshop Associate Director, & Introductions; Initial Brainstorming Session: Big Issues in Cybersecurity and…
From David Price
6 plays
0
|
|
Why Two-Step Login?Curious about what two-step login is, and how it keeps your personal information safe? Follow the adventures of Tracey Two-Step and learn more about two-step login at Indiana University!
From Group IT Training Video
149 plays
0
|
|
Use of Administrative AccountsLinks in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least Privilege: kb.iu.edu/d/amsv…
From Group IT Training Video
285 plays
0
|
|