|
In this video we present options for making sure your Zoom meetings are secure from uninvited guests. In Part 1, we demonstrate steps you can take before your meeting; in Part 2, we show what you can…
|
|
Today we talk with Kim Milford, who leads the Research and Education Networks Information Sharing and Analysis Center (REN-ISAC) at Indiana University. We'll dive into the SolarWinds Hack that…
|
|
The video contents are the
responsibility of Indiana University on behalf of the Kelley School of Business
Institute for International Business. Viewpoints shared during the interview
does not…
|
|
Part 10 of our series on the language and culture of Thailand. In this video, you will learn what to if you are in trouble and how to communicate local people in case of emergency.
|
|
Learn the basics of self-defense and situational awareness in this video from IUPD's Lt. Rhodes. This video was recorded as a review for in-person self-defense classes, but is also a great…
|
|
Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…
|
|
Scott Shackelford
serves as a professor of business law and ethics at the Indiana University
Kelley School of Business. He is also the Cybersecurity Program Chair and
Director of the Cybersecurity…
|
|
Dr. Efthymiopoulos is an Associate Professor of International Security and Strategy and former Dean of the College of Security and Global Studies, at the American University in the Emirates. He holds…
|
|
On January 26, 2018, the third International Symposium on Sustainable Development was held. For 2018, the them was "Cybersecurity & Sustainable Development." The day started with a…
|
|
Ms. Stifel is an attorney and the founder of Silicon Harbor Consultants, a firm that provides strategic cybersecurity operations and policy counsel. She currently serves as Cybersecurity Policy…
|
|
Ms. Past is a cyber-defense and strategic communication professional. She currently serves as Chief Research Officer of the cybersecurity branch of the Estonian Information System Authority. She has…
|
|
Rebel groups in armed conflicts around the globe are often violators of international law. Yet,
out of approximately 350 rebel groups in contemporary armed conflicts, 60 groups issue what
legal…
|
|
On Thursday, September 28, ITCP will hosted an
infoshare about IT-28 with Ian Washburn and Charles Escue from the University
Information Security Office(UISO). This was the
first in wht will be a…
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The Second Annual Diversity Leadership Conference will be welcoming intellectual, author and journalist Marc Lamont Hill as a keynote speaker, as well as countless budding student leaders, to Indiana…
|
|
|
|
|
|
|
|
|
|
|