Description
Cybersecurity and research do not have to be opposed to each other. With increasing cyberattacks, it is more important than ever for cybersecurity and research to corporate. The authors describe how Research Liaisons and Information Assurance: Michigan Medicine (IA:MM) collaborate

Cybersecurity and research do not have to be opposed to each other. With increasing cyberattacks, it is more important than ever for cybersecurity and research to corporate. The authors describe how Research Liaisons and Information Assurance: Michigan Medicine (IA:MM) collaborate at Michigan Medicine, an academic medical center subject to strict HIPAA controls and frequent risk assess- ments. IA:MM provides its own Liaison to work with the Research Liaisons to better understand security process and guide researchers through the process. IA:MM has developed formal risk decision processes and informal engagements with the CISO to provide risk- based cybersecurity instead of controls-based. This collaboration has helped develop mitigating procedures for researchers when standard controls are not feasible.
Reuse Permissions
  • Downloads
    PDF (430.7 KB)
    Download count: 1

    Details

    Title
    • Cybersecurity and research are not a dichotomy: : How to form a productive operational relationship between research computing and data support teams and information security teams
    Contributors
    Date Created
    2022-07-14
    Resource Type
  • Text
  • Collections this item is in
    Identifier

    Citation and reuse

    Cite this item

    This is a suggested citation. Consult the appropriate style guide for specific citation guidelines.

    Deb McCaffrey and Jessica Kelley. 2022. Cybersecurity and Research are not a Dichotomy: How to form a productive operational relationship between research computing and data support teams and information security teams. In Practice and Experience in Advanced Research Computing (PEARC '22). Association for Computing Machinery, New York, NY, USA, Article 67, 1–4. ASU KEEP Repository https://hdl.handle.net/2286/R.2.N.191218

    © Deb McCaffrey and Jessica Kelley | ACM 2022. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in In Practice and Experience in Advanced Research Computing (PEARC '22). Association for Computing Machinery https://doi.org/10.1145/3491418.3535180 

    Machine-readable links