Having a clear understanding of where your data is being consumed is a critical first step toward being able to secure and ultimately protect it. Using data flow diagrams, it is possible to know the ...
Many applications for project funding or use of external data require attestations of security controls in place to protect the research. To aid researchers in establishing environments, Northwestern ...
Any professional knows that data is critical. However, what may be more important is breaking down large or complex data sets into a manner that other collaborators or colleagues can understand.