Description of the video:
Music: fades in]
[Video: Sagar Samtani sits in an office speaking]
[Animation: Lower third, text: Sagar Samtani Assistant Professor of Operations and Decision Technology animates]
So the field of cybersecurity is changed and that originally it was a $40 thousand a year type of problem that only selected organizations that have to worry about. But now it's evolved to a problem, where almost every organization that has some form of
[Video: a computer room with three employees at computer stations working]
information technology has to be aware of and be able to tackle accordingly as well.
[Video: Sagar Samtani sits in an office speaking]
[Photo: Sagar wearing a mask stands in a lecture hall with masked students]
In terms of how we're preparing students to battle the cybersecurity challenges of tomorrow,
[Photo: Sagar wearing a mask stands behind a desk teaching a class of masked students]
we're really trying to position them such that they're aware of the different types of job roles
[Video: Sagar Samtani sits in an office speaking]
[Video: Sagar wearing a mask sits in a office working with a masked student]
and the different types of tasks associated with those job roles as well. And developing curriculum to help build their skill sets to, to be suitable in those particular types of jobs.
[Video: Sagar Samtani sits in an office speaking]
[Video: Sagar and Ben Lazarine walk down a hallway wearing masks]
So I actually chose to study cybersecurity because I think that it's a really and exciting meeting
[Video: Ben Lazarine sits in an office speaking]
[Animation: Lower third, text, Ben Lazarine Ph.D. Student of Management and Information Systems]
ground between business, computer science and artificial intelligence. It's a space where you can use skills from all three of those areas to solve problems across all three of
[Video: Sagar and Ben sit in an office working on a laptop]
those areas for really high impact issues.
[Video: Sagar Samtani sits in an office speaking]
Indiana University has had a long history of excellence and investments into operational cybersecurity in particular. And there's some leading initiatives
[Video: fades to two women in a server room talking in front of a laptop]
that are here at Indiana University. That aim to help serve the local community as well as the
[Video: fades to Sagar Samtani sits in an office speaking]
larger nation as well.
So for instance, we have the REN-ISAC,
[Video: Man sitting at computer desk reads through their browser]
Research and Education Network, which is focused on sharing threat intelligence related to cybersecurity across Indiana and across
[Video: Aerial shot of Lake Lemon in Bloomington, IN]
[Video: Aerial shot of Indianapolis, IN city skyline]
the nation as well, which is a very unique aspect to what we've got here at IU compared to other
[Video: Aerial shot of Indiana University Bloomington Campus]
[Video: Sagar Samtani sits in an office speaking]
institutions that really helps, makes us a leader within the space.
[Video: Ben sits in an office speaking]
One of the trickier parts about cybersecurity, especially Artificial Intelligence within cybersecurity is that it's a two-pronged requirement. First, you need to understand the methodology and then the domain.
And then once you
[Video: Ben and Sagar wearing masks talk in an office in front of a laptop]
understand both of those things, then you actually need to understand the linkage between those two things.
[Video: Ben sitting in an office speaking]
And so that's something that the professors here do an excellent job of illustrating for us.
[Video fades to black][Animation: Indiana University logo, INDIANA UNIVERSITY, research.impact.iu.edu fade in and out][Music fades out]