Meet the faculty

Scott Shackelford

Scott J. Shackelford, PhD, JD, is associate professor of business law, chair of the IU Bloomington Cybersecurity Program, executive director of the Ostrom Workshop, and director of the workshop’s Program on Cybersecurity and Internet Governance. He also is an affiliated scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Society, as well as a senior fellow at the Center for Applied Cybersecurity Research, and a term member at the Council on Foreign Relations.

Scott, author of The Internet of Things: What Everyone Needs to Know (Oxford University Press, 2020), has written more than 100 articles, book chapters, essays, and op-eds for diverse outlets ranging from the University of Illinois Law Review and the American Business Law Journal to the Christian Science Monitor and HuffPost. His research has been covered by diverse outlets, including Politico, NPR, Forbes, Time, Forensic Magazine, Law360, Washington Post, and the L.A. Times. He is also the author of Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Cambridge University Press, 2014). Both his academic work and teaching have been recognized with numerous awards, including a Harvard University Research Fellowship, a Stanford University Hoover Institution National Fellowship, a Notre Dame Institute for Advanced Study Distinguished Fellowship, the 2014 Indiana University Outstanding Junior Faculty Award, and the 2015 Elinor Ostrom Award.

Isn't cybersecurity somebody else's job?

Basic cybersecurity literacy is becoming increasingly vital to business executives and leaders across an array of industries, sectors, and nations. Cyber attackers, ranging from hactivists to organized crime networks and even nation states, are targeting vulnerable networks and are frequently successful in stealing funds as well as valuable intellectual property.

Congress, international organizations, and industry groups continue to call for cybersecurity best practices to better manage the multifaceted cyber threat facing the private sector. However, it is not always clear what those practices should be, or how to implement them in a dynamic, global regulatory environment.

The Global Cybersecurity Foundations digital badge program will enable you to answer these questions, and more, equipping you with the tools you need to spot cyber threats and opportunities in an increasingly crowded and risky global marketplace. You will gain a thorough understanding of trends in cybersecurity litigation, federal cybersecurity policy, as well as how other cyber powers—in particular the US and Europe—are approaching common problems such as managing security and privacy concerns in the burgeoning Internet of Everything.

Learning objectives

After successfully completing this digital badge program, participants will:
  • Better understand the multifaceted cyber threat facing the private sector.
  • Be equipped with a toolbox of cybersecurity best practices designed to manage your cyber risk exposure.
  • Have a firm introduction to U.S. cybersecurity law and policy including what the emerging cybersecurity standard of care means for your business.
  • Know the contours of important cybersecurity debates such as the appropriate role of government in safeguarding critical infrastructure, analyzing the benefits and drawbacks of cyber risk insurance, and what Internet governance has to do with the C-suite.
  • Situate U.S. efforts at enhancing cybersecurity in a global context, and be aware of how other jurisdictions are regulating this space.
  • Further develop the confidence necessary to work well collaboratively on interdisciplinary cybersecurity solutions.


In addition to the live sessions, supplemental content will be provided in the form of short, targeted weekly readings and supplemental readings and asynchronous discussion forums. When possible, the recording process will take place in the Kelley School of Business studio to permit special effects and other additional multimedia content.

Alternative ways to earn the Badge will be made available upon request to accommodate, for example, professional and personal conflicts. These will include developing a ‘cyber attack post mortem’ that investigates how an organization responded to a real-world data breach, and what they could have done better.