An Introduc+on to CloudPrime
|
|
|
- Martha Day
- 10 years ago
- Views:
Transcription
1 TM An Introduc+on to CloudPrime Secure messaging pla/orm to protect pa2ent privacy and uphold HIPAA/HITECH regula2on Mari Tangredi, CloudPrime 1
2 CloudPrime Company Overview! Headquartered in San Francisco, with offices in Boston and in the UK! Mission to provide secure, resilient, easy- to- consume and cost- effec+ve applica+on messaging services to healthcare! Patented- technology! Strong management team comprised of proven technology leaders and advisors from HealthIT 2
3 CloudPrime Market Valida+on Success/Case Study - HIPAA Compliance with Amazon Web Services! Care Center (United States) Health care Industry The Care Center es+mates that CloudPrime s messaging service provides the company with $433,000 in savings every year Press! Network World Names CloudPrime QuickDrop Product of the Week QuickDrop is a first- of- its- kind, free, secure communica+ons app providing users with the highest level of security available on a mobile device. QuickDrop combines ease- of- use with seamless mobile device integra+on, enabling users to share files of any type with no size limita+ons. Press! CloudPrime s QuickDrop offers Dropbox AlternaDve Dropbox has become the go- to file- sharing app among mobile device users, but enterprise IT doesn't consider Dropbox cloud storage secure enough for sensi+ve corporate data. QuickDrop, a new alterna+ve from CloudPrime Inc., a\empts to solve that problem. Customer Review! Simplest Way to Securely Deliver Message Files Through Endpoints Partnership! IBM muld- year agreement for MQ integradon With CloudPrime, we add a key element to our industry cloud focus by offering a complete and secure cloud- based messaging service Lauren States, IBM Vice President for Cloud Technology & Strategy. 3
4 One step forward. But. 4
5 The Cloud and Healthcare! Adop+on and Uses - 58% plan to adopt cloud- based services - EMR/EHR, Lab order entry, pharmacy records mgt, billing, imaging! Key a\ributes of Cloud- based solu+ons - Security - encryp+on, backing up, and recovery of data - Scalability - ability to store and adapt to EMR/EHR traffic - Mobility allows for access to data when & where its needed! Cost Reduc+on - Opera+onal efficiency pa+ents don t pay for the same tests twice - Avoidance of on- site hardware and soeware costs - Streamlines communica+on - Increases accuracy and speed of reimbursement 5
6 Mobility in Healthcare - mhealth 6
7 mhealth Perspec+ve In this mhealth vision, mobile devices are the nerve endings at the edge of a vast informa+on network. Mal Pos+ngs, Global CTO IT Advisory, Ernst & Young Source: mhealth: Mobile technology poised to enable a new era in health care. Ernst & Young Report,
8 HIPAA and HITECH! HIPAA - HIPAA is the Health Insurance Portability and Accountability Act of 1996! HITECH - HITECH Act, part of the American Recovery and Reinvestment Act of This is the meat behind HIPAA as the enforcement rule! 3 Main Rules - Privacy - Security - Breach No+fica+on 8
9 HIPAA/HITECH Compliance Data Security HIPAA and HITECH establish a set of federal standards intended to protect the security and privacy of pa2ent health informa2on (PHI). CloudPrime cer2ficates all users, applica2ons, components of our service and encrypts all data in- flight and at rest.! Strong EncrypDon bit AES file level encryp+on, which delivers government- grade security and privacy - A mul+- level security model (message, session, applica+on) to safeguard data - Data that is electronically dispersed is encrypted before transmission - Data is encrypted in- flight and at rest! AudiDng - Real- +me access to meta- data - Tracking at the file and message level with log files and customer dashboard access! Data back- up and Guarantee of Delivery - Mul+- path rou+ng - Duplicate Routers and Data Stores - Online Data Storage of mul+ple copies of each message! ReporDng - Centralized access/ac+vity reports and logs 9
10 HIPAA/HITECH Compliance Physical Security! Employees do not have access to padent data and all data is stored in encrypted state! Physical Security! All partner datacenters have mul+ple layers of opera+onal and physical security! Site Security - Cloud Provider uses extensive site- security measures. Photo IDs and electronic keys are needed to access the data center loca+on. In addi+on, only authorized employees have access to the data center, which is staffed and monitored 24 hours per day. Finally, all facili+es are protected by state- of- the- art fire preven+on and detec+on systems.! Hardware Redundancy - Data processing, storage, communica+ons, and control hardware is duplicated with backup systems. Provider regularly updates its hardware to improve performance and service.! PCI DSS Level 1, ISO 27001, FISMA! SAS- 70! SOC 1/SSAE 16/ISAE
11 CloudPrime Secure File Transfer! Files of all types and sizes - Files PDF s, Microsoe Office Documents, Spreadsheets, PowerPoint's - Text Messages an alterna+ve to SMS - Images x- rays, diagnos+c reports - Voice recordings, dicta+on! Sent in a HIPAA compliant manner - All data encrypted in- transit and at rest - Authen+cates users using digital cer+ficates - Provides user portal for the tracking and audi+ng! Ease of Consump+on - Usage based billing - Enterprise licensing available 11
12 CloudPrime Secure File Transfer! Ease of Install - Wizard based installer for Servers/Desktops - Download from AppStore for Smartphone and tablet use! Cross- platorm - Smartphones - Apple ios - Desktops - MacOS/WinOS - Linux! Ease of Administra+on - No new hardware required - Up and running in minutes - PIN func+onality on every device for addi+onal security 12
13 Demonstra+on of QuickDrop! Download of App - CloudPrime Website or AppStore! Registra+on! Launching App - No new hardware required! Sending Messages - Text - Photo/Image - Video - Audio 13
14 CloudPrime Product Line Datacenter, Desktop, Mobile CloudPrime Secure Messaging Fabric CloudPrime for the Datacenter - Secure File Transfer - Connector installs in minutes and eliminates the need for VPNs - Data persistence - Enterprise grade, fully redundant, guaranteed delivery, message tracking QuickDrop Desktop/Mobile - Ad hoc, On Demand file transfer - Desktop to Mobile (D2M) - Mobile to Mobile (M2M) - Cer+ficate (PKI) built in to QuickDrop Applica+on - Local Address Book used to determine receiver/file des+na+on 14
15 Healthcare Use- Cases Mobile Healthcare Insurance Companies Use Case #1: Secure text messaging between Call Centers, Nurses, Doctors and Pa+ents Large Hospitals & Medical Centers EPIC EMR Cerner Millenium GE Centricity Eclipsys Sunrise Siemens Healthcare. Use Case #2: Point- to- point secure file transfer from Laptop in the field to Hospital Urgent Care FaciliDes & Minute Clinics Small Hospitals & PracDce Groups Allscripts EHR AthenaHealth EHR eclinicalworks EHR MRI Centers Use Case #3: Create bi- direc+onal data sharing between prac+ce EHRs, medical center EMRs, and rest of pa+ent care delivery system. Pharmacies External Laboratories Wound Care Centers 15
16 CloudPrime Offer for Webinar Par+cipants! CloudPrime Classic - Free assessment - Implementa+on Fees waived - Trial period extended for 60- days! QuickDrop for ios iphones and ipads - Free download from itunes AppStore - No size limita+ons! QuickDrop for the Windows and Mac - Free download from Mac AppStore or from the CloudPrime Website - No size limita+ons 16
17 Wrap- up - Video Video by Doctor Norman Estin 17
18 Contact Mari Tangredi CloudPrime Website Twi\er LinkedIn
DC Department of Health Care Finance Health Informa4on Exchange
Orion Health DC Department of Health Care Finance Health Informa4on Exchange December 19, 2012 DC Department of Health Care Finance Introduc4ons Introduc=ons Kirk Hendler Federal Government Sales Director
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
An Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use
Copyright 2014 Splunk Inc. Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Ant Lefebvre [email protected] Senior Systems Engineer Middlesex Hospital About Middlesex Hospital Complete range
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
PES Has The Sustainable Solu2on For Chronic Care Management
PES Has The Sustainable Solu2on For Chronic Care Management Empowering pa2ents to lead the management of their chronic diseases through a proven and effec2ve model of collabora2on with clinicians and caregivers.
Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
HIPAA DATA SECURITY & PRIVACY COMPLIANCE
HIPAA DATA SECURITY & PRIVACY COMPLIANCE This paper explores how isheriff Cloud Security enables organizations to meet HIPAA compliance requirements with technology and real-time data identification. Learn
Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
Shannon Rykaceski Director of Opera4ons CCFHCC
Shannon Rykaceski Director of Opera4ons CCFHCC PRESENTER BIO Shannon Salicce Rykaceski Director of Opera4ons for the Catholic Chari4es Free Health Care Center (CCFHCC), located in PiCsburgh, PA. Prior
How To Print With P2C
Introducing print2cloud247 Secure Printing from the Cloud Print2Cloud247 is a print mobility software solution that is highly secure, easy to manage, completely agnostic and provides mobile printing from
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style
An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network
Joe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
Healthcare Informa/on at Risk: Prac/cal Strategies to Avoid Breaches
Healthcare Informa/on at Risk: Prac/cal Strategies to Avoid Breaches Sam Pierre- Louis, CISSP- ISMP - - MDAnderson Cancer Center David Houlding, CISSP, CIPP - - Intel David S. Finn, CISA, CISM, CRISC -
OCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
Phone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions
Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,
How To Make A Cloud Conference Available To Everyone
The Cloud Meeting Company Cloud Meetings 2015 Cloud Meetings 1980 s 1990 s 2000 s Cloud Video Conferencing Telephone Conferencing Hardware Video Conferencing Online Meetings Group Messaging Simple Online
Using Mobile to Capture In- the- Moment Insights
With the global leader in sampling and data services Using Mobile to Capture In- the- Moment Insights Saran Ganesh Director, Mobile product marke8ng 2015 Survey Sampling Interna6onal 1 During this webcast
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
The Cloud Meeting Company. Richard Gatchalian, Sales Executive [email protected]
The Cloud Meeting Company Richard Gatchalian, Sales Executive [email protected] Cloud Meetings 2014 Cloud Meetings 1980 s 1990 s 2000 s Cloud Video Conferencing Telephone Conferencing Hardware
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Open Platform. Clinical Portal. Provider Mobile. Orion Health. Rhapsody Integration Engine. RAD LAB PAYER Rx
Open Platform Provider Mobile Clinical Portal Engage Portal Allegro PRIVACY EMR Connect Amadeus Big Data Engine Data Processing Pipeline PAYER CLINICAL CONSUMER CUSTOM Open APIs EMPI TERMINOLOGY SERVICES
HIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010
Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,
HIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
Fuze for personal computers... 7 Fuze for mobile devices... 7 ios... 7 Android... 7
Fuze technology. Table of contents. Fuze architecture. 4 6 UCAPI services... 5 Audio conference bridge... 5 Audio conference service... 5 Transport services... 5 Screen sharing hubs... 6 Video conference
BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment
BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
How To Manage A Mobile Device Management At Harvard
Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile
Cloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
Integration for your Health Information System
Integration for your Health Information System Achieve comprehensive healthcare IT integration that leverages your existing IT investments and helps you meet the growing demands of Meaningful Use, HIE,
Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering
Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering Agenda Industry Trends Cloud Storage Evolu4on of Storage Architectures Storage Connec4vity redefined S3 Cloud Storage Use
Payments Cards and Mobile Consul3ng Overview 2013
Payments Cards and Mobile Consul3ng Overview 2013 Our Services A digital publishing and marke3ng pla4orm for the future of payments Publishing Research Consul0ng Public Rela0ons Marke0ng/Branding Corporate
eztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
Contact Center Rou,ng Strategies for Improving Customer Experience
Contact Center Rou,ng Strategies for Improving Customer Experience an ebook from Genesys 1 The Contact Center Reality A finite number of available associates A variable volume of contacts A limited amount
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
Private Cloud Website Solu2on
Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business
Secure and control how your business shares files using Hightail
HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files
Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
Data Storage That Looks at Business the Way You Do. Up. cloud
Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Centricity 360 Case Exchange
GE Healthcare Centricity 360 Case Exchange Helping distributed teams collaborate on patient cases, through a professional social network Introduction Centricity 360 with Case Exchange helps hospital administrators
Codeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
Top 5 Ways to Improve Your Billing & Collec=ons
Top 5 Ways to Improve Your Billing & Collec=ons Presenters: Jillian Longpre Vice President Franco Rizzolo, DC CEO Brought to you by: Industry leading Educa1on Cer1fied Partner Program Please ask ques1ons
Building an Effec.ve Cloud Security Program
Building an Effec.ve Cloud Security Program Laura Posey Senior Security Strategist, Microso3 Corpora6on Co- Chair, CSA CAIQ Programming Chair, NY Metro CSA Chapter Is Cloud worth it? Yes! Pla?orm for Innova.on
Discovering Healthcare Technology Solutions for Ensuring EHR Success. Sponsored by
Discovering Healthcare Technology Solutions for Ensuring EHR Success Sponsored by Presented by Jeffery Daigrepont, Senior VP Coker Group 1000 Mansell Exchange West Suite 310 Alpharetta, GA 30022 770-597-0590
