Hi [[ session.user.profile.firstName ]]

Independent Technology Group (ITG)

  • Date
  • Rating
  • Views
  • Healthcare IT Debate: Data Security vs. Healthcare Technology Healthcare IT Debate: Data Security vs. Healthcare Technology Jason Rehbolz, Mandiant Senior Consultant, vs. Connor Landgraf, CEO of Eko Devices. Moderated by ITG. Recorded: Aug 27 2014 48 mins
    ITG Debates presents a debate between FireEye and Eko Devices on the topic "Is data security just as important as cutting-edge healthcare technology." FireEye manufactures top of the line network security products, and regularly produces research on the modern cyber threat landscape. Eko Devices is a startup on the cutting edge, producing the world's smartest stethoscopes which generate data that is stored on the network. This debate will be hosted by ITG, and will explore the impacts of cyber threats and modern medicine technology on quality of care, patient data, privacy, and hospital brand. This debate will have relevant information for anyone in the IT and infosec sectors, as well as hospital, healthcare, and other health related industry professionals. Attendees will have an opportunity to win a GoPro Hero3!
  • A Day In The Life Of A Mobile Clinician A Day In The Life Of A Mobile Clinician Jen Pulsifer, Healthcare Industry Principal and Director of Business Development, Juniper Networks Recorded: Dec 3 2013 59 mins
    Today’s Health IT leaders face a difficult task in handling mobile device security and policy compliance, particularly given the mobile transformation happening in healthcare today. Driven in part by the adoption of new care models like remote patient monitoring and telemedicine, and the Bring Your Own Device, or BYOD trend, the consumerization of IT is driving end-user demand for ubiquitous access – to networks, to clouds, to applications, to everything – from any device, anywhere at any time.

    In this webinar, we will highlight the challenges of mobile device security, management and policy today. We will consider the issues faced by Health IT teams when managing different operating systems across a myriad of devices, some of which are user-owned. Finally we’ll look at how Juniper Networks solutions address a broad spectrum of security and end-user experience issues, as we walk through a day in the life of a mobile clinician. Register now to attend!
  • Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Health Security Solutions & Juniper Networks Recorded: Nov 5 2013 63 mins
    Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.

    Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.

    But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.

    Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?

    What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.

    Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.

Embed in website or blog