Viewing 0 current events matching “BYOD” by Date.
Sort By: Date | Event Name, Location , Default |
---|---|
No events were found. |
Viewing 4 past events matching “BYOD” by Date.
Sort By: Date | Event Name, Location , Default |
---|---|
Sunday
Feb 17, 2013
|
integratED|Portland through Sheraton Portland Airport Calling all educators who want to improve their instructional practice with the effective integration of technology! We preach having students be active learners, so let's practice it here with a schedule that promotes active learning, reflection and collaboration. integratED offers a variety of experiences and opportunities: unconference, collaborate with vendor experts, reflect with peers, a two 2-hour sessions, two 3-hour workshops, and two keynotes. This is a BYOD conference and our sessions require facilitator device integration, so don’t miss out. |
Thursday
Mar 20, 2014
|
HiMSS Oregon - Lunch and Learn "BYOD/Mobility - Best Practices within Health Delivery Systems" – Providence (St. Vincent’s) East Pavilion – Souther Auditorium With the explosive growth of Smart Phones, Tablets and other mobile devices, Healthcare Delivery Systems (HDS) have to offer accessibility to both patients and practitioners. Mobility and support of a “Bring Your Own Device” (BYOD) environment have become increasingly necessary as we move into the digital industrial economy. Gartner predicts that Digital incompetence will cause a quarter (25 percent) of businesses to lose their market position by 2017. In the hyper-competitive HDS landscape, Hospitals have to offer more flexibility for access to both their external and internal customers to remain relevant and avoid losing market share. This interactive panel discussion will focus on the challenges that Healthcare Delivery Systems face with these changes. This will include topics ranging from security issues, demands on the network, patient privacy, potential breach of data, and increased financial risk. The panel will discuss best practices within the clinical environment and the infrastructure required to serve the needs of the users, as well as protect the patient information. Distinguished Panelists Include: NAME: Michael Boyd TITLE: Chief Information Security Officer, Providence Health & Services Mike Boyd’s background includes security engineering and risk management work in the fields of media and entertainment, insurance and financial services, higher education and more than a decade working in healthcare information security and risk management. Mike has been with Providence Health & Services for more than six years and currently serves as the Chief Information Security Officer. Providence is a not-for-profit Catholic healthcare system that includes 32 hospitals, more than 350 physician clinics, senior services, supportive housing and many other health and educational services. Providence employs more than 64,000 people across five states – Alaska, California, Montana, Oregon and Washington. Mike’s responsibilities include oversight of information security risk assessment, security incident management, and integration of security risk management within Providence’s environment including information technology, supply chain, revenue cycle, human resources and healthcare operations. Previously Mike served as the Information Security Officer for Oregon Health & Science University and oversaw the security engineering team at Pacific Life Insurance. Mike is also the past president of the Portland chapter of the Information Systems Security Association (ISSA) and a former Captain in the United States Marine Corps. Mike holds is a Certified Information Systems Security Professional (CISSP) and holds a Bachelor of Science in Computer Science from the United States Naval Academy in Annapolis, Maryland. NAME: Paul Aneja
TITLE: IT Architect,
Salem Health NAME: Brad Reardon
TITLE: Lead Wireless Technical Consultant, Brad started out working on his family's home network in high school. After a short stint as a student technical support representative at Berry College, he joined the Marine Corps. While stationed in Hawaii, he worked as a Tactical Data Network Technician overseeing a helpdesk and three networks spanning the Pacific. Once leaving the Marine Corps, Brad went to work leading call center teams for Dell Computers in Phoenix, Arizona. After the opportunity to play professional paintball brought him to the Pacific North West, he worked at Holiday Retirement and Symantec before landing a position working on VoWiFi for Salem Hospital. In 2009, he left Salem Hospital to begin working for Kaiser Permanente. |
Wednesday
Oct 29, 2014
|
Bringing a Secure Cloud to Your Enterprise – Online Webinar The Cloud’s business model allows your organization to leverage existing infrastructure and platform investments for greater convenience, but developing a secure Cloud strategy involves numerous considerations and planning. Join us for this free webinar on October 29th, 2014 at 11am PT where we we will explore Microsoft Azure and Cloud Security. |
Tuesday
Feb 17, 2015
|
ISSA Portland February 2015 Symposium - BYOD – Tiger Woods Center, Nike campus, Beaverton, OR Two presentations on BYOD strategy, followed by a panel discussion. Speaker 1 "BYOD Policy, Trust Continuum, and Enforcement Technologies" In 2015, nearly every organization has had to take a position on where they stand with BYOD. Some IT leaders fully embrace it, others are still pretending it does not exist. While others have defined a "Trust Continuum" granting access in trade for control. Such a innovative approach is impossible without accompanying "Trust Continuum" technical controls to enforce the administrative policy. This presentation will cover from policy to technical enforcement of trust. Collin Miller “Secure Mobility: IT Strategy for the Mobile Enterprise,” delivers a clear assessment of the state of mobile security today paired with an insightful look into what the future holds. He shares vetted strategies for implementing BYOD and packs his talk with practical information about available tools for mobile device and application management. Collin Miller has spent more than a decade thinking about, designing and implementing secure IT infrastructures, especially those incorporating BYOD and mobile device management policies. He is a strategic planner, highly skilled and certified in technologies that touch nearly every part of the enterprise. Currently, Collin focuses his attention and energy on mobile device security and management, DLP, remote access and authentication, next-gen firewalls and SIEM. |