『The MedTech Monitor Podcast』のカバーアート

The MedTech Monitor Podcast

The MedTech Monitor Podcast

著者: Axeleos Inc.
無料で聴く

このコンテンツについて

Your weekly guide to the technologies transforming healthcare; concise, actionable, and designed for busy professionals. Hosted by Will Evertsen, Founder & Principal Consultant at Axeleos Consulting, each Monday we deliver a 20–30-minute deep-dive into the topics you need to know!Copyright 2025 All rights reserved. 衛生・健康的な生活 身体的病い・疾患
エピソード
  • Episode #08: Cloud Migration for Healthcare: Risks & Rewards
    2025/07/07

    Thinking about moving your EHR, imaging systems, or analytics to the cloud? In this episode, Will Evertsen walks you through:

    • Migration models & benefits (public, private, hybrid)

    • Top risks—from misconfigurations and shared-responsibility gaps to data residency and cost sprawl

    • Secure migration guardrails—identity & access management, encryption & key control, network isolation, and infrastructure-as-code

    • Optimizing cloud ops—continuous monitoring, cost governance, and automated disaster-recovery drills

    MEDTECH MINUTE STORIES:

    https://www.medicaleconomics.com/view/57-of-patients-say-yes-to-ai-in-the-exam-room-if-it-means-more-time-with-their-doctor

    https://www.healthcareitnews.com/news/northwell-deploys-new-safety-and-security-tech-motorola

    https://insights.citeline.com/medtech-insight/digital-technologies/cybersecurity/fda-publishes-final-cybersecurity-guidance-to-replace-final-cybersecurity-guidance-IHPBWNQ6V5E3TCIKCIOJE6HDZA/

    続きを読む 一部表示
    26 分
  • Episode #07: Protecting Against Insider Threats
    2025/06/30

    Insider threats, ranging from malicious employees to well-meaning staff mistakes and compromised credentials, pose a significant risk to healthcare data. In this episode, we unpack:

    • Types of Insider Threats: Malicious, negligent, and credential-based actors

    • Prevention Tactics: Least‐privilege access, separation of duties, MFA, and endpoint hardening

    • Detection & Monitoring: Behavior analytics, SIEM + DLP integration, and audit‐ready logs

    • Response & Investigation: Insider‐threat playbooks, forensic collection, legal/HR coordination, and breach reporting criteria

    • Building a Security Culture: Targeted drills, clear reporting channels, and positive reinforcement programs

    MEDTECH MINUTE STORIES:

    https://www.healthcareitnews.com/news/mclaren-notifies-743k-patients-about-data-breach

    https://www.medtechdive.com/news/fda-stops-olympus-device-imports/751568/

    https://healthtechmagazine.net/article/2025/06/exploitation-trends-underscore-need-layered-cybersecurity-healthcare

    続きを読む 一部表示
    27 分
  • Episode #06 - Telehealth Security: Best Practices for Virtual Care
    2025/06/23

    Telehealth isn’t just convenient—it’s a new attack surface for ePHI. In this episode, we'll walk through the end-to-end security controls every virtual care program needs:

    • Choosing a fully HIPAA-compliant platform with end-to-end encryption and a solid BAA

    • Strong patient authentication with identity proofing and multi-factor requirements

    • Secure handling of session recordings, transcripts, and chat logs—encrypted at rest and in transit

    • Staff training on private-session etiquette and quarterly security drills

    • Building a telehealth-specific incident response playbook and real-time monitoring rules

    MEDTECH MINUTE STORIES

    https://www.hipaajournal.com/episource-data-breach/

    https://www.bioworld.com/articles/721324-alphadesign-ai-creating-proteins-from-scratch

    https://www.healthcareitnews.com/news/umass-inks-deal-begin-evaluating-health-ai-products

    続きを読む 一部表示
    25 分
まだレビューはありません