Enabling Better Outcomes with Secured Technology & Best Practices
This podcast series focuses on how the healthcare and senior care industries are enabling more autonomous living opportunities for all ages while improving and expanding care in face of the exponential growth of the senior population.
Health Care Series
Part VI: Providing the Right Care at the Right Time with In Motion Care
In the sixth episode of this series, Andrew Guillemette and Mark Heston of In Motion Care join Matthew D. Edwards to discuss how their startup is tackling the surmounting challenges of 34 million additional baby boomers retiring in 2025 by streamlining the burden of data collection and securely sharing that information with caregivers, care facilities and the families.
Part V: The Pursuit of Humane Technology in Health Care
Matthew D Edwards and Brent Willett, President of the Iowa Health Care Association, discuss opportunities for humane technology to improve care and increase interaction with caregivers and family for patients in long-term care.
Part IV: Enabling Home Care Services with Technology
Matthew D Edwards and Mark Goetz, President of The HomeCare Advocacy Network, discuss how technology plays a role in empowering seniors to age in their homes.
Part III: The Future of Technology in Home Care Services
Matthew D Edwards and Jeff Huber, CEO of Home Instead Senior Care, discuss how the traditional business model must adapt and evolve in the face of three megatrends.
Part II: Putting Together Information Security and Privacy Plans That Matter
Nathan Gibson, Chief Security Architect and Director of Enterprise Security Architecture at Allstate, and Rebecca Herold, CEO of The Privacy Professor and Privacy Security Brainiacs, join Matthew D Edwards to discuss how to create effective plans that truly secure data and protect privacy – and your reputation.
Part I: IoT Devices, Data, and Exploitation
Xavier D. Johnson, Founder of Enterprise Offensive Security, and Nicholas Starke, Ethical Hacker & Threat Researcher, join us to addresses critical factors when purchasing monitoring devices, securely storing, moving, and using the collected data that is exponentially accumulating, and how to mitigate the exploitation of these systems.