SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Cloud Computing Enables
   Consumer-Centered
       Healthcare

     Eiji Sasahara, Ph.D., MBA
         Dan McGuire, MBA
       Hitoshi Iwashita, MBA
  Healthcare Cloud Initiative
        October 15, Intiative
         ©2009 Healthcare Cloud 2009   1
Agenda

•   1. Introduction
•   2. Understanding Cloud Computing
•   3. Cloud Computing in Healthcare
•   4. Case study in Life Science/Pharma
•   5. Case study in Healthcare provider




               ©2009 Healthcare Cloud Intiative   2
1. Introduction (1)

   • Speakers
     – Eiji Sasahara, Ph.D., MBA
       http://www.linkedin.com/in/esasahara


     – Dan McGuire, MBA
       http://www.linkedin.com/pub/dan-mcguire-japan-
       healthcare-network/1/970/329


     – Hitoshi Iwashita, MBA
       http://www.linkedin.com/pub/hitoshi-iwashita/0/34a/694


                      ©2009 Healthcare Cloud Intiative          3
1. Introduction (2)

   • Healthcare Cloud Initiative
     – Grass-root group to share knowledge
       about benefits and risks of cloud
       computing, and to promote new
       business development with ICT
       utilization in the healthcare industry
        • Life science & Pharmaceutical
        • Healthcare Provider
        • Healthcare Payer


                   ©2009 Healthcare Cloud Intiative   4
1. Introduction (3)

    • Healthcare Cloud Initiative
        – Focus areas in Healthcare Value Chain

  Patients                           Healthcare Communication              General
                 Academia
 & families                         Professionals  Media                  Consumers


            Opportunities and Risks of Cloud Computing
                               -New Business Development
                               -Technology Innovation


 Clinical       Relationship         Professional          Advertising   Direct-to-
 Trial          Development          Education             & Promotion   Consumer
 Supports       w/Opinion            & Advocacy                          Education
                Leaders                                                  & Advocacy

                               ©2009 Healthcare Cloud Intiative                  5
1. Introduction (4)

   • Cloud Security Alliance
      – Global, not-for-profit organization
      – Inclusive membership, supporting broad
        spectrum of subject matter expertise:
        cloud experts, security, legal,
        compliance, virtualization, and on and
        on…
      – We believe Cloud Computing has a
        robust future, we want to make it better
    “To promote the use of best practices for providing security assurance
     within Cloud Computing, and provide education on the uses of Cloud
           Computing to help secure all other forms of computing.”

                          ©2009 Healthcare Cloud Intiative              6
1. Introduction (5)

   • Cloud Security Alliance
        – Individual Members (LinkedIn Community)
 <Active Working Groups>                                <New Working Groups>
   -Editorial                                                -Healthcare
   -Educational Outreach                                     -Cloud Threat Analysis
   -Architecture                                             -US Federal Government
   -Governance, Risk Mgt, Compliance,                        -Financial Services
    Business Continuity
   -Legal & E-Discovery
   -Portability, Interoperability and Application Security
   -Identity and Access Mgt, Encryption & Key Mgt
   -Data Center Operations and Incident Response
   -Information Lifecycle Management & Storage
   -Virtualization and Technology Compartmentalization
                               ©2009 Healthcare Cloud Intiative                       7
1. Introduction (6)

   • Cloud Security Alliance
     – Resources
        • ”Security Guidance for Critical Areas of
          Focus in Cloud Computing”
          (http://www.cloudsecurityalliance.org/)
        • ”Cloud Security and Privacy: An Enterprise
          Perspective on Risks and Compliance”
          (http://oreilly.com/catalog/9780596802769/)




                   ©2009 Healthcare Cloud Intiative     8
2. Understanding Cloud Computing (1)

  • Definition of Cloud Computing
    by National Institute of Standards and Technology (V15)
    “Cloud computing is a model for enabling
    convenient, on-demand network access to
    a shared pool of configurable computing
    resources (e.g., networks, servers, storage,
    applications, and services) that can be
    rapidly provisioned and released with
    minimal management effort or service
    provider interaction.”
    (http://csrc.nist.gov/groups/SNS/cloud-
    computing/index.html)
                      ©2009 Healthcare Cloud Intiative        9
2. Understanding Cloud Computing (2)

  • Characteristics of Cloud Computing
    by NIST (V15)
     – On-demand self-service
     – Ubiquitous network access
     – Resource pooling
        • Location independence
        • Homogeneity
     – Rapid elasticity
     – Measured service
                ©2009 Healthcare Cloud Intiative   10
2. Understanding Cloud Computing (3)

  • Cloud Service Models by NIST (V15)
     – Cloud Software as a Service (SaaS)
       • Use provider’s applications over a network
     – Cloud Platform as a Service (PaaS)
       • Deploy customer-created applications to a cloud
     – Cloud Infrastructure as a Service (IaaS)
       • Rent processing, storage, network capacity, and
         other fundamental computing resources




                  ©2009 Healthcare Cloud Intiative    11
2. Understanding Cloud Computing (4)

  • Cloud Deployment Models by NIST (V15)
     – Private cloud
       • enterprise owned or leased
     – Community cloud
       • shared infrastructure for specific community
     – Public cloud
       • Sold to the public, mega-scale infrastructure
     – Hybrid cloud
       • composition of two or more clouds

                  ©2009 Healthcare Cloud Intiative   12
2. Understanding Cloud Computing (5)

  • Characteristics of Cloud Computing
    by Cloud Security Alliance
     – Abstraction of Infrastructure
     – Resource Democratization
     – Services Oriented Architecture
     – Elasticity/Dynamism
     – Utility Model of Consumption & Allocation

        Business requirements identify
         features of cloud computing
                 ©2009 Healthcare Cloud Intiative   13
2. Understanding Cloud Computing (6)

  • Difficulty in Cloud Computing
    by Cloud Security Alliance
     – Who manage it
     – Who owns it
     – Where it’s located
     – Who has access to it
     – How it’s accessed
    Big challenge: Security and risk control
    under the cloud computing environment
                 ©2009 Healthcare Cloud Intiative   14
2. Understanding Cloud Computing (7)

  • Architecture of Cloud Computing

  Business (e.g.)                     Healthcare       Healthcare
                     Life Science
  Layer                                 Payer           Provider


                    Software: Collaborative, Content, ERM, SCM, CRM,
  Application       Operations & Manufacturing, Engineering, Business     SaaS
  Layer             Intelligence, etc.

                    Software: Application Development, Quality & Life-
  Platform          Cycle Tools, Application Server/Integration &
                    Process Automation Middleware, Information & Data
                                                                          PaaS
  Layer
                    management, Systems & Network Management

                    Software: System & network management, Security,
  Infrastructure    Storage                                               IaaS
  Layer             Hardware: Healthcare Storage, Network, Clients
                        ©2009 Server, Cloud Intiative                    15
2. Understanding Cloud Computing (8)

  • What is Governance, Risk and
    Compliance (GRC) Management?
     – Governance: Activities to demonstrate
       strategy direction and systems to
       regulate and monitor corporate business
       management
     – Risk: Activities to identify, analyze and
       manage risks inside/outside the
       company
     – Compliance: Activities to adhere to rules
       and requirements set by laws, standards
       and code of ethics Cloud Intiative
                  ©2009 Healthcare               16
2. Understanding Cloud Computing (9)

  • GRC Management and ICT
     – Application Layer
        •   Compliance Management Solutions
        •   Business Assurance Analytic Solutions
        •   Financial Compliance and Reporting
        •   Compliance Process Automation
        •   Enterprise and Operational Risk Management
            Solutions
     – Platform and Infrastructure Layers
        • Compliance Infrastructure Solutions
             – Security Management Solutions
             – IT Governance Management Solutions
             – Records and Information Management Solutions
                       ©2009 Healthcare Cloud Intiative       17
2. Understanding Cloud Computing (10)

  • Architecture of GRC Management ICT
  Business                            Personal        Consumer
                       J-SOX
  Layer                              Information       Safety


                   Software: Compliance Management, Business
  Application      Assurance Analytic, Financial Compliance and          SaaS
  Layer            Reporting, Compliance Process Automation,
                   Enterprise and Operational Risk Management, etc.

                   Software: Application Development, Quality & Life-
  Platform         Cycle Tools, Application Server/Integration &
                   Process Automation Middleware, Information & Data
                                                                         PaaS
  Layer
                   management, Systems & Network Management

                   Software: System & network management, Security,
  Infrastructure   Storage                                               IaaS
  Layer            Hardware: Healthcare Storage, Network, Clients
                       ©2009 Server, Cloud Intiative                    18
2. Understanding Cloud Computing (11)
  • Impact of Consumer as a Stakeholder
     – Consumer-centered healthcare drives ICT utilization.
     – Consumerization of ICT drives cloud computing.
                                                                       Consumer-
  Business                          Healthcare            Healthcare
                                                                       Centered
                Life Science
  Layer                               Payer                Provider
                                                                       Movement

                   Software:
  Application                                                               SaaS
  Layer                             Healthcare              Cloud
                                       ICT                Computing
                   Software:
  Platform                                      GRC                         PaaS
  Layer                                      Management
                                                 Consumer
                   Software:                        as a
  Infrastructure                                Stakeholder                 IaaS
  Layer            Hardware: Healthcare Cloud Intiative
                       ©2009                                               19
3. Cloud Computing in Healthcare (1)

   • “Cloud Computing: A new business
     paradigm for biomedical information sharing”
      Rosenthal A, Mork P, Li MH, Stanford J, Koester D, Reynolds P.
       J Biomed Inform. 2009 Aug 26.
      (http://www.ncbi.nlm.nih.gov/pubmed/19715773)

     – For customers, cloud computing is
       primarily a new business paradigm, as
       opposed to a new technical paradigm.

      Who are “customers” in healthcare?
      = Consumers (Patients and families)
                       ©2009 Healthcare Cloud Intiative          20
3. Cloud Computing in Healthcare (2)

     – Features of Cloud Computing in
       Biomedical informatics
        • Resource outsourcing
        • Utility computing
        • Large number of machines
        • Automated resource management
        • Virtualization
        • Parallel computing
        Business requirements identify
         features ofHealthcare CloudComputing
                ©2009 Cloud Intiative           21
3. Cloud Computing in Healthcare (3)

   • “Security and privacy requirements for multi-
     institutional cancer research data grid”
      Manion FJ, Robbins RJ, Weems WA, Crowley RS.
      BMC Med Inform Decis Mak. 2009 Jun 15;9:31.
      (http://www.ncbi.nlm.nih.gov/pubmed/19527521)

     – Key Challenge is developing suitable
       models for authentication and
       authorization practices within federated
       environment.
     Healthcare cloud is based on federated
         environment (à Hybrid Cloud)
                      ©2009 Healthcare Cloud Intiative   22
3. Cloud Computing in Healthcare (4)

   • Recommendation for large scale federated sharing of data
     within a regulated environment
      – Necessity to construct separate legal or corporate entities for governance
        of federated sharing initiatives
      – Consensus on the treatment of foreign and commercial partnerships
      – Development of risk models and risk management processes
      – Development of technical infrastructure to support the credentia ling
        process associated with research including human subjects
      – Exploring the feasibility of developing large-scale, federated honest broker
        approaches
      – Development of suitable, federated identity provisioning processes to
        support federated authentication and authorization
      – Community development of requisite HIPAA and research ethics training
        modules by federation members
      – Recognition of the need for central auditing requirements and authority
      – Use of two-protocol data exchange models where possible in federation

                            ©2009 Healthcare Cloud Intiative                  23
3. Cloud Computing in Healthcare (5)

 • Summary
    – Cloud computing is primarily a new
      business paradigm.
    – Consumer-as-a-Stakeholder approach
      integrates cloud computing, GRC
      management and healthcare ICT.
    – GRC management should be the
      enabler of cloud computing in total
      healthcare value chain.
                ©2009 Healthcare Cloud Intiative   24

Weitere ähnliche Inhalte

Was ist angesagt?

2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - AgcaoiliPhil Agcaoili
 
Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper Vasu S
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computingijtsrd
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacytmather
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsMaganathin Veeraragaloo
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefingguestb099f64c
 
Cloud computing applications for e health
Cloud computing applications for e healthCloud computing applications for e health
Cloud computing applications for e healthHector Martin Garcia
 
Cloud computing
Cloud computingCloud computing
Cloud computingjhoejoe
 
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsIBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsKathy (Kat) Mandelstein
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 

Was ist angesagt? (20)

2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili
 
Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Cloud computing applications for e health
Cloud computing applications for e healthCloud computing applications for e health
Cloud computing applications for e health
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsIBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 

Ähnlich wie Cloud Computing Enables Consumer-Centered Healthcare

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanjiFeisal Nanji
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 

Ähnlich wie Cloud Computing Enables Consumer-Centered Healthcare (20)

Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanji
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 

Mehr von Eiji Sasahara, Ph.D., MBA 笹原英司

米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOMEiji Sasahara, Ph.D., MBA 笹原英司
 
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティSDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティEiji Sasahara, Ph.D., MBA 笹原英司
 
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~Eiji Sasahara, Ph.D., MBA 笹原英司
 
ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御Eiji Sasahara, Ph.D., MBA 笹原英司
 
プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較Eiji Sasahara, Ph.D., MBA 笹原英司
 
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理Eiji Sasahara, Ph.D., MBA 笹原英司
 
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティEiji Sasahara, Ph.D., MBA 笹原英司
 
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Eiji Sasahara, Ph.D., MBA 笹原英司
 
バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向Eiji Sasahara, Ph.D., MBA 笹原英司
 
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザインEiji Sasahara, Ph.D., MBA 笹原英司
 
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~Eiji Sasahara, Ph.D., MBA 笹原英司
 
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)Eiji Sasahara, Ph.D., MBA 笹原英司
 

Mehr von Eiji Sasahara, Ph.D., MBA 笹原英司 (20)

Metaverse and NFTs on the Healthcare Cloud
Metaverse and NFTs on the Healthcare CloudMetaverse and NFTs on the Healthcare Cloud
Metaverse and NFTs on the Healthcare Cloud
 
米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM
 
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティSDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
 
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
 
ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御
 
プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較
 
医療におけるサードパーティベンダーリスク管理
医療におけるサードパーティベンダーリスク管理医療におけるサードパーティベンダーリスク管理
医療におけるサードパーティベンダーリスク管理
 
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
 
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
 
医療クラウドにおけるランサムウェア攻撃予防対策
医療クラウドにおけるランサムウェア攻撃予防対策医療クラウドにおけるランサムウェア攻撃予防対策
医療クラウドにおけるランサムウェア攻撃予防対策
 
遠隔医療のクラウド利用とリスク管理
遠隔医療のクラウド利用とリスク管理遠隔医療のクラウド利用とリスク管理
遠隔医療のクラウド利用とリスク管理
 
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
 
バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向
 
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
 
Cloud-Native Security on Digital Health-Telehealth Use Case
Cloud-Native Security on Digital Health-Telehealth Use CaseCloud-Native Security on Digital Health-Telehealth Use Case
Cloud-Native Security on Digital Health-Telehealth Use Case
 
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
 
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
 
医療におけるブロックチェーン利用
医療におけるブロックチェーン利用医療におけるブロックチェーン利用
医療におけるブロックチェーン利用
 
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
 

Kürzlich hochgeladen

Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...narwatsonia7
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...narwatsonia7
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowNehru place Escorts
 
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...narwatsonia7
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...narwatsonia7
 
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersnarwatsonia7
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original PhotosCall Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photosnarwatsonia7
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsMedicoseAcademics
 
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service MumbaiVIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbaisonalikaur4
 
97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAA97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAAjennyeacort
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Call Girl Nagpur Sia 7001305949 Independent Escort Service Nagpur
Call Girl Nagpur Sia 7001305949 Independent Escort Service NagpurCall Girl Nagpur Sia 7001305949 Independent Escort Service Nagpur
Call Girl Nagpur Sia 7001305949 Independent Escort Service NagpurRiya Pathan
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...narwatsonia7
 
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...rajnisinghkjn
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaPooja Gupta
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformKweku Zurek
 

Kürzlich hochgeladen (20)

Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
 
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
Housewife Call Girls Hsr Layout - Call 7001305949 Rs-3500 with A/C Room Cash ...
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
 
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
 
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original PhotosCall Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes Functions
 
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service MumbaiVIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
 
97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAA97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAA
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
 
Call Girl Nagpur Sia 7001305949 Independent Escort Service Nagpur
Call Girl Nagpur Sia 7001305949 Independent Escort Service NagpurCall Girl Nagpur Sia 7001305949 Independent Escort Service Nagpur
Call Girl Nagpur Sia 7001305949 Independent Escort Service Nagpur
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
 
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy Platform
 

Cloud Computing Enables Consumer-Centered Healthcare

  • 1. Cloud Computing Enables Consumer-Centered Healthcare Eiji Sasahara, Ph.D., MBA Dan McGuire, MBA Hitoshi Iwashita, MBA Healthcare Cloud Initiative October 15, Intiative ©2009 Healthcare Cloud 2009 1
  • 2. Agenda • 1. Introduction • 2. Understanding Cloud Computing • 3. Cloud Computing in Healthcare • 4. Case study in Life Science/Pharma • 5. Case study in Healthcare provider ©2009 Healthcare Cloud Intiative 2
  • 3. 1. Introduction (1) • Speakers – Eiji Sasahara, Ph.D., MBA http://www.linkedin.com/in/esasahara – Dan McGuire, MBA http://www.linkedin.com/pub/dan-mcguire-japan- healthcare-network/1/970/329 – Hitoshi Iwashita, MBA http://www.linkedin.com/pub/hitoshi-iwashita/0/34a/694 ©2009 Healthcare Cloud Intiative 3
  • 4. 1. Introduction (2) • Healthcare Cloud Initiative – Grass-root group to share knowledge about benefits and risks of cloud computing, and to promote new business development with ICT utilization in the healthcare industry • Life science & Pharmaceutical • Healthcare Provider • Healthcare Payer ©2009 Healthcare Cloud Intiative 4
  • 5. 1. Introduction (3) • Healthcare Cloud Initiative – Focus areas in Healthcare Value Chain Patients Healthcare Communication General Academia & families Professionals Media Consumers Opportunities and Risks of Cloud Computing -New Business Development -Technology Innovation Clinical Relationship Professional Advertising Direct-to- Trial Development Education & Promotion Consumer Supports w/Opinion & Advocacy Education Leaders & Advocacy ©2009 Healthcare Cloud Intiative 5
  • 6. 1. Introduction (4) • Cloud Security Alliance – Global, not-for-profit organization – Inclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on… – We believe Cloud Computing has a robust future, we want to make it better “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” ©2009 Healthcare Cloud Intiative 6
  • 7. 1. Introduction (5) • Cloud Security Alliance – Individual Members (LinkedIn Community) <Active Working Groups> <New Working Groups> -Editorial -Healthcare -Educational Outreach -Cloud Threat Analysis -Architecture -US Federal Government -Governance, Risk Mgt, Compliance, -Financial Services Business Continuity -Legal & E-Discovery -Portability, Interoperability and Application Security -Identity and Access Mgt, Encryption & Key Mgt -Data Center Operations and Incident Response -Information Lifecycle Management & Storage -Virtualization and Technology Compartmentalization ©2009 Healthcare Cloud Intiative 7
  • 8. 1. Introduction (6) • Cloud Security Alliance – Resources • ”Security Guidance for Critical Areas of Focus in Cloud Computing” (http://www.cloudsecurityalliance.org/) • ”Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance” (http://oreilly.com/catalog/9780596802769/) ©2009 Healthcare Cloud Intiative 8
  • 9. 2. Understanding Cloud Computing (1) • Definition of Cloud Computing by National Institute of Standards and Technology (V15) “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” (http://csrc.nist.gov/groups/SNS/cloud- computing/index.html) ©2009 Healthcare Cloud Intiative 9
  • 10. 2. Understanding Cloud Computing (2) • Characteristics of Cloud Computing by NIST (V15) – On-demand self-service – Ubiquitous network access – Resource pooling • Location independence • Homogeneity – Rapid elasticity – Measured service ©2009 Healthcare Cloud Intiative 10
  • 11. 2. Understanding Cloud Computing (3) • Cloud Service Models by NIST (V15) – Cloud Software as a Service (SaaS) • Use provider’s applications over a network – Cloud Platform as a Service (PaaS) • Deploy customer-created applications to a cloud – Cloud Infrastructure as a Service (IaaS) • Rent processing, storage, network capacity, and other fundamental computing resources ©2009 Healthcare Cloud Intiative 11
  • 12. 2. Understanding Cloud Computing (4) • Cloud Deployment Models by NIST (V15) – Private cloud • enterprise owned or leased – Community cloud • shared infrastructure for specific community – Public cloud • Sold to the public, mega-scale infrastructure – Hybrid cloud • composition of two or more clouds ©2009 Healthcare Cloud Intiative 12
  • 13. 2. Understanding Cloud Computing (5) • Characteristics of Cloud Computing by Cloud Security Alliance – Abstraction of Infrastructure – Resource Democratization – Services Oriented Architecture – Elasticity/Dynamism – Utility Model of Consumption & Allocation Business requirements identify features of cloud computing ©2009 Healthcare Cloud Intiative 13
  • 14. 2. Understanding Cloud Computing (6) • Difficulty in Cloud Computing by Cloud Security Alliance – Who manage it – Who owns it – Where it’s located – Who has access to it – How it’s accessed Big challenge: Security and risk control under the cloud computing environment ©2009 Healthcare Cloud Intiative 14
  • 15. 2. Understanding Cloud Computing (7) • Architecture of Cloud Computing Business (e.g.) Healthcare Healthcare Life Science Layer Payer Provider Software: Collaborative, Content, ERM, SCM, CRM, Application Operations & Manufacturing, Engineering, Business SaaS Layer Intelligence, etc. Software: Application Development, Quality & Life- Platform Cycle Tools, Application Server/Integration & Process Automation Middleware, Information & Data PaaS Layer management, Systems & Network Management Software: System & network management, Security, Infrastructure Storage IaaS Layer Hardware: Healthcare Storage, Network, Clients ©2009 Server, Cloud Intiative 15
  • 16. 2. Understanding Cloud Computing (8) • What is Governance, Risk and Compliance (GRC) Management? – Governance: Activities to demonstrate strategy direction and systems to regulate and monitor corporate business management – Risk: Activities to identify, analyze and manage risks inside/outside the company – Compliance: Activities to adhere to rules and requirements set by laws, standards and code of ethics Cloud Intiative ©2009 Healthcare 16
  • 17. 2. Understanding Cloud Computing (9) • GRC Management and ICT – Application Layer • Compliance Management Solutions • Business Assurance Analytic Solutions • Financial Compliance and Reporting • Compliance Process Automation • Enterprise and Operational Risk Management Solutions – Platform and Infrastructure Layers • Compliance Infrastructure Solutions – Security Management Solutions – IT Governance Management Solutions – Records and Information Management Solutions ©2009 Healthcare Cloud Intiative 17
  • 18. 2. Understanding Cloud Computing (10) • Architecture of GRC Management ICT Business Personal Consumer J-SOX Layer Information Safety Software: Compliance Management, Business Application Assurance Analytic, Financial Compliance and SaaS Layer Reporting, Compliance Process Automation, Enterprise and Operational Risk Management, etc. Software: Application Development, Quality & Life- Platform Cycle Tools, Application Server/Integration & Process Automation Middleware, Information & Data PaaS Layer management, Systems & Network Management Software: System & network management, Security, Infrastructure Storage IaaS Layer Hardware: Healthcare Storage, Network, Clients ©2009 Server, Cloud Intiative 18
  • 19. 2. Understanding Cloud Computing (11) • Impact of Consumer as a Stakeholder – Consumer-centered healthcare drives ICT utilization. – Consumerization of ICT drives cloud computing. Consumer- Business Healthcare Healthcare Centered Life Science Layer Payer Provider Movement Software: Application SaaS Layer Healthcare Cloud ICT Computing Software: Platform GRC PaaS Layer Management Consumer Software: as a Infrastructure Stakeholder IaaS Layer Hardware: Healthcare Cloud Intiative ©2009 19
  • 20. 3. Cloud Computing in Healthcare (1) • “Cloud Computing: A new business paradigm for biomedical information sharing” Rosenthal A, Mork P, Li MH, Stanford J, Koester D, Reynolds P. J Biomed Inform. 2009 Aug 26. (http://www.ncbi.nlm.nih.gov/pubmed/19715773) – For customers, cloud computing is primarily a new business paradigm, as opposed to a new technical paradigm. Who are “customers” in healthcare? = Consumers (Patients and families) ©2009 Healthcare Cloud Intiative 20
  • 21. 3. Cloud Computing in Healthcare (2) – Features of Cloud Computing in Biomedical informatics • Resource outsourcing • Utility computing • Large number of machines • Automated resource management • Virtualization • Parallel computing Business requirements identify features ofHealthcare CloudComputing ©2009 Cloud Intiative 21
  • 22. 3. Cloud Computing in Healthcare (3) • “Security and privacy requirements for multi- institutional cancer research data grid” Manion FJ, Robbins RJ, Weems WA, Crowley RS. BMC Med Inform Decis Mak. 2009 Jun 15;9:31. (http://www.ncbi.nlm.nih.gov/pubmed/19527521) – Key Challenge is developing suitable models for authentication and authorization practices within federated environment. Healthcare cloud is based on federated environment (à Hybrid Cloud) ©2009 Healthcare Cloud Intiative 22
  • 23. 3. Cloud Computing in Healthcare (4) • Recommendation for large scale federated sharing of data within a regulated environment – Necessity to construct separate legal or corporate entities for governance of federated sharing initiatives – Consensus on the treatment of foreign and commercial partnerships – Development of risk models and risk management processes – Development of technical infrastructure to support the credentia ling process associated with research including human subjects – Exploring the feasibility of developing large-scale, federated honest broker approaches – Development of suitable, federated identity provisioning processes to support federated authentication and authorization – Community development of requisite HIPAA and research ethics training modules by federation members – Recognition of the need for central auditing requirements and authority – Use of two-protocol data exchange models where possible in federation ©2009 Healthcare Cloud Intiative 23
  • 24. 3. Cloud Computing in Healthcare (5) • Summary – Cloud computing is primarily a new business paradigm. – Consumer-as-a-Stakeholder approach integrates cloud computing, GRC management and healthcare ICT. – GRC management should be the enabler of cloud computing in total healthcare value chain. ©2009 Healthcare Cloud Intiative 24