Trish Schaefer Reilly has over 15 years of product marketing and management experience. She has a broad range of expertise in marketing, defining and managing varied technology platforms including: security, data storage, encryption, key management, big data, analytics, virtualization and cloud services for the enterprise and channel for multiple industry verticals. Trish has played a prominent role in building demand and resources within database, security and licensing organizations focusing on the protection of data. Trish brings a unique, broad perspective both to the challenges facing the industry today and the difficulties that experience making critical technology decisions.
Encryption and tokenization can play critical roles in preventing breaches. A recent survey conducted by HealthcareInfoSecurity confirms that the healthcare sector still has a long way to go in implementing these technologies. According to this survey, one of the top data protection steps organizations plan to take in...
Mr. Hicks' expertise in IT GRC specific to security, risk management, audit, business continuity, disaster recovery, and regulatory compliance provides an in-depth understanding of business processes and technology at healthcare organizations. He has implemented and managed internal control programs relative to meeting the regulatory requirements of HIPAA, HITECH, HITRUST and PCI.
Trish Schaefer Reilly has over 15 years of product marketing and management experience. She has a broad range of expertise in marketing, defining and managing varied technology platforms including: security, data storage, encryption, key management, big data, analytics, virtualization and cloud services for the enterprise and channel for multiple industry verticals. Trish has played a prominent role in building demand and resources within database, security and licensing organizations focusing on the protection of data. Trish brings a unique, broad perspective both to the challenges facing the industry today and the difficulties that experience making critical technology decisions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.