Boston, MA
Dec. 5-7, 2016
Vice President, Strategy & Corporate Development, Enterprise Business Unit
Synchronoss Technologies

Jon brings 22 years of IT Strategy and Solution Management experience focused on developing transformational technology solutions for enterprise clients in Financial Services, Healthcare, and Life Sciences industries.   

Jon is an experienced management consultant and IT strategy executive with expertise in IT transformation, enterprise architecture, and developing industry solutions that leverage market trends in Cloud and Big Data.

Most recently Jon was the Americas Lead for Application Transformation at EMC Global Services where he led a consulting team of 45 practitioners focused on enabling EMC clients to modernize their application portfolio and maximize the impact of their Cloud transformation programs.   In prior roles at EMC, Jon led the Healthcare and Life Sciences industry vertical practice that designed and delivered industry solutions focused on these sectors.

Prior to EMC where he spent the past 8 years, Jon has held consulting leadership roles at BusinessEdge Solutions and Paragon Computer Professionals where he led competency teams focused on enterprise content management, collaboration and knowledge management, and information management strategy.

Jon began his consulting career at McKinsey and Company after completing his MBA in Finance and Management at the Wharton School of the University of Pennsylvania    

December 6, 2016
9:45am - 10:00am
Grand Ballroom

Protected health information (PHI) and Personally Identifiable Information (PII) are extremely valuable to cybercriminals as they pay more for health records than any other personal records. Thus, hackers are increasingly targeting healthcare organizations and their ecosystem.  Patients, providers, contract research organizations, academia, and others need to exchange sensitive information, such as when collaborating on clinical trials, delivering care via telemedicine and communicating with patients. Increasingly, mobile devices are being used to capture data from IoT sensors and medical devices.  PHI and PII must be safeguarded every step of the way, therefore, identity verification and authentication are essential. But what other security measures need to be taken? This session will highlight major emerging risks to PHI, PII and offer timely insights on mitigating those risks by applying best practices for securing data on mobile devices and patient information from medical devices or other IoT devices.

Get Updates

Sign up to get the latest information on upcoming events.