Author Archives: Alexa Magdalenski

The Increased Importance of Transfer Pricing Planning

June 23rd, 2017 | Posted by Alexa Magdalenski in Guest Blogs | Member Blog Posts - (Comments Off)

In their new NVTC member blog post, Alvarez & Marsal Taxand discusses how companies in the tech industry can prepare for proposed tax reforms that may be implemented in the near future. Alvarez & Marsal Taxand, an affiliate of Alvarez & Marsal (A&M), a leading global professional services firm, is an independent tax group made up of experienced tax professionals dedicated to providing customized tax advice to clients and investors across a broad range of industries. Alvarez & Marsal Taxand is a founder of Taxand, the world’s largest independent tax organization, which provides high quality, integrated tax advice worldwide. 


AM_Taxand_Logo_Wordmark_color (2)Under the House Republican “Blueprint for Tax Reform” (the Blueprint), companies would be able to deduct interest expense against interest income, but no current deduction would be allowed for net interest expense. Any net interest expense would be carried forward indefinitely and allowed as a deduction against net interest income in future years. In addition, the proposed reduction of U.S. tax rates may also reduce the value of U.S. interest deductions. These proposals should impact decisions right now around multinational intercompany financing structures for tech companies, as well as other aspects of their intragroup contractual arrangements.

Until now, the high U.S. corporate income tax rate of 35 percent has created an environment that favors foreign related-party lending to U.S. affiliates, particularly when the loan is advanced from a low-tax jurisdiction. U.S. taxable income may be reduced via an interest deduction and the corresponding interest income may be captured in the lower tax jurisdiction. Alternatively, tax considerations may have made it desirable to incur third-party debt in a U.S. group company, rather than in lower-taxed group companies. The feasibility and/or desirability of these sorts of “earnings stripping” benefits would be greatly diminished by the Blueprint.

So, how are forward-looking companies, particularly in the tech industry, preparing for these potentially dramatic changes? We are seeing a number of them explore the following questions:

1. Should the debt level of U.S. group companies be reduced and, if so, how?
2. Should the interest rate be reduced on intragroup debt financing of U.S. group companies?
3. Can we replace debt financing with other forms of financing arrangements that may yield deductions other than interest expense for the U.S. company (e.g., rent expense on sale / leaseback transactions, royalty expense on intellectual property (IP) licensing transactions)?
4. Should U.S. group companies make interest-bearing loans to other group companies that can benefit from interest deductions in their countries, thereby creating interest income in the U.S., against which the U.S. company could then deduct its own interest expense (e.g., should a U.S. company be a group finance company)?
5. Can lost interest deductions be replaced by more aggressive transfer pricing for other intragroup transactions (e.g., the intragroup purchase and/or sale of goods or services)?

All of these questions regarding intragroup transactions have important transfer pricing implications. For most intragroup transactions (other than those rare instances when the comparable uncontrolled price method is the best method), the prevailing transfer pricing theory permits a range of choices for the intercompany transfer price. So, whether the decision relates to the level of U.S. indebtedness, the substitution of interest expense with other types of deductions, or the creation of interest income in the U.S., the after-tax impact of those decisions can be significantly enhanced by proactive transfer pricing planning. This is true regardless of whether the objective is the more traditional one of minimizing taxable income in the U.S., or a new one to increase taxable income in the U.S. (with the offsetting decrease in other countries with higher tax rates) in light of dramatically changed U.S. tax rules. Our international tax and transfer pricing specialists can help your company to determine the most desirable course of action and to substantiate an appropriate / defensible range of choices for intercompany prices that will yield the optimal results.

Visit A&M Taxand’s Tax Advisor Minute for more helpful insights for executives in the technology sector.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

The Time Is Now to Establish New Drone Regulatory Efforts

June 22nd, 2017 | Posted by Alexa Magdalenski in Guest Blogs | Member Blog Posts - (Comments Off)

This week’s member blog post is from Tangible Security Executive Chairman and CEO Dr. Mark Mykityshyn. Tangible Security employs the most sophisticated cybersecurity tools and techniques available to protect clients’ sensitive data, infrastructure and competitive advantage. Dr. Mykityshyn discusses the current regulatory climate around drones and unmanned aircraft systems and the need for new policies to fuel market growth in the industry.


Undoubtedly, drones and unmanned aircraft systems (UAS) are a very hot topic these days and their technology, business, policy and cybersecurity implications continue to rapidly expand and evolve.

Tangible Security recently participated in a roundtable meeting in Washington, D.C. that engaged thought leaders and stakeholders from aerospace and aviation, academia, Congress, government and related industry organizations. The group shared ideas, explored and challenged assumptions, and discussed policy positions and current practices in drone/UAS.

The roundtable was organized by ADS Infrastructure Partners (ADS) as part of a national campaign to help fund and establish the Drone/Unmanned Aircraft Systems Regulatory Association (DURA), the first step in unlocking the full economic value of the sector.

Roundtable conferees widely acknowledged that development of the drone/UAS commercial market is constrained, in great part, due to the existing FAA regulatory environment and the slow pace of rulemaking and certification. The group recognized that drone/UAS sector regulation requires urgent streamlining to realize full market potential, economic growth and jobs.

According to FAA’s recent market forecast, sales of UAS for commercial purposes are expected to grow from 600,000 in 2016 to 2.7 million by 2020. Industry experts have recognized that this growth, and the billions of dollars at stake, may not materialize without overhauling the current regulatory model.

Conferees also agreed that the immediate next step is to explore the pros and cons of drone industry regulation through delegation of FAA authority mandated by Congressional legislation, and to develop a blueprint for the new organization. The creation of DURA, an archetype of an industry-led public-private partnership, is an idea whose “time has come,” according to many roundtable attendees.

According to Jim Williams, head of JHW Unmanned Solutions, and most recently the Manager responsible for the FAA’s Unmanned Aircraft Systems Integration Office, “The future of unmanned aircraft operations depends on finding new ways to manage the airspace and regulate the operators. Forming a delegated organization to manage the airspace, approve the vehicles, and oversee the operators is the key to opening up this extremely valuable new segment of aviation.”

To expand this dialog nationwide, ADS will hold a National Summit in Washington, D.C. in September 2017 where leaders who represent more than five hundred businesses, agencies, associations, customers and stakeholders will assemble.

If you or your organization is interested in participating in DURA or attending the National Summit in September, please don’t hesitate to email me. All members of the technology, aviation and business community are invited to attend.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

2017 NVTC CFO Awards: New Videos on YouTube

June 22nd, 2017 | Posted by Alexa Magdalenski in CFO Awards - (Comments Off)

CFO Awards SocialOn June 5, more than 750 people gathered at The Ritz-Carlton, Tysons Corner for the 21st Annual NVTC Greater Washington Technology CFO Awards. The CFO Awards recognize local chief financial officers for outstanding achievement and excellence in promoting the area’s technology community.

Click here to find out the 2017 CFO Awards winners and for a full list of finalists!

View video from the event below:

2017 NVTC CFO Awards Public Company CFO of the Year Winner:

2017 NVTC CFO Awards Private Company CFO of the Year Winner:

2017 NVTC CFO Awards Division/Group CFO of the Year Winner:

2017 NVTC CFO Awards Emerging Growth Company CFO of the Year Winner:

2017 NVTC CFO Awards Michael G. Devine Hall of Fame Honorees:

Click here to visit NVTC’s YouTube page for more CFO Awards videos and NVTC content.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Capital Health Tech Summit Photo Gallery Is Live!

June 19th, 2017 | Posted by Alexa Magdalenski in Capital Health Tech Summit - (Comments Off)

Final Logo Capital Health Tech Summit NVTC (2)On June 15, NVTC hosted the inaugural Capital Health Tech Summit at the Inova Center for Personalized Health. With over 200 attendees, the Summit featured keynote remarks by Senator Tim Kaine (D-VA), Office of the National Coordinator for Health IT (ONC) National Coordinator for Health Information Technology Dr. Don Rucker and University of Virginia Executive Vice President for Health Affairs Dr. Richard Shannon. Panel sessions included experts from world leading health systems, universities and firms developing the latest health technologies. The Capital Health Tech Summit showcased the intersection of commercial, government and academic assets that makes Greater Washington the epicenter for innovation in the health technology sector.

Click here for a full recap of the event.

View the full gallery here and stayed tuned on the blog for more Capital Health Tech Summit content, video and photos!

Keynote Shannon

Keynote Kaine

Keynote Rucker

1706_Health Tech Summit 201

Check out this recent coverage of the Summit in the media:

DC Inno: 7 D.C. Area Health Tech Projects To Watch

HIT Leaders & News: Cybercrime in healthcare is the new normal. How can we reduce the number of attacks on the industry?

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

New At the Capital Health Tech Summit: Innovation Flash Briefings!

June 8th, 2017 | Posted by Alexa Magdalenski in Capital Health Tech Summit - (Comments Off)

Final Logo Capital Health Tech Summit NVTC (2)The inaugural NVTC Capital Health Tech Summit on Thursday, June 15, 2017 is only days away!

For the first time at one of our Summits, NVTC is including a special Health Tech Innovation Spotlight session at the Capital Health Tech Summit. Innovative companies from the region’s health technology sector will present 5-minute flash briefings highlighting groundbreaking or unique innovations that could ultimately be game changers in health. Attendees will get to hear about the unique innovations that have the potential to impact the future of health.

We’re excited to announce the following companies selected to give briefings:

10Pearls

Aperiomics

Avanade

CGI

INF Robotics Inc.

Perthera

Protenus

View the latest Summit agenda here and register today!

Check out our Summit preview video:

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Did you know nearly 90% of all successful ransomware attacks were on hospitals in 2016? In his guest blog, Ostendio CEO and Co-Founder Grant Elliott sheds light on the cybersecurity implications of healthcare today and the importance of engaging healthcare employees in cybersecurity. Elliott will be speaking on the Cybersecurity Panel at the Capital Health Tech Summit taking place on June 15, 2017 at the Inova Center for Personalized Health.


Ostendio Logo-01Why is healthcare so heavily and successfully targeted by cybercrime? After a record number of breaches last year – nearly 90% of all successful ransomware attacks were on hospitals – it’s one that needs to be asked.

Cybercriminals target healthcare data because hospitals need immediate access to up-to-date patient information in order to provide critical care. When malware enters the system, it prohibits access to data, and in turn, prevents hospital staff from efficiently and effectively treating a patient. The cybercriminals then demand a ransom, usually in the form of Bitcoins. Ransomware is growing in popularity because it works. In 2014 alone, the FBI estimates that the minds behind the CryptoLocker strain of ransomware received nearly $27 million in six months out of data taken hostage.

When MedStar Health, a health system serving the Baltimore/Washington region, was hit by a cyberattack in 2016, they choose not to pay the Bitcoin ransom, instead choosing to shut every aspect of MedStar Health’s electronic medical record systems off.

Hospitals are also a prime target because employees aren’t always trained on security awareness. While HIPAA aims to ensures that patient privacy is protected, in general, hospitals do not place a big enough emphasis on the importance of cybersecurity. Protecting data has always been a challenge, but an aware and invested workforce can become your company’s first line of defense.

So, what can be done to try and reduce the number of data breaches?

Look to your employees. Employees are an organization’s greatest asset, and they need to be treated as such. It takes just one click on a malicious link to bring a whole system down. Make sure that each and every employee understands their role in a cybersecurity program. They need to know where data is, when they should access it, how it should be used and how it’s being protected. Only then can they can become your front line of cyber defense.

Learn more about Ostendio here and check out the latest Capital Health Tech Summit agenda!

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

New Capital Health Tech Summit Keynote!

May 25th, 2017 | Posted by Alexa Magdalenski in Capital Health Tech Summit - (Comments Off)

The inaugural Capital Health Tech Summit on June 15, 2017 is less than a month away! You’ve come to the right place for the latest updates on the Summit.


Final Logo Capital Health Tech Summit NVTC (2)NVTC is excited to announce a new keynote for the Capital Health Tech Summit: Office of the National Coordinator for Health IT (ONC) National Coordinator for Health Information Technology Dr. Don Rucker. Dr. Rucker joins Senator Tim Kaine and University of Virginia Executive Vice President, Health Affairs Dr. Richard Shannon in the keynote lineup.

Dr. Rucker comes to the Office of the National Coordinator for Health IT (ONC) from the Ohio State University where he was clinical professor of Emergency Medicine and Biomedical Informatics and Premise Health, a worksite clinic provider, where he served as chief medical officer.

Donald W. Rucker, MDDr. Rucker started his informatics career at Datamedic Corporation where he co-developed the world’s first Microsoft Windows based electronic medical record. He then served as chief medical officer at Siemens Healthcare USA. Dr. Rucker led the team that designed the computerized provider order entry workflow that, as installed at Cincinnati Children’s Hospital, won the 2003 HIMSS Nicholas Davies Award for the best hospital computer system in the US. Dr. Rucker has served on the Board of Commissioners of the Certification Commission for Healthcare Information Technology and Medicare’s Evidence Development and Coverage Advisory Committee (MEDCAC) and has extensive policy experience representing healthcare innovations before Congress, MedPAC and HHS.

He has practiced emergency medicine for a variety of organizations including at Kaiser in California; at Beth Israel Deaconess Medical Center in Boston where he was the first full-time Emergency Department attending; at the University of Pennsylvania’s Penn Presbyterian and Pennsylvania Hospitals; and most recently at Ohio State University’s Wexner Medical Center.

Dr. Rucker is a graduate of Harvard College and the University of Pennsylvania School of Medicine with board certifications in Emergency Medicine, Internal Medicine and Clinical Informatics. He holds an M.S. in medical computer science and an MBA, both from Stanford.

Click here to learn more about the other keynotes and speakers headlining the Capital Health Tech Summit.

Check out the Summit preview video!

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Maintain DFARS Cybersecurity Compliance with Advanced Technology Solutions

May 25th, 2017 | Posted by Alexa Magdalenski in Guest Blogs | Member Blog Posts - (Comments Off)

Is your organization DFARS cybersecurity compliant? Read on for more information on how your organization can stay compliant and be ready to handle cyber-attacks in CohnReznick’s new member blog. CohnReznick provides clients with forward thinking advice that helps them navigate complex business and financial issues.


cohnreznick-logoCyber-attacks on organizations, including government contractors and federal agencies, have been rapidly increasing over time. With a lack of defined security policies, processes and controls, many government contractors are ill-equipped to effectively handle potential cyber-attacks that could severely undermine business operations and swiftly lead to insurmountable damages as data and records are destroyed.

To mitigate the risk that businesses face, cybersecurity standards are becoming more prevalent. In particular, organizations with government contracts need to demonstrate compliance with cybersecurity standards as specified in contract requirements and regulations. For example, defense contractors that provide services to Department of Defense (DoD) agencies related to building, maintaining and managing DoD systems, networks, programs, or data may be required to demonstrate compliance with Defense Federal Acquisition Regulation Supplement (DFARS) Safeguarding rules and clauses.

In 2015, the DoD issued a ruling that requires defense contractors and subcontractors to demonstrate cybersecurity compliance with regard to the protection of Covered Defense Information (CDI), also known as Controlled Unclassified Information (CUI), or Unclassified Controlled Technical Information (UCTI).

How Can A Defense Contractor Demonstrate DFARS Clause Compliance?

GovCon Article Graphics1bDefense contractors and sub-contractors must implement and continuously assess security requirements, thereby demonstrating adequate cybersecurity measures are in place to safeguard CDI information from unauthorized access and disclosure. Additionally, such security measures can help identify, prevent, detect and report cyber-related intrusion events that affect defense contractors’ unclassified information systems. The security requirements are specified in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.”

Security requirements are categorized into 14 control families as listed in the graphic to the right. In addition to implementing the 14 security requirements, defense contractors and sub-contractors must have processes in place to identify a cybersecurity incident and report the incident no later than 72 hours upon discovery of the incident/breach. Reporting of the incident requires addressing elements, as outlined on the cyber incident reporting form, and providing necessary supporting documentation and evidence related to the incident. The incident can only be reported using a DoD-approved medium assurance certificate.

Pair DFARS Compliance Assessment With Advanced Breach Detection Solutions

GovCon Article Graphics2_WithTitleA critical component of DFARS regulation, as well as an area where we have found contractors to continually lack capabilities, is in breach detection. That is why it is important to have advanced solutions combined with appropriate governance and mature processes to enable contractors to rapidly detect devices of interest and indicators of compromise (IOC).

CohnReznick utilizes a holistic solution designed explicitly to fill this gap with clients. Our solutions can analyze thousands of protocols and hundreds of new attack vectors each day to find breaches and anomalous behavior on the defense contractor network. X-ray visibility into your environment is achieved by continuously analyzing application-based metadata ― combined with user information and the latest threat intelligence, against past, current, and future network activity ― to detect any previously unidentified breaches. Defense contractors and sub-contractors can be assured of accelerated compliance with DFARS requirements for incident response, risk assessment, and system and communications protection.

Moreover, IOCs and compromised device behavior can be pinpointed through behavioral analysis conducted on the network communications. Such IOCs and compromised device behavior could include:

Anomalous internal file transfers

Unexpected protocols

Suspicious or illegitimate connections

Encrypted communications

Unauthorized credential usage

Use of anonymizing applications

Risks from bring your own device (BYOD) policies

Beaconing

Exfiltration

Non-standard ports

Remote access tools

Suspicious downloads

File type mismatches

What If I Can’t Demonstrate DFARS Clause Compliance?

The defense contractor is required to notify the DoD CIO within 30 days of contract award if the defense contractor and their sub-contractors are not in compliance with all of the security requirements. Contractors have until December 2017 to attain compliance with all of the security requirements in NIST SP 800-171. Non-compliance can lead to cure notices, adverse past performance, fee reduction penalties, and possibly civil False Claims Act (FCA) implications, as well as reputational risk and responsibility issues, which could lead to loss of awards.


About CohnReznick’s Technology Risk and Cybersecurity Services

CohnReznick provides cybersecurity solutions that are dynamic, scalable, and tailored for growth companies. CohnReznick’s security professionals average more than 15 years in the field and hold key certifications. Our professionals have deep experience assisting organizations in implementing and complying with information and cybersecurity requirements using NIST 800-53, DIACAP, ISO 27001, COBIT and other industry leading standards and frameworks. Learn more.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

The Roots of the Interconnected Internet Are at University of Maryland

May 19th, 2017 | Posted by Alexa Magdalenski in Guest Blogs | Member Blog Posts - (Comments Off)

NVTC’s Spring 2017 The Voice of Technology magazine cover story, “Past is Prologue,” highlighted the Internet2 networking consortium and its role in supporting the early stages of the Internet, as well as its continued impact in connecting universities, government agencies, libraries, healthcare organizations and corporations today.

As a follow up to the article, University of Maryland Associate Vice President for Corporate and Foundation Relations Brian Darmody discusses University of Maryland’s role in early Internet development below in their new member blog post.


Did you know the nation’s first Internet exchange point was established at the University of Maryland (UMD)?

UMD Blog v2UMD and UMD Professor Glenn Ricart played a strong role in the start of the interconnected Internet that we know of today. Prof. Ricart developed the nation’s first Internet exchange point at UMD in 1988, which connected the original federal TCP/IP networks and the first U.S. commercial and non-commercial networks. Arguably, this was the world’s first ISP as a commercial vendor joined the previously university-only network. This exchange point was called the Federal Internet Exchange (FIX), then FIX-East and then MAE-East.

Later, Prof. Ricart would go on to help UMD establish the nation’s first TCP/IP university campus-wide network.  For these and other accomplishments, Prof. Ricart was inducted into the Internet Hall of Fame in 2013.

Prof. Ricart’s early work in laying the foundation for the Internet continues today in the Mid-Atlantic Crossroads in the UMD Research Park, which is one of the nation’s most robust regional high-speed connectivity networks for research and service to K-12 schools, universities, nonprofits, federal research agencies and the private sector, including counties in Virginia, companies in D.C. and federal agencies in Maryland.

In 1994, UMD’s alumni magazine featured an article on the early work UMD did in computer networking in the 1980s, which featured one of the first computer messages that was delivered from UMD to George Washington University. It is interesting to read the article now given the ubiquity of computer networking today, but is a proud illustration of our region’s role in pioneering the early computer communications infrastructure. Check out the article below:

 

Internet Network Is Born (Fall 1994, UMD Alumni Magazine)

UMD Blog 1At the annual Computer Science Center Christmas party in 1986, the champagne glasses were clinking, the holiday music was humming and Jack Hahn, project director for the newly formed Southeastern University Research Association network (SURAnet), was “walking on air.” On that day, an electronic message was sent from the University of Maryland at College Park to George Washington University — the first on a network whose technology would become the model for what Hahn calls, “one of the most powerful intellectual tools that mankind has ever had at its fingertips.”

Although no one seems to recall just what that historic message was (“probably, something like ‘hey, is this thing working?’” says Hahn), the first few keystrokes were the culmination of years of work initiated by Glenn Ricart, director of the university’s Computer Science Center.

The idea was to link the 14 SURA institutions into a communications network so that information could be trans-ferred between academic departments on each campus. It was such a novel idea at the time that, when Ricart brought his proposal to the National Science Foundation, they couldn’t tell him which office to send it to. “Nobody had ever done a network like this before, and it wasn’t clear that this was science and how this would help science, so NSF really didn’t know what to do with it,” he says (the NSF ended up establishing an entire division for networking and computing and solicited similar proposals).

In the meantime, Ricart, Hahn, Mark Oros, network operations supervisor, and Mike Petry, manager of communication  software, retreated to the nondescript basement of the Computer and Space Sciences building and began wiring the circuits that would link an entire region.

By late spring of 1987, connections to the original SURAnet universities were up and running. Colleges and universities from other regions recognized a good thing and began flocking to College Park to see the new technology. The National Science Foundation then decided to link all the regional networks using something called “fuzzball technology” developed by Dave Mills, an adjunct professor at College Park, and the humble beginnings of what would become known as the present-day Internet were formed.

Hahn originally monitored the fledgling network from his basement. “I used to say SURAnet has a network information center and a network operations center — a nic and noc — and you’re talking to both of them,” he says.

Adding more universities, federal institutions and commercial networks, SURAnet grew too large to remain on campus and now employs 40 people in a “somewhat secret” location on Route 1 in College Park. Over 400 organizations across 13 states and the District of Columbia are supported by the network, ranging from the Enoch Pratt Free Library in Maryland to the U.S. Department of Natural Resources and state and local governments in the region.

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Get a Sneak Preview of the Capital Health Tech Summit!

May 18th, 2017 | Posted by Alexa Magdalenski in Capital Health Tech Summit - (Comments Off)

Final Logo Capital Health Tech Summit NVTC (2)Explore how technology is transforming and disrupting the delivery of health at the inaugural Capital Health Tech Summit on June 15, 2017 at the Inova Center for Personalized Health.

The Capital Health Tech Summit will showcase how the intersection of commercial, government and academic assets makes Greater Washington the epicenter for innovation and opportunity in the health technology sector. Keynote speakers include Senator Tim Kaine, ONC National Coordinator for Health Information Technology Dr. Don Rucker and University of Virginia Executive Vice President of Health Affairs Dr. Richard Shannon.

The Summit will cover such exciting health tech topics as data analytics in the continuum of health, cybersecurity, pharmacogenomics, telehealth and remote patient monitoring.

Just this week new speakers from Carilion Clinic, FDA, HHS and Translational Software have joined the Summit lineup. We’re adding new speakers everyday so check the Capital Health Tech Summit agenda often!

Learn more about the Summit in our new preview video!

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS