Category: Technology

Promoting Medicaid Managed Care Company
Case Study 8.15.2017

Promoting a Medicaid Managed Care Company

A State affiliate of a national Medicaid managed care company, was responding to a competitive RFP to demonstrate their strong capability to deliver innovative, Statewide Medicaid coverage that would integrate behavioral and physical health for members, effectively leverage health IT to coordinate and manage care effectively, and accelerate the growth<span. . .
Tagged in: Growth & Acceleration, Healthcare & Life Sciences, Technology
Read More
Secure XI - 11th Annual ISSA/ISACA compliance & security conference
Event Summary 6.29.2017

SecureXI – 11th Annual ISSA/ISACA Chicago Chapters Audit, Compliance & Security Conference and Networking Cruise

On June 22, 2017, Trexin participated in SecureXI – 11th Annual ISSA and ISACA Chicago Chapters Audit, Compliance & Security Conference and Networking Cruise off Navy Pier. ISSA/ISACA SecureXI included training sessions in the morning and an afternoon filled with an expert CISO panel and networking with some of the<span. . .
Tagged in: Technology
Read More
App Migration Dispositioning in XaaS
Insight Paper 6.22.2017

App Migration Dispositioning in an XaaS World

Technology today allows for many different paths to cloud-based infrastructure and IT. Regardless of whether your CIO has decided to focus on applications and data, implying a Platform-as-a-Service (PaaS) solution, or perhaps keeping the middleware layer too, and transitioning only servers and virtualization to a third-party vendor, meaning Infrastructure-as-a-Service (IaaS),<span. . .
Tagged in: Financial Services, Healthcare & Life Sciences, Technology
Read More
Event Summary 6.15.2017

SecureWorld Chicago 2017

SecureWorld conferences are known to provide more content and facilitate more professional connections than any other event in the cybersecurity industry. As such, Trexin was excited to be involved in SecureWorld’s first annual Chicago event on June 7, 2017.
Tagged in: Technology
Read More
Case Study 4.18.2017

Managing A Large-Scale Data Center Migration

Driven by parent company objectives for cost containment, global asset management, and enterprise security as part of a global infrastructure shared services initiative, our Client, a large property and casualty insurer, wanted to consolidate their nine data centers into two to reduce the overall data center footprint, retire toxic legacy<span. . .
Tagged in: Financial Services, Optimized Operations, Program Execution, Strategy & Innovation, Technology
Read More
Event Summary 3.23.2017

TLA Managers Forum

On Friday March 17th, at the early hour of 7am, the TLA Managers Forum met to discuss the impact of disruptive new technologies like Big Data and the Internet of Things (IoT) on cybersecurity standards and regulations.
Tagged in: Technology
Read More
Innovation Showcase
Event Summary 11.22.2016

Innovation Showcase

The Innovation Showcase on November 2nd attracted nearly 100 people at the Merchandise Mart in Chicago. The purpose was to learn more about the Angel and Venture Capital markets in Israel, with presentations from two crowd-funded investment firms (OurCrowd and iAngels) and two rising stars in the market (MDClone, which<span. . .
Tagged in: Program Execution, Strategy & Innovation, Technology
Read More
3rd annual IIA/ISACA Hacking Conference
Event Summary 11.15.2016

3rd Annual IIA/ISACA Hacking Conference

The Institute of Internal Auditors (IIA), in conjunction with the Information Systems Audit and Control Association (ISACA), held their 3rd annual Hacking Conference on November 3 and 4, competing with the Chicago Cubs for the attention of ~300 attendees. Glenn Kapetansky, Trexin CSO, joined other CISOs for a panel discussion<span. . .
Tagged in: Technology
Read More
Security and Organizational Maturity
Insight Paper 11.10.2016

Security and Organizational Maturity

Although I am the Chief Security Officer at Trexin, for a long time I resisted working directly in the Information Security field. Back at Bell Labs, we did not talk specifically about security—UNIX and the Internet were developed as trust-based systems. But we did believe passionately in privacy, and that<span. . .
Tagged in: Strategy & Innovation, Technology
Read More