We are Trexin
Security and Organizational Maturity
It’s Not Just about Firewalls and Checklists.
Although I am the Chief Security Officer at Trexin, for a long time I resisted working directly in the Information Security field. Back at Bell Labs, we did not talk specifically about security—UNIX and the Internet were developed as trust-based systems. But we did believe passionately in pri...
Marketing Medical Devices in an Age of Value-Based Care
Trexin provided a medical device company with advanced analytics of a commercially available health
Our Client, a rapidly growing medical device company, sought a partner to help them better understand fluid management for their hemodynamic monitoring product line. They were looking to generate abstracts in partnership with several physician groups who were thought leaders in the area of flui...
news & info
3rd Annual IIA/ISACA Hacking Conference
The Institute of Internal Auditors (IIA), in conjunction with the Information Systems Audit and Control Association (ISACA), held their 3rd annual Hacking Conference on November 3 and 4, competing with the Chicago Cubs for the attention of ~300 attendees. Glenn Kapetansky, Trexin CSO, joined ot...