PODCAST: Investing in Digital Health Sales and Marketing

By Eric Bricker MD

***

***

COMMENTS APPRECIATED

Thank You

***

DHITS: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***

DIGITAL HEALTH: 8 Ways to Impress Your Doctor

By Bertalan Meskó, MD PhD
The Medical Futurist

***

READ HERE: https://tinyurl.com/2hat4fun

COMMENTS APPRECIATED

Thank You

***

ORDER: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***

PODCAST: Digital Tele-Health Trends 2023

Virtual-first, health equity and more

By Bill Siwicki

***

***

A greater focus on care coordination and further embrace of tele-medicine by payers will also be hallmarks this year, says one virtual care expert.

READ: https://www.healthcareitnews.com/news/telehealth-trends-2023-virtual-first-health-equity-and-more

CITE: https://www.r2library.com/Resource/Title/082610254

***

***

ORDER: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

COMMENTS APPRECIATED

Thank You

***

PODCASTS: Digital Health + Health I.T.

By Becker’s Hospital Review

***

***

LISTEN: https://www.beckerspodcasts.com/health-it-digital-health-podcast

***

ORDER: https://www.amazon.com/Business-Medical-Practice-Transformational-Doctors/dp/0826105750/ref=sr_1_9?ie=UTF8&qid=1448163039&sr=8-9&keywords=david+marcinko

***

ORDER: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***

COMMENTS APPRECIATED

Thank You

***

TOP 50: The Digital Health-Trend Hype Cycle

***

Emerging Digital Health Trends

BY Bertalan Meskó, MD PhD

****

Digital technologies have completely transformed our lives in the last couple of years and started to entirely reshape the landscape of healthcare. Yet, this is only the beginning. Huge waves of changes are on their way. The future of healthcare is shaping up in front of our eyes with advances in digital healthcare technologies.

And so, here is the latest research, from the Medical Futurist’s Hype Cycle Of The Top 50 Emerging Digital Health Trends.
The Medical Futurist’s Hype Cycle Of The Top 50 Emerging Digital Health Trends

Quantum Computing
3D Bioprinting
Facial recognition in hospitals
Vocal biomarkers
3D printing prosthetics
Robots in hospitals
Augmented reality in patient education
A.I. in drug design
Augmented reality in medical education
Medical transportation platforms
Private 5G in healthcare
At-home lab tests
3D printing drugs
Medical drones
A.I. in diagnostics
Voice-to-text apps
A.I. in medical decision-making
Nutrigenomics
3D printing equipment
Virtual reality in patient education
Chatbots
Portable diagnostic devices
Augmented reality in surgery
Portable ultrasound devices
Virtual reality in staff training
Robots in rehabilitation
A.I.-based prosthetics
Longevity research
Nutrition devices
Employee wellness programs
Exoskelotons
Clinical trial recruiting
Clinical trial management
Remote care apps
Cloud computing
Nutrition apps
Robot companions
Medication management solutions
Personal genomics services
Microbiome testing
Remote care platforms
Digital health insurance
Smartwatches
Wearable health devices
Personal Health Records
Electronic Medical Records
Smartphone health apps
Mental health apps
Fitness trackers
Virtual reality in pain management

Bertalan Meskó, MD
The Medical Futurist

***

DHITS: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***
Your comments are appreciated.

Comprehensive Financial Planning Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

MORE: https://www.routledge.com/Comprehensive-Financial-Planning-Strategies-for-Doctors-and-Advisors-Best/Marcinko-Hetico/p/book/9781482240283

THANK YOU

****

Q1 2022 – The Entrepreneurial Digital Health Financing Boom Chills

By Phil Taylor

***

***

US digital health company investment financing experienced a dip in Q1 of 2022, dropping to $6 billion from the $6.7 billion invested in Q1 2021. In addition, the average size of each investment deal dropped from $46 million last year to just shy of $33 million. These declines come after a boom in investments in recent years. The Rock Health Digital health securities index also reflected this year’s trend, including special purpose acquisition company (SPAC) listings.

According to Phil Taylor of PharmaPhorum, “SPACs have been a popular route to public listing for digital health as well as many other sectors, but the deals have underperformed, with steep declines in share prices after they closed that has “exerted downwards pressure” on the Rock Health Digital Health Index (RHDHI).”

Read more by clicking here

SPACs: https://medicalexecutivepost.com/2021/11/12/spac-popularity-soaring-in-healthcare/

***

COMMENTS APPRECIATED

Thank You

Subscribe to the Medical Executive-Post

***

***

***

HIMSS REPORT: The State of Healthcare IT in 2022

***

By Staff Reporters

***

***

4 Takeaways from HIMSS

 •  84% of respondents say their organizations require them to use digital health tools and most clinicians see the value in digital transformation.
 •  99% of leaders in U.S.-based health systems say it is important for their organizations to invest in digital transformation and 95% of international health system leaders agree.
 •  93% of international payer respondents and 74% of U.S. payers say their organizations have a team focused on digital transformation.
 •  80% of health system leader respondents in the U.S. think that a physician visit deserves to be reimbursed at the same or higher levels than an in-person visit.

Source: HIMSS via Healthcare Innovation, March 18, 2022

NOTE: The Healthcare Information and Management Systems Society is an American not-for-profit organization dedicated to improving health care in quality, safety, cost-effectiveness and access through the best use of information technology and management systems.

CITE: https://www.r2library.com/Resource/Title/082610254

***

COMMENTS APPRECIATED

Thank You

***

***

The TOP 100 Digital Health Companies

****

See the source image

There are a zillion digital health companies on the market, each praising their own solution/product as they can. It is up to the market to decide if these are any good. But how would patients, hospital systems, clinics or even investors decide on their added value? With the help of experts.

It is the 4th time we collect The TOP100 Digital Health Companies. A curated list of the best companies of the thousands we encounter while doing our work at The Medical Futurist. Of them, we chose a hundred that represent the following key values: mindset for innovation, truly disruptive technology, viable business model and a clear dedication to digital health.

Take care,
Berci
Bertalan Meskó, MD
The Medical Futurist

***

YOUR COMMENTS ARE APPRECIATED.

***

ANNOUNCING: A New Course In Digital Health

The Medical Futurist

By Dr. Bertalan Meskó MD PhD

***

I’m so happy and proud that I can finally share with you the biggest project The Medical Futurist has ever worked on: The Digital Health Course.

Today, we publicly launch the digital platform where you can learn about everything we and I personally find important about digital health. I mean EVERYTHING!

In this course I break down everything I’ve learned over the last 15 years about the future of healthcare and digital health, what changes are taking place now and over the next 5+ years, what impact they’ll have on you as a healthcare decision-maker, and exactly what you should be doing today to best position yourself or your company for this inevitable reality.

We designed this course to provide you with a complete overview of digital health, guide you through the technological aspects, and equip you to be able to predict and forecast what’s coming next.

From the basics and its definition, to why it’s a cultural transformation that is happening now, how it is a paradigm shift of care, how you can spot trends in it and forecast the near future.

***

***

As I guide you personally through the course, I have put my heart, brain and soul into the whole curriculum.

Sign up here > (free preview available)

***

***

***

PODCAST: Digital Health Market Segmentation

FOR HEALTHCARE ENTREPRENEURS

By Eric Bricker MD

***

***

COMMENTS APPRECIATED

Thank You

Subscribe to the Medical Executive Post

***

***

***

***

PODCAST: NaviHealth Digital Health Start-Up

SOLD TO OPTUM

BY ERIC BRICKER MD

***

***

YOUR COMMENTS ARE APPRECIATED.

Thank You

***

***

***

PODCAST: The Future of Pharma

THE MEDICAL FUTURIST

By Bertalan Mesko MD PhD

***

***
YOUR COMMENTS ARE APPRECIATED.

Thank You

***

Major Issues Facing Healthcare in 2021?

Here are the major issues facing healthcare according to PwC

Will a health system battered by the pandemic emerge stronger in the year ahead? The annual report predicts challenges such as profitably merging virtual and in-person care, and capitalizing on new consumer- and clinician-facing digital health tools.

The far future of healthcare - FOHS Plenary 2 report - The ...

READ: https://www.healthcareitnews.com/news/here-are-major-issues-facing-healthcare-2021-according-pwc

ASSESSMENT: Your thoughts are appreciated.

THANK YOU

***

Digital Health Update 2020-2021

Dear David,

For many companies, 2020 has been a devastating year due to the consequences of the COVID-19 pandemic. While the same can be said for the digital health sector, the pandemic has also paved a way to unexpected and extraordinary business opportunities in 2021.

digi health 1

Explore the top 5 business opportunities for digital health companies in 2021. Where is the money?

I am happy to share with you Ralf Jahns, MD of Research2Guidance latest opinion piece. If you have any questions or need more insights, facts or data to tailor the text and make it unique, please do not hesitate to contact me. I can arrange a short call with Mr. Jahns.

Thank you for your time.

Stay safe and healthy.

With warmest regards,
Stela Nikolova

Is there Hope for Digital Health in 2021?

The Future of Digital Health

***
***
Open this article on LinkedIn to see what people are saying about this topic. Open on LinkedIn

0

Why There’s Hope In 2021

Continue reading

Historical Digital Health and Tele-Medicine?

Digital Health & Tele-Medicine are NOT 21st Century Concepts!

[via Igor Korolev DO, PhD]

***

Fritz Kahn, a physician, author, and illustrator imagined the future of medicine nearly 100 years ago!

MORE: https://en.wikipedia.org/wiki/Fritz_Kahn

This 1926 illustration shows “The Doctor of the Future” providing patient care remotely using a telecommunication system & medical devices that track various physiological & health information (electrocardiogram – ECG, X-ray images, temperature, respiratory function, blood pressure).

***

***

***

***

Conclusion: Your thoughts are appreciated.

Product Details

***

A Look-Back on Digital Game Changers for 2017; in 2019?

An Informal Follow-Up Poll

[By staff reporters]

Crystal balls. Tarot cards. Extra Sensory Perception. Looking at tea leaves. Using your sixth sense. Fortune cookies. Reading Nostradamus. Precognitive dreaming. Palmistry.

There are many ways, it is said, that  you can tell the future, and precisely none of them were used to research this list of the biggest digital marketing trends for 2017.

Instead, we have taken a year’s worth of reading about marketing every day, looked at the developments that seem to be gaining traction, and extrapolated some predictions for 2017.

Here they are!

***

***

Brandwatch

Sorry; if that’s not scientific enough for you. We actually Googled ‘methods for predicting the future’ in preparation for this article (see, we do proper research too) and one of the methods listed was ‘time travel’; so if it helps, imagine us in a Delorean going at 88mph.

Assessment

Your thoughts are appreciated. How did we, and Brandwatch, do?

RESOURCES:

“Insurance & Risk Management Strategies for Doctors” https://tinyurl.com/ydx9kd93

“Fiduciary Financial Planning for Physicians” https://tinyurl.com/y7f5pnox

“Business of Medical Practice 2.0” https://tinyurl.com/yb3x6wr8

***

Product DetailsProduct Details

Insurers Hold the Key to Healthcare’s Digital Future

On Electronic Health and Insurance

Imagine this scenario: It’s 7:30 AM, and time to leave for work. You normally drop your three-year-old daughter off at day care on your way to the train station. However, this morning she has developed two red, itchy blotches on her face. Is she sick, you wonder? Is it serious? Is she contagious? Looks like you’ll have to keep her out of day care and take her to the pediatrician, and who knows when you’ll be able to get an appointment. Or maybe you’ll just need to go to the doctor’s office and wait to be squeezed in. Either way, you or your spouse will have to miss a partial or full day of work.

***

***
Assessment
Bu, what if things could be done differently, more efficiently, with less time and less anxiety? What if you could use a smartphone app provided by your health insurance company to get background information on rashes, initiate a video consultation with your doctor and schedule an appointment with a highly rated specialist close by who can see your daughter that morning?

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure. 

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. https://medicalexecutivepost.com/dr-david-marcinkos-bookings/ 

Contact: MarcinkoAdvisors@msn.com

***

Product Details

Update on Healthcare Wearables

Consumer Digital Health

By http://www.MCOL.com

***

***

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure. 

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. https://medicalexecutivepost.com/dr-david-marcinkos-bookings/ 

Contact: MarcinkoAdvisors@msn.com

***

UNDERSTANDING MEDICAL PRACTICE CYBER SECURITY RISKS

Join Our Mailing List 

A SPECIAL ME-P REPORT

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

Mitigations for the Digital Health Era

Shahid N. Shah MS

[By Shahid N. Shah MS]

There has been a tremendous explosion of information technology (IT) in healthcare caused by billions of dollars of government incentives for usage of digital healthcare tools.

But, IT systems face threats with significant adverse impacts on institutional assets, patients, and partners if sensitive data is ever compromised. Every health enterprise is required to confidentiality, integrity and availability of its information assets (this is called “information assurance” or IA). Confidentiality means private or confidential information must not be disclosed to unauthorized persons. Integrity means that the information can be changed only in an authorized manner so as to maintain the correctness of the information. Availability defines the characteristic that information systems work as intended and all services are available to its users whenever necessary.

It is well known that healthcare organizations face and have been mitigating many risks such as investment risk, budgetary risk, program management risk, safety risk, and inventory risk for many years. What’s new in the last decade or so is that organizations must now manage information assurance risks related to operating its information systems because information systems. IT is now just as a critical an asset as most other infrastructure managed by health systems. It is important that information security risks are given the same or more importance and priority as given to other organizational risks.

As health records move from paper native to digital native, it’s vital that organizations have information risk management programs and security procedures that woven into the culture of the organization. For this to happen, basic requirements of information security must be defined and implemented as part of both the operational and management processes. A framework that provides guidance on how to perform these activities, and the co-ordination required between these activities is needed.

***

hacker

[Black Hat Medical Hacker]

***

INTRODUCTION

The Risk Management Framework (RMF), supported by the National Institute of Standards and Technology (NIST) provides this framework. The NIST 800 series publications provide a structured approach to achieve risk management. It provides broad guidance and not necessarily all the prescriptions, which means it can be tailored to meet the organization’s specific needs and providing the flexibility needed for the different organizations. Using the NIST RMF helps organizations with risk management not only in a repeatable manner, but also with greater efficiency and effectiveness. Healthcare information assurance is complex and without a framework that takes into account a broad risk management approach, it is difficult to consider all the intricacies involved.

The NIST Risk Management Framework consists of a six step process designed to guide organizations in managing the risks in their information systems.

The various steps as defined in the NIST specifications are the following:

  • Categorize the information system and the information processed, stored, and transmitted by that system based on an impact analysis.
  • Select an initial set of baseline security controls for the information system based on the security categorization; tailoring and supplementing the security control baseline as needed based on an organizational assessment of risk and local conditions
  • Implement the security controls and describe how the controls are employed within the information system and its environment of operation.
  • Assess the security controls using appropriate assessment procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
  • Authorize information system operation based on a determination of the risk to organizational operations and assets, individuals, other organizations, and the Nation resulting from the operation of the information system and the decision that this risk is acceptable.
  • Monitor the security controls in the information system on an ongoing basis including assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of the associated changes, and reporting the security state of the system to designated organizational officials.

All information systems process, store and transmit information. What is the possible impact if a worst case scenario occurs that causes endangers this information? A structured way to find out the potential impact on the confidentiality, integrity and availability of information can be done through the first step of NIST RMP, the categorization of information systems.

***

keyboard

[Triple Redundant Passwords and Encryption]

***

The NIST SP 800-60 [1, 2, 3 4] provides such guidance. The potential impact is assigned qualitative values – low, moderate, or high. Based on these impact levels for each of the information type contained in the system, the high water mark level is calculated, that helps in selecting the appropriate controls in the subsequent steps.

Organizations need to mitigate risks adequately by selecting an appropriate set of controls that would work effectively. In the selection of security controls step, the set of controls are chosen based on the categorization of the information system, the high water mark and the goals of the organizations.

These baseline controls are selected from NIST SP 800-53 [5] specification, one of three sets of baseline controls, corresponding to low, moderate, high impact rating of the information system. These baseline controls can be modified to meet specific business needs and organization goals. These tailored controls can be supplemented with additional controls, if needed, to meet unique organizational policies and environment factors and its security requirements and its risk appetite. The minimum assurance requirements need to be specified here.

All the activities necessary for having the selected controls in place, is done in the implementation of security controls step. The implementation of the selected security controls will have an impact on the organization risks and its effects. NIST SP 800-70 [6, 7] can be used as guidance for the implementation. An implementation strategy has to be planned and the actions have to be defined and the implementation plan needs to be reviewed and approved, before the implementation is done.

Once the controls are implemented, then the assessment of security controls is done to find out whether the controls have been correctly implemented, working as intended, and giving the desired output with respect to the security requirements. In short, whether the applied security controls are indeed the right ones, done in the right way, giving the right outcome. NIST SP 800-53 [5], NIST 800-53A [6], NIST 800-115 [8-11] can provide the necessary guidance, here. 

***

md-defeated-

[Frustrated Physician]

***

The authorization of information systems is an official management decision, authorizing that the information system can be made operational, with the identified risks mitigated and the residual risks accepted, and is accountable for any adverse impacts on the confidentiality, integrity and availability of information systems. If the authorizing personnel find that the risks are not mitigated and hence can compromise the sensitive information, they can deny authorizing the information system. NIST SP 800-37 [2] provides guidance on authorization. The authorizing personnel are to be involved actively throughout the risk management process.

Risk management is not one-time process, that once it is done, it is forgotten. It is a continuous process, to be integrated with day-to-day activities. One of the key aspects of any risk management is the monitoring of security controls to check whether the controls are performing as intended. The main focus of monitoring security controls is to know whether the controls are still effective over a period time, given the changes that occur in the information systems — the changes in hardware, software and firmware, the changes in environment factors, operating conditions etc. NIST SP 800-37 [2] provides guidance about this. And, if the security controls are found to be ineffective, the cycle starts again, with either re-categorization or selecting another set of baseline controls, or assessing the effectiveness of the controls once more etc.

Regardless, in all the steps in risk management framework, one of the important aspects is communication. Appropriate documents needed to be generated in all the steps, reviewed and kept up-to-date.

Organizational risk management provides great benefits to the organization because it helps to prioritize the resources, increase interoperability, and reduce costs incurred due to the adverse effects. It helps to prevent unauthorized access to personally identifiable information which will lead to security breaches. 

Channel Surfing

Have you visited our other topic channels? Established to facilitate idea exchange and link our community together, the value of these topics is dependent upon your input. Please take a minute to visit. And, to prevent that annoying spam, we ask that you register.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

ABOUT 

Mr. Shahid N. Shah is an internationally recognized healthcare thought-leader across the Internet. He is a consultant to various federal agencies on technology matters and winner of Federal Computer Week’s coveted “Fed 100″ Award, in 2009. Over a twenty year career, he built multiple clinical solutions and helped design-deploy an electronic health record solution for the American Red Cross and two web-based eMRs used by hundreds of physicians with many large groupware and collaboration sites. As ex-CTO for a billion dollar division of CardinalHealth, he helped design advanced clinical interfaces for medical devices and hospitals. Mr. Shah is senior technology strategy advisor to NIH’s SBIR/STTR program helping small businesses commercialize healthcare applications. He runs four successful blogs: At http://shahid.shah.org he writes about architecture issues; at http://www.healthcareguy.com he provides valuable insights on applying technology in health care; at http://www.federalarchitect.com he advises senior federal technologists; and at http://www.hitsphere.com he gives a glimpse of HIT as an aggregator. Mr. Shah is a Microsoft MVP (Solutions Architect) Award Winner for 2007, and a Microsoft MVP (Solutions Architect) Award Winner for 2006. He also served as a HIMSS Enterprise IT Committee Member. Mr. Shah received a BS in computer science from the Pennsylvania State University and MS in Technology Management from the University of Maryland. 

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

***

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

***

READINGS

[1] National Institute of Standards and Technology Special Publication 800-30 Revision 1, Guide for Conducting Risk Assessments, http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf

[2] National Institute of Standards and Technology Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems, http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

[3] National Institute of Standards and Technology Special Publication 800-60 Volume I Revision 1, Guide for Mapping Types of Information and Information Systems to Security Categories, http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol1-Rev1.pdf

[4] National Institute of Standards and Technology Special Publication 800-60 Volume II Revision 1,  Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories, http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol2-Rev1.pdf

[5] National Institute of Standards and Technology Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

[6] National Institute of Standards and Technology Special Publication 800-53A Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf

[7] National Institute of Standards and Technology Special Publication 800-70 Revision 2, National Checklist Program – Guidelines for Checklist Users and Developers Recommendations of the National Institute of Standards and Technology for IT Products, http://csrc.nist.gov/publications/nistpubs/800-70-rev2/SP800-70-rev2.pdf

[8] National Institute of Standards and Technology Special Publication 800-115, Technical Guide to Information Security Testing and Assessment, http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf

[9] National Institute of Standards and Technology Special Publication 800-137, Information Security, http://csrc.nist.gov/publications/nistpubs/800-137/SP800-137-Final.pdf

[10] U.S. Department of Health and Human Services, HIPAA Security Series, Security Standards: Technical Safeguards, http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf

[11] U.S. Department of Health and Human Services, HIPAA Security Series, Security Standards: Physical Safeguards, http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™8Comprehensive Financial Planning Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

%d bloggers like this: