Strategies to Continue Operating During Power Disruptions and Improve Air Quality
Title: Microgrid Strategies for Hospitals and Healthcare Organizations Webinar
Date: Thursday, August 20, 2020
Time: 1:00 PM Eastern Daylight Time (10:00 AM Pacific Daylight Time)
Duration: 1 hour
The nature of today’s hospitals — 24-hour services provided by teams of specialized professionals, supported by an expanding use of technology — creates an extraordinary demand for energy.
Now, as the health care field is tackling the most challenging pandemic of our lifetime, resiliency in healthcare energy systems is getting even more critical. Hurricanes, storms and wildfires are unavoidable, but when coupled with viral threats such as COVID-19, reliance on the central grid alone is no longer an option.
This webinar will consider a strategic focus on how health care systems can prepare themselves for resiliency under pandemic situations. Our speakers will address energy procurement strategies, onsite energy generation technology, , how to reduce energy costs, mitigate revenue loss from canceled procedures, and doing all this while deploying clean energy solutions that improve air quality by eliminating smog-forming pollution and particulate matter.
What You Will Learn:
- How to reduce energy costs and mitigate revenue loss from canceled procedures.
- How to create energy security during pandemics, natural disasters and planned and unplanned outages.
- How to implement sustainable energy sources, without emitting NOx, Sox and particulate matter and improving local air quality for sensitive patient populations.
Speakers:
- Nirupama Prakash Kumar, Bloom Energy, Senior Product Manager – Healthcare Microgrids
- Ryan De La Cruz, Ecom Energy Inc, Director of Business Development



































The FBI obtained information regarding a group of Chinese APT cyber actors stealing high value information from commercial and governmental victims in the U.S. and abroad. This Chinese APT group is known within private sector reporting as APT10, Cloud Hopper, menuPass, Stone Panda, Red Apollo, CVNX and POTASSIUM. This group heavily targets managed service providers (MSP) who provide cloud computing services; commercial and governmental clients of MSPs; as well as defense contractors and governmental entities. APT10 uses various techniques for initial compromise including spearphishing and malware. After initial compromise, this group seeks MSP administrative credentials to pivot between MSP cloud networks and customer systems to steal data and maintain persistence. This group has also used spearphishing to deliver malicious payloads and compromise victims.
