Join the BrightTALK forensic science community for access to online forensics training from respected professionals in the field. Study forensic science online to learn necessary skills for trace evidence in forensics, liquid and gas chromatography and sample preparation. You can also attend live webinars to interact with forensic scientists and have your questions answered.
Currently the US EPA has not promulgated a method for the analysis of Total Nitrogen (TN). Most states that have TN regulations require permitee's to measure TN as the composite of TKN, Nitrate and Nitrite. This approach is costly, time consuming, and also susceptible to variability based on the methods used for the individual analytes Merck, KGaA, Darmstadt, Germany is excited to announce the introduction of a Total Nitrogen Test Method consisting of a single spectrophotometric test kit. The method has been evaluated in a multilab study and this webinar will present the results of that study as well as an overview of the savings made possible by utilizing this new method for testing Total Nitrogen.
In the continued effort to save you time and simplify your workflow, we’ve developed a Fontana-Masson Staining Kit with a protocol that is 30x faster than the standard protocol. In this webinar, the researcher who developed the kit explains how easy it is to use this new rapid microwave technique. If you need to stain melanin and argentaffin cells in tissue sections, take a few minutes to watch this webinar - and save yourself many more minutes in the future by using this kit.
How can we create smarter, more effective communications for HCPs and patients? What can be done to challenge the status quo, apply a different mindset to communications, and deliver the best possible patient outcomes?
In this webinar, we will discuss how multichannel strategy and behavioural science are natural partners in creating smarter, more meaningful, and more effective communications. The premise is simple: if we apply a behavioural mindset, we can determine where to focus our communications for the best effect, design the most appropriate multichannel strategy and content, and put the right metrics in place to measure success.
Hear Jack Montgomery share his experiences and methodologies in applying sigma analysis to lab quality control at Asante Health, a Truven Health Analytics Top 100 hospital the past four years.
In this webinar, Jack will discuss the dynamic nature of sigma metrics for clinical chemistry analytes. He will show how they can be improved over time with enhanced monitoring and optimized maintenance schedules. This sensitivity of sigma metrics highlights the notion that sigma methodology is just one of the many tools that should be used for a holistic approach to lab quality.
By attending this webinar, you will:
- Understand the practical use of Six Sigma as a lab quality tool
- Learn about the dynamic nature of sigma metrics and how they can be improved in the lab
- Gain insights into the additional tools for implementing a multi-faceted total quality program
P.A.C.E. credit is available for your participation.*
Jack Montgomery, MLS(ASCP)cm, is the chemistry technical specialist for Rogue Regional Medical Center—the flagship entity for Asante Health—a growing three-hospital system located in southern Oregon containing a laboratory accredited by the College of American Pathologists. Jack has over 40 years of experience in the clinical laboratory with a special interest in quality control, sigma metrics and method validation.
*Beckman Coulter, Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E® Program. These credits are recognized by the State of California. Most programs also provide State of Florida credits (with valid license number). At this time we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
Organizations will need to rapidly detect data incidents and efficiently orchestrate the appropriate response within the 72 hour breach response window. In this session, Forcepoint explores how technologies can support an organization’s breach response process.
IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.
Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
Knowing the “right channel” (combination) is just one (key) part of a customer-centric omnichannel strategy. Including other critical dimensions - notably “right content”, “right context”, and “right frequency” – has never been easy. And mapping these onto who the right customer is, and how to benchmark your competition in markets, is a challenge that is only growing.
The Across Health Navigator 3.0 delivers easily navigable insights into all of these components – as well as giving a thorough survey of the third party media which physicians in different specialties and markets use. This final component allows a solid basis for evaluating websites, newsletters, apps, congresses, and online communities.
In this webinar, we will talk about:
- What are the key metrics for customer engagement: right channel, right context, and right frequency
- What channel insights can do for omnichannel campaigns in terms of right content
- How to benchmark your competitors in different TAs and territories
- Evaluating the reach and impact of different third party media
The in vitro micronucleus assay is one of the most widely used tests to quantify genotoxicity and cytotoxicity, especially as a screening tool in the development of chemicals and pharmaceuticals. Micronuclei (MN) are formed from whole chromosomes or chromosome fragments that lag behind during the metaphase-anaphase transition and are excluded from the main nucleus following division. MN form into small, rounded bodies surrounded by their own nuclear envelope and represent chromosomal mutations that can be used as an endpoint in genotoxicity testing. Typically performed by manual microscopy, the MN assay is laborious and can be subject to scorer bias. To overcome this, automated microscopy and conventional flow cytometry methods have been developed. However, these methods suffer from several limitations such as the requirement to create high quality slides in the case of microscopy and the lack of visual confirmation of MN in the case of flow cytometry. The ImageStream®X (ISX) imaging flow cytometer has the potential to overcome these limitations as it combines the speed, statistical robustness and rare event capture capability of conventional flow cytometry with high resolution fluorescent imagery.
In this webinar, adaptation of the in vitro MN assay to an imaging flow cytometry-based method will be described. Using the ISX Mark II imaging flow cytometer, images of micronucleated mono- and binucleated cells as well as polynucleated cells can be captured at a high flow rate and automatically identified and scored in the Image Data Exploration and Analysis Software (IDEAS®) that accompanies the ISX. A data analysis template created specifically for this application allows for the determination of both genotoxicity and cytotoxicity following treatment with known clastogens and aneugens. This work is the first demonstration of fully automated method for performing the in vitro MN assay on an imaging flow cytometry platform.
A discussion on the Global implications of GDPR, with Hogan Lovells
Join Hogan Lovells' Privacy and Data Protection Lawyer, Eduardo Ustaran and Forcepoint Deputy CISO Neil Thacker for a live webcast, as they discuss the global implications of the General Data Protection Regulation (GDPR).
Whilst awareness of the GDPR is increasing, the broader impact is still misunderstood: any Global organization that holds or processes EU resident data will be subject to the regulation.
In this webcast, they will discuss:
- Which key principles of the GDPR regulation widely affect organizations
- How prepared global organizations are to meet the May 2018 deadline
- The latest information and guidance from the Article 29 Data Protection Working Party
- What can be learned from organizations who are at an advanced stage in their GDPR preparations
- The positive return to the organization from undertaking a GDPR readiness program
The biggest tech companies in the world are also the best at customizing their offerings for customers, and predicting what they want. Amazon, Google, and Netflix have been consistently using AI and predictive marketing analytics to first achieve and then maintain their supremacy. Their internal knowledge, matched with large quantities of structured data and a laser focus on what ‘good’ looks like, have been the drivers of their success.
However, in life-sciences marketing, reality has not caught up to the buzz of self-learning systems (AI) and predictive analytics. However, adoption is increasing (albeit slowly), and more and more leaders are excited by benefits their investments may bring.
Our 2017 Multichannel Maturometer revealed that only around half of major life-sciences companies have an integrated customer database across all channels, and digital teams are only slowly being integrated with their IT partners. And as a further challenge, only 20% are claim to be ‘very comfortable’ with measuring HCP engagement.
For companies to really embrace the future of analytics, it is crucial to move from “predictive guessing” to “predictive knowing”. A well-integrated customer database across all channels, a good understanding of what means success, large-enough datasets, ... are just some of the key components for this transition.
In this webinar, we will talk about:
• How does predictive analytics differ from prescriptive analytics?
• When can predictive analytics become relevant (and when not)?
• What are the different enablers for engaging in predictive analytics?
• A few examples to get inspired
Technology alone does not equal business outcomes. You have invested in more tools resulting in more alerts and more security spend, but you are not seeing better security outcomes—preventing the data breach from the compromised insider, stopping the malicious insider, or blocking the accidental data loss. The cybersecurity industry needs to start thinking differently. For a cybersecurity program to do its job, it must look beyond technology and include a human-centric approach that includes cybersecurity controls, employee training, comprehensive risk assessments and other people-first tactics. This webcast will discuss recent security breaches that have impacted organizations such as Equifax and HBO, identify the problem, and plot out a new course towards data protection by implementing a practical and company-wide cybersecurity program.
We live in a zero-perimeter world, transformed by cloud, remote workers and BYOD. Your sensitive and proprietary data is now everywhere. As a result, security teams are playing catch-up and relying on point product-based technology solutions. Not only do these products create overwhelming amounts of alert noise, but they also neglect to focus on your most important line of defense – your people. This webcast will explore how User and Entity Behavior Analytics (UEBA) enables security teams to proactively protect your data by identifying high risk behavior inside the enterprise. Effectively integrated UEBA provides unparalleled context into your people by fusing structured and unstructured data to identify and disrupt malicious, compromised and negligent users. Join this webcast to learn:
•What data sources to integrate for visibility into human risk
•How to Identify and prioritize high risk users and critical data
•How to Investigate and act to reduce risk and protect data
Join us to find out about the results of the 2017 Multichannel Maturometer. The ninth version of this industry-renowned survey illuminates some of the big changes sweeping through the Pharma industry, as well as highlighting some trends which are still lagging.
Questions which will be answered include:
• Is senior leadership still on the fence for digital?
• Marketing budgets – how are they changing?
• How satisfactory are those in the industry finding digital offerings?
Cabells introduces two new important features: the Journal Blacklist, the only blacklist of deceptive and predatory academic journals, and Altmetric Reports, a measurement of journal media mention data. Join us to learn more about these and other key resources while getting familiar with the new Cabells brand identity and website interface.
Join Cabells Senior Project Manager Lucas Toutloff who will present the following:
•A demonstration of the Journal Whitelist — our curated, searchable database of over 11,000 journals covering 18 disciplines — connecting researchers, librarians, and administrators to verified, reputable publications. Backed by our newly designed journal summaries presenting our suite of journal quality metrics, now including Altmetric Reports.
•A demonstration of our newly released Journal Blacklist, the industry's only data-driven listing of likely deceptive or fraudulent academic journals. Built on objectivity and transparency, specialists analyze journals against over 60 behavioral indicators to keep the community abreast of the growing threats and to keep researchers protected from exploitative operations.
•An introduction to the new Cabells brand identity, website interface and features, and redesigned journal entries.
When the phrase “insider threat” comes to mind, most automatically think of fraud, sabotage and theft; it’s natural to do so, as malicious insider threats make regular headlines.
The truth is that 68% of all insider threats are attributed to accidental users, who unintentionally put their organizations at risk because of a user error or lack of training. Insiders are really anyone that works with sensitive data inside the network.
In Operationalizing a Practical Insider Threat Program, we’ll review:
-Requirements for building an insider threat program
-An overview of the stakeholders and investigative best practices
-Real world examples of an insider threat program in action
Brandon Swafford, CTO of Data & Insider Threat Security, Forcepoint
Brandon Swafford has more than 12 years of experience in legal investigations and security, including hedge funds where he built security technology and the U.S. Intelligence Community as a Cyber Counterintelligence consultant and analyst. Within the intelligence community, Brandon covered several classified agencies and worked closely with the National Insider Threat Task Force and National Counterintelligence Executive. In addition, Brandon provided insider threat analysis and investigation consulting to the International Monetary Fund in Washington, D.C.
Solid phase microexatraction or SPME is a green method for extraction of analytes out of a sample. Since SPME is a non-exhaustive extraction technique, some analysts believe that SPME is not quantifiable. This presentation will provide basic information for developing a method to extract and quantify analytes using SPME. Examples will be given on the extraction and quantification of analytes out of various matrices, and SPME will be compared to other extraction techniques such as QuEChERS and SPE. In this webinar, we will discuss some new SPME technologies such as SPME-OC (over-coated) fibers and BioSPME that help to isolate and quantify analytes from interfering compounds in the matrix. Guidelines will be provided for enhancement of precision using SPME.
The benefits of three dimensional (3D) cell culture are widely appreciated. More cell-based technologies are now becoming available that enable researchers to preserve the native 3D structure of cells in vitro. These can be broadly divided into three areas: aggregate-based methods; hydrogels and extra-cellular matrices; and inert scaffold-based technologies. Each has strengths and weaknesses and there is no one technology that satisfies all applications. Tissues in the body are mostly composed of different cell types that are often highly organized in relation to each other. Often cells are arranged in distinct layers that enable signalling and cell-to-cell interactions. Alternatively in tumours, cancer cells form aggregates and tissue masses composed of different cell types. Recreation of these types of architecture will significantly evolve 3D cell culture to a new level where real tissue-like structures can be generated in vitro.
This webinar will review the alternative approaches available to researchers and provide an overview of their capabilities and example applications. More sophisticated models are developing as 3D cell culture technology becomes established and accepted as a means of creating more physiologically relevant cell-based assays. Methods that are relatively straightforward to use and that recreate the organized structure of real tissues will become valuable research tools for use in discovery, validation studies, and modelling disease.
Key areas covered:
• 2D vs 3D cell culture debate
• Review of alternative approaches and the development of new technologies
• Challenges facing 3D culture methods, in terms of technologies available and methods used
• Showcase applications where 3D technology makes a difference
• Future perspective for 3D cell culture technology and further development
With a wealth of market and regulatory changes impacting the medtech sector, it’s time for digital technology to steer the direction of your future business. This expert webinar will evaluate how to strategically embed digital within your own organisation and explore the challenges and the opportunities for transforming customer relationships, driving commercial outcomes.
– Respond to the changing regulatory environment: how technology empowers your business
– Build a business case for digital transformation and gain organisational support
– Strengthen your customer relationships and improve engagement in a diverse payer landscape
– Learn from pharma (and other industries) to find opportunities and avoid pitfalls
– Measure impact and return on investment from digital engagement
Does western blotting give you more trouble than expected? Do you feel like your precious samples are being wasted on bad westerns? Join us and find out how you can improve your western blots! In this seminar, you will learn general guidelines for performing and troubleshooting your westerns, such as:
• Choice of different blotting membranes
• Parameters affecting blotting efficiency
• Conditions for optimizing your immunodetection
• Information on SNAP i.d.® 2.0 system: A faster way to perform immunodetection
A digital debate analysing the future for biologics in the UK and the factor affecting market access in this territory. Our expert panel will cover a number of key topics including:
•Are the savings offered by biosimilars being used to innovate and take advantage of the exciting new biologic technologies or just filling in the NHS potholes?
•Will the industry continue to invest in cutting-edge research if the UK is not prepared to fund access to it
•In a post-Brexit world how can the UK continue to be a global leader at the cutting edge of biologics research?
Understanding the movements, modifications and interactions of proteins within a cell is key to unraveling the fundamental tenets of biology. However, the low-level expression of many proteins, combined with the transient nature of their interactions and movements, makes analyzing and understanding these processes quite difficult. Duolink® PLA, which is based on the principles of the proximity ligation assay (PLA), offers a solution to overcome these hurdles and to study the actions of endogenous proteins within cells and tissues. Combining the specificity of antibodies with the sensitivity afforded by rolling circle amplification, Duolink® PLA allows you to detect, visualize, and quantitate proteins and their interactions (even single events) where they happen within cells or tissue, all without overexpression or genetic manipulation. This seminar will cover the basic assay principle and advantages of the Duolink® PLA technology, and discuss recent applications and developments of the technology that make it an excellent tool to understand the fundamental mechanisms of biology, as well as disease states. Applications of Duolink® PLA include the investigation of cellular responses to varying stimuli, receptor dimerization and signalling cascades, post-translational modifications, and regulation of protein expression. New developments include use in flow cytometry and multiplexed detection.
78% of employees pose critical threats to your security, says a study from the Ponemon Institute (1). Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day.
According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best enable your teams to access the data they need while keeping it safe?
Hear how a real-world CISO plans, implements and manages an insider threat program. Find out how you enable employees to use disruptive, transformative technology while keeping sensitive data safe. Gain practical insights into planning and implementing an Insider Threat program, including employee education and adoption and executive sponsorship.
(1) “Privileged User Abuse & The Insider Threat,” Ponemon Institute 2014.
In 2018, the General Data Protection Regulation (GDPR) will require EU organizations to meet strict standards and processes to protect personal data. Non-compliance with the GDPR can cost you a fortune, but being in compliance can save you one. Recent estimates put business savings at about €2.3 billion annually.
Join Mike Osterman (Osterman Research) and Mike Smart (Forcepoint Product & Solutions Director, EMEA) as they discuss how to become GDPR compliant by implementing organizational and technical solutions.
This on-demand webcast will explore GDPR security responsibilities and obligations, including:
-Data subject consent
-Data discovery, cataloguing and classifying
-Data breach identification and notification
-Cloud storage and sharing services
As we enter into the final 12 months before the GDPR becomes applicable, take this opportunity to set urgency as to how your organisation must be prepared for the new regulation from experts in data protection and privacy law.
Rosemary Jay, Senior Consultant Attorney from Hunton & Williams, provided guidance and outlook shared from supervisory authorities across the EU to the Article 29 Working Party. Additionally, Forcepoint Deputy CISO Neil Thacker discussed how organisations can use technology to help meet the requirements of the GDPR.
This interactive webcast explored ways to:
-Comply with offering individuals rights to access their personal data, respond to Subject Access Requests, and the Right to Erasure/be Forgotten
-Explore organisational and technical controls that are considered adequate by the supervisory authorities
-Demonstrate organisational accountability to: inventory, map, manage and control data flows and respond to data incidents
78% of employees pose critical threats to your security, says a study from the Ponemon Institute. Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best enable your teams to access the data they need while keeping it safe?
While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.