Life Sciences 5: Secrets to Success-Plan and Implement Compliant ERP Projects

David Stokes, Global Lead, IS Consulting and Compliance Business & Decision
ERP vendors promise life sciences organizations a world of improvements from optimization to compliance, but the reality is in many cases implementations run over schedule, over budget and aren’t even close to being compliant. To prevent this from happening to you, listen as Business & Decision ERP experts share decades of experience and secrets for a successful (and compliant) ERP project. You’ll learn how to align all phases of an ERP project -- planning, implementation, project management and validation – as well as how to clearly define your project team roles, responsibilities and resources.

This is the fifth in a series of five live webcasts by Business & Decision life sciences experts designed to help you optimize compliant business processes, reduce operational costs and improve margins.
Mar 13 2012
60 mins
Life Sciences 5: Secrets to Success-Plan and Implement Compliant ERP Projects
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Analytics 3.0: The Dawn of a New Data Era May 15 2014 4:00 pm UTC 30 mins
    Analytics 3.0 breaks through constraints that companies have faced around enabling any analytics, on any data, at any time. For many companies, the scope of data analysis has expanded from gathering operational business intelligence to performing product offering analysis using embedded data intelligence.

    Join our live webcast on April 3, 2014 at 12 PM EST and learn how analytics has evolved from business intelligence to the new era of data-enriched offerings, and how you can apply Analytics 3.0 to produce measurable business benefits and optimize internal decision processes for your organization.
  • Exchange Archive Management for Microsoft Office 365 Migrations Recorded: Apr 24 2014 25 mins
    Join us to learn how Office 365 archiving can help you to meet all of your archiving and eDiscovery needs.

    During this live webcast, Chris Day, Director of Cloud & Mobility at Business & Decision will answer the following questions:

    •What are Exchange Online archives?
    •What are the limitations of Exchange Online archives?
    •How does eDiscovery work with Exchange Online archives?
    •What do I need to consider before migrating from a traditional archive to Exchange Online archives?
  • App Development in SharePoint 2013 Recorded: Apr 17 2014 31 mins
    SharePoint 2013 features a new app model that allows you create easy-to-use, lightweight web applications that integrate popular web standards and technologies to extend the capabilities of a SharePoint website. Join our live webcast for an overview of Microsoft’s new SharePoint app model and learn:

    • How to configure app development for SharePoint on-premises
    • How developers can kick-start app development using SharePoint Online
    • What the differences are between provider-hosted and autohosted apps for SharePoint
  • Eliminate Duplicate Parts and Increase Engineering Capacity Recorded: Apr 8 2014 32 mins
    EXALEAD OnePart is an innovative application for locating and reusing 2D/3D legacy parts, designs, and associated documentation. The intuitive user experience allows designers, engineers, and R&D managers to shorten product development times, improve efficiencies, and lower lifecycle costs.

    Join us to learn how to:

    •Increase Engineering Capacity
    •Accelerate product design and development at lower cost
    •See side-by-side comparison of legacy information about design, component, project or product data
    •Reuse proven best-practice specs, design standards, and post new IP into PLM and ERPs
    OnePart provides cross-product meta-data, shape search, discovery, and visualization, with side-by-side compare of information about a design, part, or component for rapid and thorough investigations of reusable enterprise assets.

    OnePart is NOT an application inside the PLM system, but is a search based solution that can feed the PLM (or any system of record) with newly found IP.

    OnePart is browser-based and works without plugins, meaning no install on user machines and very efficient for new version rollouts.
  • Compliance Fundamentals Live Session 1 Recorded: Mar 27 2014 42 mins
    Recap of "Who Needs to Be Compliant" and "SOX Compliance Fundamentals" with live Q&A session.

    In this live webcast, Guy Wakefield and Ashley Peacock will provide an overview of key takeaways and host a live Q&A session to address questions related to videos 1&2 in the series:

    Life Sciences: Who Needs to Be Compliant?
    SOX Compliance Fundamentals
  • SOX Compliance Fundamentals Recorded: Mar 21 2014 29 mins
    In this on-demand video, Ashley Peacock, Director of Regulatory Compliance with Business & Decision, presents an overview of the Sarbanes-Oxley Act and discusses how SOX impacts IT organizations and how companies that are subject to other regulations can implement SOX compliance as part of a multi-regulation quality system.
  • Achieve Digital Marketing Success With Adobe Marketing Cloud Recorded: Mar 20 2014 49 mins
    Digital marketing success requires the right technology. In this live webcast presented by Jim Marzola, B&D's VP of CRM, Marketing and Strategic Alliances, learn how Adobe Marketing Cloud enables marketers to:

    • Send the right offer to the right person in the right way at the right time
    • Identify customers and prospects across all your channels including Facebook and Twitter
    • Make sure emails get to your customers no matter the device
    • Present a unified message across all inbound and outbound channels
  • SharePoint 2013 Branding With Design Manager Recorded: Mar 13 2014 30 mins
    Design Manager is a new tool in SharePoint 2013 that was built to give users an easier way to brand your internal intranet site or public-facing website. Join us on March 13 at 12pm EDT to learn how you can leverage the skills you already have to easily create pixel-perfect branding for your SharePoint environment.
  • Infor ION: Systems Integration, Simplified. Recorded: Mar 6 2014 25 mins
    If your business is like most, the organizational systems you use have evolved over time, creating a complicated technology landscape. Disconnected systems and information silos result in inefficiencies, costly maintenance requirements, and ultimately—missed opportunities.

    With the Infor Intelligent Open Network (ION) platform, you can easily integrate both Infor and third-party software applications, allowing you to:
    •Eliminate operational silos
    •Dramatically improve exception management
    •Achieve unparalleled end-to-end efficiency

    Join our live webcast and learn how to simplify integrations and upgrades, reduce the burden on IT, and give end users the flexibility to adapt business processes as needed.
  • Sales Intelligence for Life Sciences and Healthcare Recorded: Feb 20 2014 58 mins
    To maintain competitive advantage and regulatory compliance, Life Sciences and Healthcare companies must run sales operations efficiently and intelligently. Join us on February 20, 2014 and learn how B&D Life Sciences and Healthcare clients have utilized sales intelligence solutions built on QlikView’s Business Discovery Platform to:

    • Easily track real-time sales performance on dashboards and scorecards
    • Improve insight into pipeline and key risk areas to address
    • Gain better understanding of their prescriber base to optimize sales efforts
    • Empower sales forces with mobile sales applications

    John Dempster, Matt Stratton, Bob Dawes, and Ellen Derrico, Global Head of Life Sciences and Healthcare Market Development at QlikView, will walk you through client case studies and discuss ways that Life Sciences and Healthcare companies can apply similar solutions to improve sales operations.
  • EXALEAD OnePart Recorded: Feb 19 2014 4 mins
    Engineers and designers are confronted with an information challenge: the search for existing parts, CAD files, data and related information takes too much time. Instead of finding a part to reuse, it’s become faster to create a new part, costing the organization needles time and money.

    The solution? EXALEAD OnePart searchers for and discovers legacy data assets managed by design and engineering functions, offering:

    Search of existing CAD files and related information
    Discovery of hidden information
    Shape Search to find similar parts
    Rapid reuse of 2D and 3D data

    View this video to learn how to reveal hidden assets, reuse legacy parts and reduce duplicate parts with EXALEAD OnePart.
  • Leveraging FDA Quality Systems for SOX Compliance Recorded: Feb 13 2014 57 mins
    Many companies in Healthcare and the Life Sciences implemented quality systems in their IT departments to meet the requirements of the FDA and EMEA, only to find out a few years later that they also needed systems to manage compliance required by the Sarbanes-Oxley Act (SOX). Now they have two quality systems, making it difficult for IT personnel to know which to use, and often causing redundant work. This webcast will give an overview of how to leverage your existing FDA quality systems to meet SOX requirements and discuss where existing quality systems need to be augmented to also meet the requirements of SOX.
  • EXALEAD OneCall - Upgrade CRM Recorded: Feb 11 2014 3 mins
    Learn how to leverage your existing CRM system to deliver the most relevant information, in the most intuitive way, directly to customer service agents' desktops.
  • EXALEAD OneCall - Beyond CRM Recorded: Feb 11 2014 2 mins
    Traditional CRM systems were designed for customer management activities - not customer service. In this 2 minute video, learn how EXALEAD OneCall enables call center managers to imrove agent to customer interactions, retain more customers and help grow the business more profitably.
  • EXALEAD OneCall Agent Desktop Recorded: Feb 11 2014 2 mins
    Contact center agents today cannot consistently and effectively answer customer questions.

    In this 2 minute video, learn how the EXALEAD OneCall Agent Desktop can improve your customers' experience and increase agent productivity and campaign efficiency.
  • Clash of the CRM Titans: Oracle / Microsoft / Salesforce.com Recorded: Feb 6 2014 64 mins
    Your organization can reap many benefits from the right CRM system - streamlined sales & marketing processes, increased sales productivity, improved customer service, loyalty and retention, and better return on marketing investments – if you choose one that fits your business.

    In this live webcast, Jim Marzola will compare and contrast Oracle, Microsoft Dynamics CRM 2013, and Salesforce.com, focusing on:

    • Usability
    • 3 Year total cost of ownership (TCO)
    • Deployment options (To Cloud or not to Cloud; that is the question.)
    • Information storage and access
    • General pros and cons of each solution

    Join our webcast on February 6, 2014 and discover some of the hidden consequences and undocumented benefits of the big 3 CRM software solutions.
  • Develop and Test in the Cloud With Windows Azure Recorded: Jan 30 2014 31 mins
    Windows Azure is a great cloud-based environment for customer-facing applications – but can be just as, or more, effective as an internal development and testing tool for your team.

    In this live webcast, learn how to use Azure to develop and test applications faster, at reduced cost, and with the flexibility to deploy in the cloud or on-premises.
  • An Introduction to System Center Configuration Manager 2012 R2 Recorded: Jan 23 2014 42 mins
    In this live webcast, learn how System Center Configuration Manager 2012 R2 can:

    • Keep your critical systems and software patched and up to date
    • Help your company to deploy Windows 8.1 enterprise wide
    • Manage application deployment

    Join us on January 23, 2014 and learn how System Center Configuration Manager help you better manage your IT infrastructure.
  • Who Needs to Be Compliant? Recorded: Jan 20 2014 16 mins
    Regulatory Compliance is law. Depending on the products or services your company provides and the areas of the world in which it operates and trades, regulatory compliance may or may not be required.
  • Create an Upgrade Plan that Maximizes the Value of Your Oracle EBS Investment  Recorded: Jan 16 2014 52 mins
    When evaluating any upgrade there are many factors to consider such as functional capabilities, support timeframes, technical infrastructure, and underlying business needs. For manufacturing companies these factors are often complex and interrelated — which adds to the importance of determining the most appropriate upgrade strategy.

    Join us for a live webcast on January 16 and learn how to create an Oracle E-Business upgrade strategy that fits your manufacturing and supply chain business.
Live webcasts for technology professionals
The Topline is a series of live webcasts discussing ways to solve current business challenges through technology from Business & Decision, a global leader in Business Intelligence (BI), Customer Relationship Management (CRM), e-Business, Enterprise Information Management (EIM), Enterprise Resource Planning (ERP), enterprise solutions, management consulting and managed services & hosting. The Topline frequently features webcasts with topics specific to the Life Sciences industry as well topics that are relevant to all industries.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Life Sciences 5: Secrets to Success-Plan and Implement Compliant ERP Projects
  • Live at: Mar 13 2012 3:00 pm
  • Presented by: David Stokes, Global Lead, IS Consulting and Compliance Business & Decision
  • From:
Your email has been sent.
or close
You must be logged in to email this