Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
  • By the third week of May we should all know the composition of the next government. Whichever party or parties assume power, the next government will need urgently to confront a demand resource collision that threatens the continued existence of the welfare state and of the NHS itself.

    It has long been apparent that, as the House of Lords Select Committee on Public Service and Demographic Change made clear in 2013: "England has an inappropriate model of health and social care to deal with the needs of an ageing population ... By 2030 the number of people who are 85+ will have increased by 100%' compared to 2010".

    The argument for greater coherence and integration of health and social care commissioning and provision is driven as much by considerations of coherence and quality as it is by financial necessity. As the Five Year Forward View has already made clear there may be ‘local choice between radical options', but not a choice between the maintenance of the status quo and a radical option. For NHS commissioners and providers (across all specialisms) the challenge is to grasp the opportunity to shape new local forms of integrated commissioning and service development.

    The NHS organisations that survive and thrive in such a rapidly evolving and competitive marketplace will be characterised by proactivity, agility and their eagerness to embrace new forms of strategic partnership.

    This Webinar will consider the specific governance challenges that will confront Boards and Governing Bodies in an evolving cultural context where, as Stevens recently observed, “my institution right or wrong is not going to be what’s required from the service’s new generation of leaders".
  • Electronic Healthcare Records (EHRs) and the information they contain have become the top target of cybercriminals around the world. Several high profile healthcare-related data breaches have made the headlines in recent months and more are sure to come. What is it about the information contained in EHRs that is so enticing and how can it be better secured? Join (ISC)2 and Sophos on May 21, 2015 at 1:00PM Eastern for a discussion of the security of healthcare data and approaches on how to better protect this type of information.
  • Visit this page to download our infographic:
    http://www.vitaminsinmotion.com/fileadmin/data/pdf/Infographics/Vitamine-E-_-Cognition-11.jpg

    In our aging society, Alzheimer’s type dementia is a major concern. The disease can have a devastating impact on quality of life, with patients relying on caregivers for standard daily living activities. Whether it is memory impairment, deterioration, confusion or anger suffered by patients, this highly disruptive neurological disease demands attention.

    Vitamin E is vital for neural function and its deficiency can lead to neurological dysfunction, causing problems with co-ordination, balance and speech. It also has an antioxidant function in the brain – as a free radical scavenger and constituent of neural membranes, preventing the oxidation of lipids and PUFAs.

    Now, recent studies have found that maintaining a high level of vitamin E results in marked improvements for mental health and can be linked individually with a decrease in the onset of Alzheimer’s type dementia.

    Join our webinar and hear our speakers Prof. Maurice Dyksen and DSM’s Dr. Manfred Eggersdorfer and Jacob Bauly present their latest findings on vitamin E and its potential role in curbing the onset of Alzheimer’s disease.
  • The way that physicians want and need to consume information is changing, almost to the point of being unrecognisable from the tried and tested methods of yesteryear, Working in conjunction with Ashfield Healthcare this event brings together Medical Futurist Dr Bertalan Meskó, Dr Partha Kar, Consultant Endocrinologist, Portsmouth Hospitals NHS Trust, with Ruth Herman and Nigel Campbell of Ashfield, which recently launched the Medical Education Future Forum and will be presenting insights from this unique programme.

    Taking place on the 21st May at 12.30 (UK), 13.30 (EU), 07.30 (E. US) and moderated by pharmaphorum's CEO Paul Tunnah, the debate will centre on three key questions,

    Why and how are physicians changing the way they receive information?
    What are the trends and technologies shaping the landscape of medical communication?
    What are the implications of this for pharma (with examples)?
  • The "Systems and Process" work stream of Future Focused Finance (An NHS wide programme to develop the vision for NHS finance for the next five years) has set out to develop what the financial planning, budgeting and forecasting capability should look like for the NHS.
  • Visit this page to download our infographic:
    http://www.vitaminsinmotion.com/fileadmin/data/pdf/Infographics/Vitamine-E-_-Cognition-11.jpg

    In our aging society, Alzheimer’s type dementia is a major concern. The disease can have a devastating impact on quality of life, with patients relying on caregivers for standard daily living activities. Whether it is memory impairment, deterioration, confusion or anger suffered by patients, this highly disruptive neurological disease demands attention.

    Vitamin E is vital for neural function and its deficiency can lead to neurological dysfunction, causing problems with co-ordination, balance and speech. It also has an antioxidant function in the brain – as a free radical scavenger and constituent of neural membranes, preventing the oxidation of lipids and PUFAs.

    Now, recent studies have found that maintaining a high level of vitamin E results in marked improvements for mental health and can be linked individually with a decrease in the onset of Alzheimer’s type dementia.

    Join our webinar and hear our speakers Prof. Maurice Dyksen and DSM’s Dr. Manfred Eggersdorfer and Jacob Bauly present their latest findings on vitamin E and its potential role in curbing the onset of Alzheimer’s disease.
  • 2014 brought significant change for the internet security industry. According to IBM's latest X-Force report:
    - Over 1 billion records of PII were leaked in 2014
    - Vulnerability disclosures rocketed to a record high in 2014, and designer vulns like Heartbleed and Shellshock revealed cracks in the foundation of underlying libraries on nearly every common web platform
    - Crowd-sourced malware continues to mutate, resulting in new variants with expanding targets
    - App designer apathy is negatively impacting security on mobile devices.
    Join (ISC)2 and IBM to learn more about the findings of the latest IBM X-Force report and X-Force Interactive Security Incident website, designed to help users gain in-depth understanding of security breaches publicly disclosed over time.
  • While cost is a primary "c" driving the adoption of object-based cloud solutions in the life sciences, compute, capacity, and collaboration may all be bigger incentives. In this webinar, we'll examine how to use an Avere Hybrid Cloud NAS infrastructure to gain big benefits in areas like genomics research, personalized medicine, drug discovery, imaging, and other data analysis applications.

    • Compute - Building production environments in the compute cloud without rewriting existing applications

    • Capacity - Modernizing storage archives and disaster recovery by adding object storage for durability while leveraging existing on-premises NAS

    • Collaboration - Using the cloud t o safely and securely share data globally

    • Cost - Using cloud to lower overall costs to keep pace with fast-growing demands of research initiatives
  • The fun with IDS doesn't stop after installation, in fact, that's really where the fun starts. Join our panel of IDS experts for an educational discussion that will help you make sense of your IDS data, starting from Day 1. We will discuss signature manipulation, event output, and the three "P's" - policy, procedure and process. We won't stop there either! You'll find out the meaning behind the terms all the cool kids are using like "False Positives" and "Baselining". We'll round it out with more information about how IDS interacts with the rest of your IT applications and infrastructure. If you installed an IDS and are wondering what to do next then signup now!Asset Discovery - creating an inventory of running instances
    Vulnerability Assessment - conducting scans to assess exposure to attack, and prioritize risks
    Change Management - detect changes in your AWS environment and insecure network access control configurations
    S3 & ELB Access Log Monitoring - Monitor access logs of hosted content and data directed at your instance
    CloudTrail Monitoring and Alerting - Monitor the CloudTrail service for abnormal behavior
    Windows Event Monitoring - Analyze system level behavior to detect advanced threats
    We'll finish up with a demo of AlienVault USM for AWS, which delivers all of the above capabilities, plus log management & event correlation to help you detect threats quickly and comply with regulatory requirements.
  • For disaster recovery (DR), you’ve outsourced or virtualized your network, infrastructure, applications and telephony system. Your data is stored in multiple, secure locations, and you’re safe from hurricanes, tornados and blackouts. But what about a pumpkin-spiced latte?

    The desktop is the most overlooked and vulnerable link in your disaster recovery plan. Whether a device is disabled from a coffee spill, a hardware failure, theft or vicious malware, the result is the same: your employee loses access to her desktop, primary lines of communication, and user data. Productivity comes to a grinding halt. One computer, with one access, can snowball into a local or a global problem. You’re only one desktop away from disaster.

    There is a solution: virtualize the desktop. Join Michael McCracken, Director, Professional Services at Hosting, and Steve Prather, CEO of Dizzion, on May 14th, 2015 for a revealing look at how top planners are now integrating Desktop as a Service (DaaS). This 45-minute webcast is ideal for IT leaders, business risk and compliance professionals, and disaster recovery / business continuity planners.

    Attendees will learn:
    • The basics of Disaster Recovery and accessibility of your data
    • How to extend your DR strategy all the way to the desktop
    • DaaS deployment best practices
  • Your users demand access everywhere, any time, via any device. Whether it’s cloud or traditional on-premise applications, it’s critical that organizations provide access to those who need it while mitigating access risk and maintaining compliance. Join (ISC)2, Courion and the American Red Cross on May 14, 2015 at 1:00PM Eastern for an informative session that will show how the American Red Cross is addressing this issue with a strategy around provisioning, governance, federation, and single sign-on via a seamless and integrated IAM solution for managing cloud and enterprise access.
  • What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.
  • Even with the imminent end of support for Windows Server 2003 (W2K3), you may still be planning to continue running W2K3 in production. But with a never-ending stream of new exploits, vulnerabilities, and zero-day malware, how can you continue to maintain control and keep those systems safe and secure? (ISC)2 and Bit9 are hosting this webcast which will focus on looking at how to help prevent, detect and respond to advanced threats on endpoints and ensure continued compliance of W2K3 systems.
  • Technology can do amazing and complex things, especially in this day and age. But, sometimes modern technology can be applied to solve simple, relatable everyday challenges with fantastic results. Listen in to learn how today's cutting edge IoT & wearables technology can be deployed to drive significant business results including vast improvements in customer service, patient health care, and more. The opportunity is upon us to revolutionize service ethics across many industries in ways unavailable to us before IoT & wearables converged in these simple ways.

    Hear use cases in:
    • Restaurant/Hospitality
    • Healthcare
    • Manufacturing
  • Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.
  • La malnutrición es un problema general a nivel mundial, ya que las personas no consumen el nivel suficiente de nutrientes esenciales. A su vez, la obesidad se ha convertido en una preocupación creciente porque se consumen demasiados alimentos para el nivel de actividad. A este ritmo, la sociedad actual no podrá cumplir con los objetivos de la Asamblea Mundial de la Salud (WHA) 2025 en materia de nutrición y es esencial que los programas de nutrición se desarrollen aún más para mejorar la situación nutricional. La fortificación de los alimentos es una manera efectiva de producir alimentos altamente nutritivos y combatir la malnutrición y así lograr un mejor desarrollo socioeconómico. La industria de alimentos, bebidas y suplemento dietario cumple una función clave en la promoción de la nutrición de la salud pública al desarrollar opciones nutritivas, saludables y asequibles para los consumidores.

    En este seminario web informativo, el experto independiente Alfonso Valenzuela Bonomo junto con Hector Cori de DSM, director de Nutrition Science & Advocacy LATAM, debatirán sobre la necesidad de la colaboración entre sectores (gobierno, organizaciones civiles y empresas) para combatir la malnutrición.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.
  • This webinar will introduce the history, theory, basic techniques, and potential pit-falls of mammalian cell culture. It is designed for students and new lab technicians, as well as bench scientists interested in updating their techniques or knowledge in the field.

    Topics to be discussed include:
    • History and practical theories of cell culture and its impact on today’s science
    • The requirements needed to set up a cell culture laboratory
    • Challenges when performing mammalian cell culture and how to overcome them

    About our Presenter:
    Dr. Mark Rothenberg graduated from Emory University with his Ph.D. in Cell and Developmental Biology. Over the past 25 years, Mark has held positions in both academia and industry where he has developed an expertise in the areas of assay development and cell culture. He currently holds the position of Manager Scientific Training and Education with Corning Life Sciences.
  • Keeping Compliance in Check & Controlling Access Risk:

    Learn how one of the nation's largest health insurers provides access to users efficiently and effectively while also assuring that private constituent data is protected in compliance with HIPAA, HITECH and other federal and state privacy and security regulations. Join (ISC)2, Courion and Harvard Pilgrim Health Care on April 28, 2015 at 1:00pm Eastern to learn how the information security team is able to identify and remediate user access risks such as unnecessary privileged access, orphaned and abandoned accounts, and system or non-human accounts that call for administrative oversight.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • More than 100,000 information security professionals have invested time, effort and resources to achieve what has long been considered the Gold Standard security certification – The CISSP. Now that the security industry is growing and career trends are shaping the current job market, there is a bigger need to understand where the CISSP fits and what value it brings to any professional undertaking the path to become certified.

    During this panel session you'll hear different perspectives, including that of the hiring manager, recruiter and credential holders themselves around the following questions:

    - How is the CISSP viewed in the market place?
    - Which career paths are worth exploring with a CISSP?
    - What skillset does a CISSP have?
    - Is the CISSP a differentiator for a candidate?
    - How does the CISSP help the professional perform his job?
  • Host-based IDS systems, or HIDS, work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM features a complete integration of OSSEC, one of the most popular and effective open source HIDS tools.

    In this live webinar, we'll show you how USM helps you get more out of OSSEC with:
    Remote agent deployment, configuration and management
    Behavioral monitoring of OSSEC clients
    Logging and reporting for PCI compliance
    Data correlation with IP reputation data, vulnerability scans and more
    We'll finish up by showing a demo of how OSSEC alert correlation can be used to detect brute force attacks with USM
  • Regardless of the colour of the next UK government that emerges as a result of the May election, the £30-£50bn NHS budget chasm is the abyss that all the parties fear in respect of its thereat to quality health service delivery and re-election.

    With political backs to the abyss, no hostages will be taken. It is not unrealistic to expect a well co-ordinated and concerted offence by politicians and patient organisations alike on industry pricing of innovative speciality and rare diseases medicines:

    With this scenario in mind pharmaphorum is once again working with IMS Health to bring you expert insight into what this means for the UK health system and more specifically market access for specialist treatments in the post-election environment.

    Angela McFarlane, Senior principal IMS Health Local Market Access, Anthony Grosso, Principal Pharmacist at the National Hospital for Neurology and Neurosurgery and Sheela Upadhyaya, previously a NHS Senior Manager with over 17 years of experience in the delivery of services and in commissioning of highly specialised services for rare and ultra rare conditions, combine with pharmaphorum's Paul Tunnah to deliver an accurate analysis and frontline insight as to the already complex roadmap for access is about to change again.

    This one hour event will include analysis of informed predictions which include:

    The NICE HTA criteria will get tougher post end to end review (IMMTreV)
    NICE and the NHS England will join forces to streamline access pre/post NICE
    Risk at local level will be shifted to Providers under the new marginal tariff arrangements; which could indeed see a close to the CDF as the PbR excluded drugs list becomes a thing of a glorious past
    Provider baselines will take the strain of innovation - the tough decisions will be softened by a drive to really accelerate uptake of NICE approved medicines

    How can industry prepare for these changes in what is already a tough and complex environment?