Hi [[ session.user.profile.firstName ]]

Health IT

  • Audit Management for 2020 and Beyond
    Audit Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: May 16 2019 41 mins
    As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.

    Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.

    Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.

    In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:

    • What audit management encompasses
    • How your organization can gain efficiency from proper audit management
    • Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!
  • Practitioner’s Guide to Continuous Compliance & Audit Readiness
    Practitioner’s Guide to Continuous Compliance & Audit Readiness
    Danielle Russell, Group Product Marketing Manager; Caryn Seippel, Manager of Risk and Compliance Recorded: May 16 2019 58 mins
    Conducting internal audits is a security best practice and a common requirement for most compliance standards. Yet, the internal "audit season" can slow down business productivity to a grinding halt. This is especially a challenge for agile technology organizations that rely on continuous development and release schedules to drive business forward.

    By adopting a continuous compliance program, you can keep your innovation humming while ensuring that you are continually addressing important industry and regulatory demands and, more importantly, maintaining secure systems and processes.

    Join us for a special session with Caryn Seippel, Manager of Risk and Compliance at AT&T Cybersecurity, to learn:

    - What is continuous compliance
    - Practical steps to implement continuous monitoring
    - How AT&T Cybersecurity, a security company, adopted a continuous compliance program
    - How AlienVault USM Anywhere uses automation to help streamline continuous compliance
  • The Top Service Management Trends and Vendors for 2019
    The Top Service Management Trends and Vendors for 2019
    Thomas Mendel; Matt Klassen Recorded: May 16 2019 46 mins
    Service Management is evolving at the pace of the digital economy. Staying ahead of key trends could mean the difference between leader and laggard and has a direct impact on the ability for your IT department to meet the digital needs of the business.

    Join us for this eye-opening webinar featuring Research in Action’s Lead Analyst, Dr. Thomas Mendel Ph.D. with Cherwell’s VP of Product Marketing, Matt Klassen. They will discuss the results of a recent survey and research project targeting over 1500 global enterprises. Find out where Automation, Service Bots, Analytics and ITIL 4 fit into leading organizations Service Management strategies and how the top vendors compare with each other.
  • Paid and “Unpaid” Speaking Engagements
    Paid and “Unpaid” Speaking Engagements
    Jennifer Ellis Recorded: May 15 2019 60 mins
    In this enlightening webinar, Jennifer Ellis will uncover the truth about paid and unpaid (or "marketing") speaking engagements. She will also explain how you can find success with every booking – where everyone wins – the speaker, the event planner, and the audience.

    Join us and learn how to:
    •Successfully negotiate paid speaking engagements
    •Make the most out of marketing or “unpaid” speaking engagements (and learn how Jennifer’s clients have created more revenue from “unpaid” gigs than paid ones)
    •Discover how to let go of how it “should” be
    •Get more visibility through speaking engagements
  • Improve Your PCI DSS Management Effectiveness
    Improve Your PCI DSS Management Effectiveness
    Sam Abadir, Lockpath Recorded: May 15 2019 42 mins
    Payment Card Industry Data Security Standard (PCI DSS) pushes organizations to achieve six distinct goals in the aim of protecting payment systems from breaches and theft of cardholder data. The requirements supporting the goals force organizations to manage, govern and integrate different departments within the business including IT, security, compliance, risk, incident response, and policy management.

    Those managing this effort quickly realize that the effort to achieve the goals effectively and in a timely manner requires PCI DSS to be a day-to-day part of your business executed with purposeful coordination and immediate access to information to continuously assess the PCI DSS environment, remediate vulnerabilities and report required information.

    In this live webinar, Lockpath’s Sam Abadir will share what a PCI DSS solution looks like, including:

    • Best practices for effectively managing PCI DSS
    • How your organization can gain efficiency from proper a PCI DSS solution
    • Maintaining a strong vulnerability management program with PCI DSS
    • Advantages of managing PCI DSS solutions efforts on a Governance, Risk and Compliance or Integrated Risk Management platform

    Find out what you need to know to better manage your PCI DSS solution by attending this educational webinar. Register now!
  • Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Charlie Whelan, Vice President of Consulting, Transformational Health, Americas, Frost & Sullivan Recorded: May 14 2019 60 mins
    For most cities and states, the healthcare technology and biosciences sector is one of the most attractive industries of the future that can grow their communities. However, that attention attracts significant competition among players seeking to expand in a field that is highly complex. How should your community address this industry, and what is the best path to nurturing start-ups, retaining existing employers, attracting new companies and encouraging workforce development?

    Key Takeaways:

    • The healthcare technology and biosciences market is large and complex. Learn how the industry is structured and which segments might align best with your community.
    • Cities and states across the country are all competing to grow their own biosciences economies. Find out what types of programs and strategies are the most effective.
    • Come away with a simple model for assessing your own community’s strength relative to the healthcare technology and biosciences market.
  • Unsecured Networks and the Risks for Your Business
    Unsecured Networks and the Risks for Your Business
    Francis Bourke, Sales Engineer, Webroot Recorded: May 14 2019 14 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. It’s also capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    Additionally, DNS filtering allows admins to take back control of their network, secure all devices, prevent internet misuse, and improve productivity.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection protect against attacks while benefitting your business.
  • Insider Data Breach – Separating the Malicious from the Mistaken
    Insider Data Breach – Separating the Malicious from the Mistaken
    Sudeep Venkatesh, Chief Product Officer, Egress; Charles Moore, Opinions Matters; Spencer Wilcox, Brandon Dunlap (Moderator) Recorded: May 9 2019 56 mins
    According to a recent Ponemon Institute survey, the average data breach costs $3.8M, up 6.4% from 2017. When it comes to an insider data breach, 95% of IT leaders view this as a concern for their organization (statistic from 2019 Data Breach Survey from Egress Software and Opinions Matters). Employees can put sensitive data at risk by accessing or sharing without permission, just because they are “curious” or intrigued by the content. An insider data breach can be the most damaging, the most expensive and the most difficult to detect and stop. How can an organization deal with these insider data breaches? Join Egress Software and (ISC)² on May 9, 2019, at 1PM Eastern for a wide-ranging discussion on insider data breaches, the malicious and the accidental and what can be done to mitigate such occurrences.
  • Evolving your Passive Data Catalog into an Active Data Hub
    Evolving your Passive Data Catalog into an Active Data Hub
    Scott Gidley, Vice President of Product Management Recorded: May 8 2019 31 mins
    We all know that data is the lifeblood of a modern enterprise. But how can your business users action relevant, quality data into their applications for immediate value?

    The answer used to be “Build a data catalog”. Data catalogs have grown in popularity as an essential tool for understanding where your data exists and what it is. But, that’s only the first step – and an easy step at that! The harder part is giving your business users self-service access to understand THEIR catalog and enrich the data THEY need when THEY need it … and then allowing them to action it into their analytical or operational applications for rapid insights.

    Empowering the business: that’s where an “active data hub” differentiates from a “passive data catalog”.

    Join Scott Gidley, VP of Product Management from Zaloni, to learn how real world users are moving away from traditional data catalogs to embrace active data hubs, including:
    - How a unified data supply chain removes unwanted tooling and rapidly delivers real business value to departmental or line of business users
    - How business users can enrich their data themselves and action it into their business applications - with the right amount of governance and trust
    - Test yourself against the data hub maturity curve to determine where you are within your enterprise
  • Would You Take the Bait? Top Phishing Email Subjects Users Are Clicking On
    Would You Take the Bait? Top Phishing Email Subjects Users Are Clicking On
    Erich Kron, Mitchell Milligan, Justin Ong Recorded: May 8 2019 47 mins
    The greatest risk to the security of your company isn’t just hackers. It’s the users who let the bad guys get access to your network without even knowing it! Creating a security awareness training program that really works means training and phishing your users with real-world scenarios. You have to start phishing like the bad guys!

    In this Spiceworks Video Meetup we discuss KnowBe4’s most recent phishing benchmark report to see how you stack up across your industry, the latest trends in phish scams, and the power of effective new-school security awareness training.

    Here’s what we discuss:
    - Top email and social media topics to test your users on, and how to phish like the bad guys
    - Looking at phishing vulnerability by industry
    - How to develop and re-assess your security awareness training strategy to ensure your users create a human firewall
  • 5 Steps to Boost Your Digital Transformation with Service Management
    5 Steps to Boost Your Digital Transformation with Service Management
    Aria Naderi; Per Strand Recorded: May 8 2019 49 mins
    Essential to your Digital Transformation success is a modern Service Management strategy combined with a state-of-the-art approach to digital knowledge management. During this webinar you’ll learn how the integration of Enterprise Service Management with Knowledge Management can add tangible value to your business, and how the configurability, scalability and security capabilities of an integrated solution have a direct influence on your process and service efficiency. You will also learn how to quantify the ROI and the TCO of an integrated approach for your organization.

    If you’re seeking an easy-to-use integrated solution, see how Cherwell and ComAround make work flow.
  • Why Artificial Intelligence and Machine Learning are Key for MSPs
    Why Artificial Intelligence and Machine Learning are Key for MSPs
    George Anderson, Director of Product Marketing, Webroot Recorded: May 7 2019 57 mins
    As the volume, sophistication, and complexity of cyberattacks on SMBs grows, current IT security solutions must become more pro-active, automated, and effective in response.

    This presentation looks at how SMBs and MSPs can tackle these issues now and in the future, and equips them with the IT security expertise and technology they need to defend their clients while benefitting from market growth.
  • Pharmaceutical Hot Melt Extrusion A Cost Effective Method to Increase Solubility
    Pharmaceutical Hot Melt Extrusion A Cost Effective Method to Increase Solubility
    Dennis Douroumis, of University of Greenwich and Dr.-Ing Margarethe Richter, Pharma Application Specialist at Thermo Fisher Recorded: May 7 2019 59 mins
    Full Title: Employing Hot Melt Extrusion As a Cost Effective Method of Increasing Solubility Of Water Insoluble API’s
    • Identifying the appropriate excipients for HME processing of water insoluble drugs
    • Using novel excipients to achieve increased dissolution rates (Granulation)
    • Extrusion with polymeric carriers for the development of solid dispersions
    • Co-crystallisation of water insoluble drugs

    In the last 20 years Hot Melt Extrusion (HME) has seized the attention of pharmaceutical industry for the development of pharmaceutical solid dispersions. It is a versatile processing technology, which can effectively increase the solubility/dissolution of water insoluble active pharmaceutical ingredients (APIs). The processing of a wide range of materials including inorganic excipients, hydrophilic polymers or cocrystal formers renders HME advantageous compared to conventional formulation technologies. In this review article we discuss recent trends for increased solubility/dissolution of water insoluble actives by using HME and predictive tools for process optimisation.

    As a well-known process in polymer industry hot melt extrusion (HME) is approaching pharmaceutical manufacturing. HME allows innovative formulations of solid oral dosage forms. Its main advantage in pharmaceutical applications is the possibility to enhance bioavailability of a drug, i.e. to produce solid dispersions of the active pharmaceutical ingredient (API) in the polymer matrix. The main concern of the formulator is to achieve the appropriate release profile (immediate or sustained release) or improved bioavailability of the API. The presentation gives an introduction into HME technology as an alternative to spray drying. It includes several case studies related to HME for solid oral dosage forms. In addition to solid oral dosage forms hot melt extrusion (HME) can be used for novel delivery methods. The presentation gives an overview on possible applications including examples and case studies.
  • A New Approach to Managing "Identity Risk"
    A New Approach to Managing "Identity Risk"
    Focal Point Data Risk, Lockpath, SailPoint Recorded: May 2 2019 58 mins
    More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.

    So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.

    In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.

    In this webinar, attendees will learn:

    • The benefits of applying an integrated approach to identity risk
    • The key strategies for overcoming common identity risk management
    challenges
    • How to integrate enterprise systems to more effectively manage identity risk
  • How I got the CTO to pay for Open APIs
    How I got the CTO to pay for Open APIs
    Melissa Jurkoic, Senior Solutions Architect for Amadeus Hospitality Recorded: May 1 2019 48 mins
    Companies have been integrating their systems internally and externally via APIs for many years. APIs are not new, but the idea of them being openly accessible and available to be discovered by someone without your permission is indeed new for companies. Her company had dealt with integrating with partners for over 20 years, but this was necessary due to customer demand, and not seen as an opportunity to increase our reach or revenue. In order to convince C-level executives that there is an opportunity worth investing in, it is sometimes necessary to charge forward and create the outcome you need them to see.

    Using the experiences through this journey from integration to opportunity, this talk will explain how we achieved justification for an entire development team to be dedicated to delivering our future API strategy.

    Tips you’ll learn:
    •Not everyone will share your vision, but that doesn’t mean it’s not worth pursuing.
    •You can gain executive buy-in by creating the outcome you want them to see.
    •There is power in your personal network that will enable you to achieve your greatest goals.
  • New Paradigms in Healthcare: Cloud Ready with MSFT Azure and Informatica
    New Paradigms in Healthcare: Cloud Ready with MSFT Azure and Informatica
    Craig Darling, Health & Life Sciences, Microsoft and Richard Cramer, Chief Healthcare Strategist, Informatica Recorded: Apr 30 2019 56 mins
    Healthcare is a highly regulated industry. Before migrating data to the cloud, you must have the right measures and framework in place—including HIPAA and HITRUST—to protect healthcare information and other sensitive data. Replacing an established on-premises enterprise data warehouse (EDW) is not as simple as moving data from an on-premises database to a database in the cloud; healthcare IT organizations require an incremental, well-governed, secure strategy based on a specific provider’s needs to rapidly deliver business results while ensuring minimal disruption to existing applications and analytic workloads.
  • Five Tips for Securing and Managing your IoT environment with PKI
    Five Tips for Securing and Managing your IoT environment with PKI
    Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTO Recorded: Apr 30 2019 53 mins
    Learn how
    1. to use PKI for strong authentication, data encryption & code signing for IoT devices;
    2. to establish identities to IoT Devices with unique characteristics and manage those identities at IoT scale without human intervention;
    3. modern encryption techniques are used to establish a verifiable device identity and ensure that devices do not get compromised; and
    4. IoT IAM can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. to enforce identity and access through online AND offline authentication

    With over a billion connected devices worldwide, Internet of Things (IoT) security remains top concerns for companies of all sizes. The growth of ransomware and IoT-specific botnets such as Mirai and Reaper have heightened awareness and security concerns of IoT devices. Even though many organizations may not have been victimized by IoT security breaches yet, they must start assessing their IoT security strategy and how to leverage IoT IAM technologies to reduce IoT security risk.

    Join this webinar to learn how you can leverage Public Key Infrastructure (PKI) with the scalability and automation for strong authentication and data protection through encryption. We will explore how this is relevant for different industries including national and local Government, Education and Healthcare.
  • What's new in G-Cloud 11?
    What's new in G-Cloud 11?
    Nicky Stewart, Commercial Director at UKCloud Recorded: Apr 30 2019 14 mins
    Join our Commercial Director Nicky Stewart as she guides you through :
    - What's new in G-Cloud
    - Important G-Cloud Rules, Guidelines, Dates and Deadlines


    and much more..

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • The Webroot 2019 Threat Report
    The Webroot 2019 Threat Report
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Apr 29 2019 45 mins
    Each year, Webroot conducts extensive research on the current threat landscape. This webinar will present findings for 2019, which were also recently published in the Webroot 2019 Threat Report
    .
    A few of the key findings that will be covered, and their consequences explored, during this webinar include:

    -40% of malicious URLs were found on good domains
    -36% increase in the number of phishing attacks
    -93% of phishing domains offered an HTTPS site
    -54% of devices that got infected once were re-infected the same year
    -25 of the top recurring malicious IP addresses were reused 95 times

    Join Webroot security analyst Tyler Moffitt to learn about our threat discoveries and analysis, and to arm your business with the tools it needs to overcome modern cybercrime.
  • Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Augie Gonzalez, Director of Product Marketing, DataCore Software Recorded: Apr 25 2019 45 mins
    The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages.

    Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs.

    In this webinar you’ll become acquainted with:
    •Machine learning (ML) techniques that sense data temperature variations in real-time
    •Artificial intelligence (AI) methods used to dynamically migrate data accordingly, between primary, secondary and cloud storage from different suppliers
    •Relative distribution of storage tiers necessary for optimum savings
  • Optimize Your Third-Party Protection Program
    Optimize Your Third-Party Protection Program
    Bob Maley, Normshield; Tony Rock, Lockpath Recorded: Apr 25 2019 56 mins
    Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.

    In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.

    As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.

    Register now!
  • Are e-Signatures Legal in Europe? Understanding eIDAS
    Are e-Signatures Legal in Europe? Understanding eIDAS
    John Jolliffe, Strategic Engagement, Adobe Document Cloud. Recorded: Apr 25 2019 45 mins
    When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?

    Join our webinar, to learn:

    • Why e-signatures are essential to your company's success now and in the future.
    • Which three signature types are legal under eIDAS.
    • How to select the right approach for your business.
    • Next-gen e-Signatures and The Cloud Signature Consortium.
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Recorded: Apr 25 2019 30 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • What Keeps IT Pros Like You Up At Night
    What Keeps IT Pros Like You Up At Night
    Nick Cavalancia, Erich Kron Recorded: Apr 24 2019 63 mins
    When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. The problem is that cybercriminals are constantly evolving their tradecraft, becoming more daring, sophisticated, and successful at cyberattacks and making it increasingly difficult for IT to keep the bad guys out. 

    With so many possible issues for you to address, what do other IT pros like you really have a handle on and what’s keeping them lying awake at night?

    In this informative webcast, cybersecurity expert and Microsoft MVP, Nick Cavalancia, and Erich Kron, KnowBe4's Security Awareness Advocate, as they discuss the results of KnowBe4’s 2019 What Keeps You Up At Night Report.

    Topics include:
    - Attack Types
    - Security Initiatives
    - Compliance vs. Security
    - User-Related Issues
    - Resource Issues
    - Executive-Level Concerns
  • WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    Aria Naderi Recorded: Apr 24 2019 55 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • A Day in the Life - Tips and Best Practices from 3 CISSPs
    A Day in the Life - Tips and Best Practices from 3 CISSPs
    James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator) May 21 2019 2:00 pm UTC 60 mins
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • An Office Manager's perspective on HIPAA Compliance
    An Office Manager's perspective on HIPAA Compliance
    24By7Security, Inc,. May 21 2019 4:00 pm UTC 60 mins
    HIPAA requirements can be mind-boggling especially for smaller medical practices. Healthcare businesses of all sizes should comply with several requirements of HIPAA law. There are multiple components of the law involved, such as security, privacy and breach notification provisions. Hear directly from Lorri Doyle, Office Manager, Jacaranda Smiles, about her perspective on HIPAA compliance and how she went about it. Lorri has several years of experience working in a multi-location healthcare practice and will share her experiences and anecdotes related to HIPAA compliance, the challenges and its benefits.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World
    Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World
    Simon Hill, Chief Legal and Compliance Officer, Certes Networks May 22 2019 1:00 pm UTC 45 mins
    Handling lawful consent in GDPR is one area that can be especially tricky. Companies need to be particularly aware of new rights for consumers and notification requirements as these types of regulated responsibilities are not just limited to Europe. Any enterprise that provides a service whereby personal data is processed, are impacted by GDPR requirements.

    So, companies may think they have obtained sufficient consent regarding personal data and transparency only to find out that they have failed to obtain valid consent.

    In this interactive webinar, Certes Networks will cover:

    • What Did We Learn in 2018?
    • What is Important in 2019?
    • Getting Back to Basics
    • The Top Three Keys to Sufficient Consent
    • Case Studies

    On behalf of Certes Networks, we look forward to your participation.
  • GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world
    GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world
    Markus Grueneberg, GDPR Evangelist and Michael McGrath, Senior Director, Compliance and Digital Risk May 22 2019 2:00 pm UTC 45 mins
    According to the 2019 Cyber Security Breaches Survey conducted by the UK government, the number of data breaches suffered by businesses has declined over the last twelve months since the introduction of the EU GDPR.

    However, is this decline because of the changing threat landscape, is it due to investments in security controls that protect our people or has GDPR truly transformed the way businesses protect the privacy of consumer data?

    Join Michael McGrath and Markus Grüneberg as we discuss the impact GDPR has had one year on and the new challenges and opportunities it presents as we pass into the second year.
  • Advanced Models for 3D Cancer Applications
    Advanced Models for 3D Cancer Applications
    Audrey Bergeron, Applications Scientist May 22 2019 4:00 pm UTC 45 mins
    In recent years, three-dimensional (3D) cell culture models have been emerging as the preferred in vitro cancer model as they better mimic the in vivo tumor microenvironment. For instance, 3D cultures develop hypoxic cores and demonstrate gradients of soluble factors and a diffusion profile for drugs similar to solid tumors. Understanding the interactions between cancer cells and other cell types in the tumor microenvironment is also critical to predicting therapeutic efficacy.

    In this webinar, Audrey Bergeron will review:
    •An introduction to 3D cell culture
    •Assay techniques in spheroid microplates
    •Several 3D cancer models and technology tools used to better capture the complexity of the tumor microenvironment in assay-compatible formats.

    About the Presenter:
    Audrey Bergeron is an applications scientist for Corning Life Sciences. She evaluates new products and develops protocols and technical documents using Corning cell culture products. She also provides product training to Corning employees and customers, and assists technical services with customer support by helping to troubleshoot customer experiments.
  • To Pay AND Receive: Trends and Best Practices in Cross-Border Receivables
    To Pay AND Receive: Trends and Best Practices in Cross-Border Receivables
    Emily Watson, Director of Payments and Global Banking May 22 2019 6:00 pm UTC 60 mins
    The world is moving faster each day and both payers and business entities are demanding more of the way they both send and receive money. It is no surprise that in current global receivables there is a lack of transparency and the ability for an entity in one country to fully reconcile received funds with all the information they need.

    With the rise of mobile payments and more choices and options than ever before, join Flywire's Director of Payments & Global Banking Emily Watson for this session where she'll share her expertise and insights on market dynamics and trends in global receivables, including:

    -How to localize your payment experience
    -Best practices on enhancing FX capabilities
    -Payment types and what to expect for changes in payment methods to best serve your customer needs
    -Tips on structuring a global banking network

    It is a session not to be missed!
  • The Rise of Targeted Cyberattacks against SMBs and MSPs
    The Rise of Targeted Cyberattacks against SMBs and MSPs
    Kelvin Murray, Sr. Threat Research Analyst, Webroot May 28 2019 10:00 am UTC 60 mins
    Cybercriminals have long targeted MSPs, but in 2019 this trend reached worrying proportions.

    Learn about the key targeted cyberattacks MSPs have been facing this year and how best to protect your business—and your clients—from the damage they can cause.
  • Preparing for your journey to the Cloud – Assessment to Business Case.
    Preparing for your journey to the Cloud – Assessment to Business Case.
    Tim Lawrence, UKCloud & Mark Melvin, Shaping Cloud May 29 2019 10:00 am UTC 60 mins
    You have probably realised that your organisations needs to adopt multiple cloud services – but that’s a long way from where you are today. When facing a myriad of systems, technologies and contracts, how do you disentangle everything and turn your vision into an executable plan?

    This webinar, hosted by transition expert, Tim Lawrence and joined by Mark Melvin from Shaping Cloud , will guide you through this journey and help you choose the right destination.

    Agenda –
    •How cloud is not the answer to everything
    •Why the strategy and business case are critical to get the outcome you are looking for.
    •Customer Case Study
    •An overview of how cloud assessments are performed.


    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Cheating Death by PowerPoint: Slide Makeovers
    Cheating Death by PowerPoint: Slide Makeovers
    Laura Foley, Cheater of Death by PowerPoint May 29 2019 4:00 pm UTC 60 mins
    You’ve sat through boring presentations with terrible slides. But what makes these slides so hard to look at? And what can be done to improve them? Attend this webinar and learn about common slide design mistakes how to fix them. You’ll learn how the Analyze and Synthesize technique can be used to redesign problem presentations. At the end of this webinar, you’ll have a better understanding of how to create presentations that are simple, easy to understand and compelling!
  • The need for Automation
    The need for Automation
    Jon Morley May 30 2019 9:00 am UTC 30 mins
    Join Cherwell for a webinar outlining the need for and considerations of how to implement automation. As businesses look to streamline processes, there are several ‘quick wins’ to enhance efficiency within existing workflow, removing the need for resource to manage common, repetitive tasks and allow focus on shifting business priorities.

    In this session we’ll discuss:
    •What is Automation?
    •Why Automate?
    •Easy to apply Automation changes
    This webinar is intended as an introduction level to applying automation and is the first module in a series of webinars by Cherwell covering this topic.
  • Emerging technologies in Europe: The Digital Octopus' strategy
    Emerging technologies in Europe: The Digital Octopus' strategy
    Gabriele Roberti and Andrea Siviero May 30 2019 1:00 pm UTC 30 mins
    Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.

    In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:

    - How fast the different European industries are surfing the innovation wave?

    - What are the key digital use cases and associated business outcomes across European sectors?

    - What are the next-horizon technologies and their impact on different industries?

    - What a “Digital Octopus vertical strategy” is for handling multiple use cases and emerging technologies, and how to build one.

    Our webinar will help you charting out a solid vertical roadmap to address the most innovative and promising segments of the European technology market, while learning about real life end-user examples and preempting those emerging technologies that will reshape the future European business landscape.
  • IT Industry Outlook 2019
    IT Industry Outlook 2019
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Jun 4 2019 2:00 pm UTC 60 mins
    CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:

    • How the cloud, edge computing, and 5G form modern economic infrastructure
    • How IoT and AI are opening new doors for ambient computing
    • How distributed technology models challenge existing structures
    • How the business of emerging technology prompts sales channels’ reinvention
    • How partnerships are bridging gaps in the new tech ecosystem
    • How persistent tech personnel shortages are fueling new, creative staffing solutions
    • How global tech hubs shine the spotlight on the ingredients for innovation
  • How Cloud is transforming software businesses
    How Cloud is transforming software businesses
    Leighton James, CTO at UKCloud Jun 5 2019 10:00 am UTC 60 mins
    You’ve spent years developing a great application based on a unique domain expertise that addresses a particular niche. But the market is changing, new software providers are driving competition and customers no longer want to be responsible for software on-premises and want to consume it as a service, where you become responsible for the hosting, infrastructure and more flexible commercial model. So how do you take on this added burden and continue to deliver great solutions?

    Join our CTO Leighton James as he answers this question, guiding you through:
    - How Cloud is transforming the software business & enabling new opportunities
    - What SAAS is and why it matters to your customers
    - The growing opportunity for specialist software across UK Public Sector
    - Where to start and how UKCloud can help

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Livestream Video - CISO Challenges and How to Solve Them
    Livestream Video - CISO Challenges and How to Solve Them
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint Jun 5 2019 10:30 am UTC 45 mins
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • 5 Easy Steps to Connect and Secure IoT Devices
    5 Easy Steps to Connect and Secure IoT Devices
    Robert Dobson, Device Authority and Jon Hill, InVMA Jun 6 2019 3:00 pm UTC 60 mins
    Sign up to this webinar to learn:
    - How to connect your devices
    - Challenges of securing devices, applications and data, and how to overcome them
    - Real world examples of secure connected devices for Industrial and Healthcare

    IoT adoption has increased in recent years due to the benefits gained by organizations in almost every industry, just by connecting their devices to the internet. Connected sensors, actuators and edge nodes enable companies to pick up on inefficiencies and problems sooner and save time and money while supporting business intelligence efforts.

    In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency. In an industrial setting, IIoT is key to processes such as predictive maintenance, enhanced field service, energy management and asset tracking.

    The IoT has the potential to create a world where billions of devices can connect and communicate seamlessly. But bridging the gap between the digital and physical has proven harder than expected. Most deployments were brownfield and required technological, architectural, and organizational integration with legacy solutions.

    In addition, Security has turned out to be one of the greatest barriers to widespread IoT adoption. The good news is that we’ve come to recognize a secure by design approach as the most viable security option for organizations in IIoT, healthcare and smart connected products. Security architectures must be flexible and allow for multi-vendor collaboration. Ultimately, a security solution which prevents and protects against security attacks is better than a detect and respond method which many traditional IT security vendors offer today.
  • Digital Health Predictions and Trends—What to Expect in 2020
    Digital Health Predictions and Trends—What to Expect in 2020
    Mike Jude, Ph.D., Research Manager, Digital Health, Frost & Sullivan Jun 11 2019 7:00 pm UTC 60 mins
    Are you curious about how Digital Health will change through the end of 2020? Are you looking for new growth opportunities to capitalize on now to ensure a successful future?

    We invite you to attend the complimentary webinar, Digital Health Predictions and Trends—What to Expect in 2020, hosted by Mike Jude, Ph.D., Research Manager who will provide expert insight and predictions on new developments poised to help you build a growth pipeline. Insights will be based on the likely impact of technologies such as AI, Big Data, predictive analytics, and telemedicine, as well as evolving areas such as new billing practices and Femtech. Learn about real-world success stories as well as potential mistakes you will not want to make.

    Key Takeaways:
    • Learn what the digital health market potential is through 2020
    • Better understand which technologies and services will be the primary industry drivers in the short term
    • Identify growth opportunities in digital health
    • Explore the impact of new technologies and regulations on market potential
    • Gain insight on new approaches to achieve more efficient management of the healthcare process
  • Ensure Organizational Compliance with CCPA
    Ensure Organizational Compliance with CCPA
    Sam Abadir, Lockpath Jun 12 2019 4:00 pm UTC 60 mins
    The California Consumer Privacy Act (CCPA) is the first major U.S. privacy law to unfold. This law has interested other states in following suit, which may soon call for a national U.S. Privacy Law. Organizations are uncertain how to comply with CCPA, which takes effect January 1, 2020.

    In this live webinar, Lockpath’s Sam Abadir will share what preparation for CCPA compliance entails, including:

    • Protecting consumer data
    • Applying technology to processes
    • Managing multiple channels for consumers exercising their rights
    • Ensuring a fast response to breaches
    • Requirements of CCPA
    • Strategic approach to CCPA
    • Best practices for managing CCPA
    • Best practices for responding to privacy incidents

    As an attendee you’ll learn how to approach CCPA to prepare yourself for the new law in 2020 and set the foundation for other privacy laws as they impact your organization. Register now!
  • Webisode 1: 2019 Cyber Threat Landscape
    Webisode 1: 2019 Cyber Threat Landscape
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint Jun 12 2019 5:00 pm UTC 51 mins
    This year, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss:

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Orphan medicines launch excellence: sustaining launch success
    Orphan medicines launch excellence: sustaining launch success
    Peter Meeus, European Orphan Medicines, Sarah Rickwood, IQVIA, Angela McFarlane, IQVIA, Paul Tunnah, pharmaphorum Jun 13 2019 2:00 pm UTC 75 mins
    Launching orphan medicines excellently will become even more important over the next five years as more patients with rare diseases have pharmacotherapies available.

    There are also a growing number of disease-focussed registries, increasing public and policy maker awareness, and significant R&D investment in orphan drugs, as well as in digital technologies to support trials and treatment.

    But a new frontier of challenge faces orphan medicines companies as the gap between orphan medicines and mainstream specialty products narrows.

    To understand how to succeed in launching an orphan medicine in the coming years, companies must learn from past launches and apply an orphan medicines-focused launch excellence framework for success.

    This internationally relevant webinar will provide US and European examples to illustrate the ways in which the pharmaceutical market for orphan medicines is changing and how, consequently, launch strategies must evolve.

    This pharmaphorum debate, held in partnership with IQIVA, will also look at how pharmaceutical companies can optimise all the activities needed to take orphan medicines from clinical development to commercialisation, including:

    •Identifying the three fundamental challenges for orphan medicine launch excellence
    •Discussing the ways in which companies launching orphan medicines can learn from excellence in mainstream launches
    •Examining, in-depth, the specific areas of focus which are crucial for orphan medicines excellence.
  • AI-Driven EDR - The Machine Age of Information Security
    AI-Driven EDR - The Machine Age of Information Security
    Brian Robison, BlackBerry Cylance; Justin Silbert, LEO Cyber Security; Eric Walters, Burns & McDonnell; B. Dunlap Jun 13 2019 5:00 pm UTC 60 mins
    The historical evidence of rules-based solutions in the Endpoint Detection and Response (EDR) has proven that this approach is unable to keep up with the speed of the shifting threatscape. Join BlackBerry Cylance and (ISC)2 on June 13, 2019 at 1:00PM Eastern where we will explore how machine learning and artificial intelligence are closing the OODA (observe–orient–decide–act) loop on the attackers. We’ll also examine how you can gain an advantage over emerging threats, your time to respond and impact of artificial intelligence on security professionals.
  • Business Continuity Measures for Volatile Times
    Business Continuity Measures for Volatile Times
    Sander Puerto, Sr. Product Marketing Manager, DataCore Jun 13 2019 6:00 pm UTC 60 mins
    Every master plan is created to fulfill specific demands. But what if you did not consider one or two unpredictable factors? This webinar will provide insights to help you maintain business continuity by adapting to those inevitable, yet unforeseen turn of events.

    - Find out where your organization ranks within the Vulnerability Index
    - How to protect your BC/DR plans and avoid common storage pitfalls
    - Discover the new standard of BC/DR planning and stay future-ready
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jun 18 2019 3:00 pm UTC 60 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • Virtual Reality & Augmented Reality in Healthcare
    Virtual Reality & Augmented Reality in Healthcare
    VR/AR Association Jun 19 2019 5:00 pm UTC 90 mins
    The VR/AR Association Healthcare Committee will present the latest best practices and medical use cases for VR AR
  • Your processes are poor, and now you want to automate them?
    Your processes are poor, and now you want to automate them?
    Josh Caid Jun 20 2019 1:30 pm UTC 45 mins
    Garbage in, garbage out, or so the saying goes. If you get more efficient at garbage, then you too can have a bigger pile of garbage. Automation is an area where “work smarter, not harder” really comes into play. Let’s look at what some companies have done to avoid this.
  • Cyberattacks: Q2 Review and Emerging Trends
    Cyberattacks: Q2 Review and Emerging Trends
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Jun 25 2019 10:00 am UTC 60 mins
    With cybercriminals constantly innovating ways to steal information and monetise data, it’s crucial for businesses and MSPs to keep up to date on emerging cyber threat trends.

    Webroot is hosting a series of webinars every three months that aim to keep the industry informed on the latest threat trends and to review the top cyberattacks that hit businesses each quarter, as well as tips for staying safe in a complex threat landscape.

    Join Webroot as we discuss topics like:

    • Information theft and phishing attacks
    • Headline-grabbing breaches and the torrent of smaller ones that don't make the news
    • The evolution of ransomware
    • The theft, trade, and cracking of passwords