Hi [[ session.user.profile.firstName ]]

Health IT

  • Your Ransomware Task Force: Critical Steps for Responding to a Ransomware Attack
    Your Ransomware Task Force: Critical Steps for Responding to a Ransomware Attack
    Roger Grimes (KnowBe4), John Mullen (Mullen Coughlin) Recorded: Sep 25 2020 61 mins
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    To help you prepare for a rapid response Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, interviewed John Mullen, of Mullen Coughlin LLC, who is a seasoned, hands-on ransomware and data loss professional. John has served as a “Breach Coach” to thousands of affected organizations to help them contain and investigate ransomware attacks.

    In this session you’ll learn:

    - The number one mistake most ransomware victims are making today
    - When you need to call a “Breach Coach” and what they can do to help
    - Rapid response steps you need to take when your organization gets hit
    - Why new-school security awareness training is more critical than ever before
  • Your Ransomware Task Force: Extortion, Crisis Management and Recovery
    Your Ransomware Task Force: Extortion, Crisis Management and Recovery
    Roger Grimes (KnowBe4), Bill Hardin (Charles River Associates) Recorded: Sep 25 2020 59 mins
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    Watch this on-demand webinar where Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, interviews Bill Hardin of Charles Rivers Associates for an exclusive webinar, Ransomware Expert Guide: Extortion, Crisis Management, and Recovery. Roger and Bill take a deep dive into ransomware forensics and recovery to help you prepare for a rapid response before a ransomware attack affects your organization.

    In this session you’ll learn:

    - Of the thousands of cyber events Bill has investigated what is different in 2020
    - Tactics and techniques your security team can use to hunt within your environment
    - Bill’s top 3 takeaways regarding ransomware recovery
    - How to enable your users to spot suspicious attacks before they affect you
  • Your Virtual Stage Challenge - Create and Master a Talk That Converts
    Your Virtual Stage Challenge - Create and Master a Talk That Converts
    Suzanne Evans Recorded: Sep 25 2020 64 mins
    Are face to face sales still happening in 2020? Absolutely! If you are not doing them, you could be missing out on big money-making opportunities. Want to get noticed, become the expert and land amazing speaking gigs? It all starts with mastering your speaking strategy. New York Times Bestselling author, Suzanne Evans, will teach you how to stand out in a cluttered virtual world with a talk the wows your audience and leaves them begging to work with you. Suzanne will show you the science of success on how to gain expert status and become a sought after speaker with simple strategies you can put into action right away.

    You'll learn:
    - How to create an offer that people are excited to buy.
    - How to score speaking gigs that are the right fit for you.
    - How to gain great income from boosting your sales from the stage.
  • Zielscheibe Mitarbeiter: Wie sich BEC-Angriffe 2020 weiterentwickelt haben
    Zielscheibe Mitarbeiter: Wie sich BEC-Angriffe 2020 weiterentwickelt haben
    Markus Grüneberg, IT Security & Data Privacy Advisor bei Proofpoint Recorded: Sep 25 2020 55 mins
    Corona hat nicht nur Auswirkungen auf unser aller Leben, auch die Bedrohungslandschaft wurde durch das Virus stark beeinflusst. Das Proofpoint Threat Research Team hat in den letzten Monaten mehr und mehr zielgerichtete BEC (Business Email Compromise)- und EAC (Email Account Compromise)-Angriffe beobachtet, die mit der Angst vor Corona zu ködern versuchten.Nehmen Sie teil am Webinar mit Markus Grüneberg, IT Security & Data Privacy Advisor bei Proofpoint, wenn es um folgende Themen geht:

    Die aktuelle Bedrohungslandschaft
    Neue BEC Taktiken, die Lieferketten ins Visier nehmen
    Unterschiede zwischen BEC und anderen Taktiken wie Malware und Anmeldedaten Phishing
    Warum Cyberkriminelle sich für eine und nicht die andere Taktik entscheiden – ein psychologischer Exkurs.
  • 4社合同オンデマンドウェビナー: リモートワークにおけるゼロトラスト セキュリティ
    4社合同オンデマンドウェビナー: リモートワークにおけるゼロトラスト セキュリティ
    日本プルーフポイント (株) シニア エバンジェリスト 増田 幸美 Recorded: Sep 25 2020 60 mins
    2020年8月27日、セキュリティの各分野におけるベスト・オブ・ブリードである4社は、昨今のテレワーク環境におけるゼロトラスト セキュリティ戦略を実施する組織に向けに、統合したシンプルなゼロトラスト セキュリティの構築を支援できるよう連携することを発表しました。

    組織はテレワークへの急激な移行により、デジタルトランスフォーメーションを加速化させると同時に、セキュリティも担保しなければならないという難しい課題に迫られています。
    4社の連携は、いかに業務効率性を損なわずに、ゼロトラストをシンプルにスピーディに構築できるかに焦点をあてています。

    本オンデマンド・ウェビナーでは、各社のソリューション概要をご紹介し、4社の日本法人代表によるパネルディスカッションでは、テレワークに伴う課題をどのように乗り越えたか?また乗り越えるためにどういったことを実施したのかを中心にベストプラクティスを共有します。

    Product Introduction speakers:
    クラウドストライク (株) セールスエンジニアリング部 部長 鈴木 滋
    Netskope Japan (株)  カントリーマネージャー 大黒 甚一郎
    Okta Japan (株)  代表取締役社長 渡邉 崇
    日本プルーフポイント (株)セールスエンジニアリング部 部長 高橋 哲也

    Panelists:
    クラウドストライク (株) カントリー・マネージャー 河合 哲也
    Netskope Japan (株)  カントリーマネージャー 大黒 甚一郎
    Okta Japan (株)  代表取締役社長 渡邉 崇
    日本プルーフポイント (株)  代表取締役社長 茂木 正之

    MC:
    日本プルーフポイント (株) シニア エバンジェリスト 増田 幸美
  • Fünf Beispiele für erfolgreiche SOC-Modernisierung
    Fünf Beispiele für erfolgreiche SOC-Modernisierung
    Udo Götzen, Alexander Pilger, Angelo Brancato, Zachary Warren & Matthias Maier Recorded: Sep 25 2020 59 mins
    Veraltete IT-Security-Lösungen führen zu einer Vielzahl von Warnmeldungen. Dabei haben Sicherheitsteams aufgrund der Menge von Meldungen Mühe, die Spreu vom Weizen zu trennen und wirklich wichtige Bedrohungen genau zu erkennen. Kombiniert man dies mit Compliance-Vorschriften, Budget-Unsicherheiten sowie Personalmangel und Qualifikationslücken, wird schnell klar, warum Sicherheitsexperten nach neuen Lösungen suchen. Das ist auch der Grund, warum die Modernisierung des Security Operations Center (SOC) zur Maximierung von Produktivität und Effektivität für Unternehmen auf der ganzen Welt zur obersten Priorität geworden ist.

    Splunk-Kunden machen bei der Lösung dieses Problems riesige Fortschritte. Dieses Webinar vermittelt anhand realer Kundenberichte über die SOC-Modernisierung wichtige Einblicke und Erkenntnisse, die Splunk-Kunden während ihrer eigenen Transformation gelernt haben. Hierzu gehören:

    Warum Intel innerhalb seiner next-gen Security Operations Plattform eine gemeinsame digitale Arbeitsoberfläche für sein SOC-Team benötigte,
    Wie DATEV sein Security Operations Center mit Splunk und MITRE ATT&CK auf ein neues Level heben konnte,
    Wie Fresenius in seinem SOC umfangreiche Sicherheitsaufgaben automatisierte und den DAX der Cybersicherheit entwickelte,
    Wie Dachser KRITIS-Anforderungen löste und eine Integration mit dem BSI automatisierte
    Wie Swisscom Splunk zum Mittelpunkt ihres Computer Security Incident Response Teams machte.
  • Database Heroes - Power Up Simplicity and Speed
    Database Heroes - Power Up Simplicity and Speed
    Chris Paap & David Teague, Product Marketing, Database, Nutanix Recorded: Sep 25 2020 39 mins
    "Imagine simplifying and automating the time-consuming activity of database management with automated provisioning and copy data management.

    Nutanix Era builds on the hyper-converged infrastructure (HCI) to deliver a DBaaS environment, providing the best of both worlds: bringing the flexibility and operational simplicity of DBaaS without the restrictions of single-vendor solutions that are database, cloud provider, or location/deployment-specific. ​

    Join us the first of our deep dive series as we demonstrate provisioning with a database catalog and the capabilities of zero-byte clones and snapshots. Rescue your database operations from complex, time-consuming processes with simple one-click operations and get your weekends back!"
  • Live Demo: Leveraging Adaptive Security Controls with Isolation
    Live Demo: Leveraging Adaptive Security Controls with Isolation
    Neko Papez, Product Marketing Manager at Proofpoint Recorded: Sep 24 2020 32 mins
    When your people check personal email or web browsing at work, they can unintentionally introduce known or new threats into your organization. Learn how to leverage Proofpoint Isolation to provide adaptive security controls to users based on risk profile.

    Join us for a live demo as our experts dive into how you can lower your attack surface and protect your people against advanced threats. In this session, we’ll cover how to:

    - Stop cyber threats like drive-by downloads, malware attacks, and malicious email attachments
    - Integrate TAP URL Isolation to get real time phishing protection
    - Assign dynamic adaptive controls to better protect your workforce
  • How to Build Risk Based Authentication Program
    How to Build Risk Based Authentication Program
    Craig Cooper, COO & SVP of Customer Success, Gurucul Recorded: Sep 24 2020 32 mins
    CISOs are trying to deliver a frictionless user experience ease to support ongoing digital transformation initiatives while fending off cyberattacks and preventing data breaches. It is imperative to leverage cutting-edge technology with advanced cybersecurity capabilities to simplify secure user access to digital content.

    Gurucul offers machine learning behavior analytics and big data context to facilitate risk based authentication. As users access applications from any device, their behavior is continuously risk scored. Applications use this risk score to influence the user experience including authentication and authorization determinations.

    For example, low risk users accessing low risk assets are granted access automatically without having to enter passwords. Alternatively, high risk users accessing high risk assets will have to jump through flaming hoops - enter passwords, be challenged with MFA, request and obtain management approval, etc.

    Attend this webinar to learn how Gurucul's Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience.
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain
    Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain
    James McQuiggan Recorded: Sep 24 2020 59 mins
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • The Definitive Guide to Digital Onboarding
    The Definitive Guide to Digital Onboarding
    Kaylee Carlson Recorded: Sep 24 2020 28 mins
    With retention and productivity on the line, it is paramount that organizations offer the right technology and leverage the right tools to facilitate a streamlined onboarding process for remote and on-site employees.

    In our webinar, The Definitive Guide to Technology Onboarding, you’ll learn how to enable efficient technology onboarding workflows without sacrificing the user experience of new employees.

    We'll show you:

    What modern, user-centric technology onboarding looks like
    How to create a frictionless, zero-touch strategy
    Steps to prepare, purchase and deploy devices
    How to provide simple access to company resources
  • Current Bacterial Endotoxins Test (BET) and its Intended Use
    Current Bacterial Endotoxins Test (BET) and its Intended Use
    Karen Zink McCullough, Owner, Principal Consultant at MMI Associates and Veronika Wills, Manager, Technical Services Recorded: Sep 24 2020 110 mins
    Presented by Karen Zink McCullough, Owner, Principal Consultant at MMI Associates and Veronika Wills, Manager, Technical Services

    The Bacterial Endotoxins Test is not a test for pyrogens (fever causing agents). It is not a test for the presence of Gram negative bacteria. Based on extensive comparisons of endotoxins activity in the BET and fever rabbits executed in the 1970s and 1980s, we may say that the BET is a test for levels of Gram negative bacterial endotoxins activity that may be predictive of a fever in mammals.

    The various methodologies that are described in the harmonized in the harmonized chapter use the primary Reference Endotoxin Standard (RSE) or secondary Control Standard Endotoxin (CSE) to prepare assay standards, perform suitability testing as instructed in the chapter and inoculate positive product controls. These standards are relatively pure preparations of lipopolysaccharide. However, the utility of the compendial assay for non-compendial applications is limited. Our discussion will focus on the compendial uses of these BET assays.
  • Farenhyt, ¿Cómo diseñar en un complejo de varias edificaciones con HW?
    Farenhyt, ¿Cómo diseñar en un complejo de varias edificaciones con HW?
    Nelson Vargas / Gilberto Chavez Recorded: Sep 24 2020 53 mins
    Conoce de la mano de nuestro experto de qué forma puedes adaptar Farenhyt y sacar el mayor provecho de sus valiosas características desde la etapa de diseño. Brinda soluciones a tus clientes con edificaciones de diversos espacios como lo pueden ser complejos de edificios, hoteles de amplio metraje, centros hospitalarios de múltiples áreas, entre otros.
  • Esprits cybercriminels: L'évolution des attaques BEC pendant le confinement
    Esprits cybercriminels: L'évolution des attaques BEC pendant le confinement
    Loïc Guézo, Senior Director, Cybersecurity Strategy & Davide Canali, Threat Research & Detection, Proofpoint France Recorded: Sep 24 2020 42 mins
    En plus d'impacter notre vie quotidienne, la COVID-19 a également des répercussions considérables sur le paysage des menaces, toujours dominé par des attaques liées à la pandémie. L'équipe Proofpoint de recherche sur les cybermenaces a observé un nombre croissant d'escroqueries de type BEC (Business Email Compromise ou piratage de la messagerie en entreprise) et EAC (Email Account Compromise ou compromission de compte de messagerie) qui exploitent le thème du coronavirus. Elle a par ailleurs constaté un regain de sophistication dans les tactiques employées dans le cadre de la fraude aux virements bancaires.Rejoignez nos deux intervenants Loïc Guézo, Senior Director, Cybersecurity Strategy, et Davide Canali de l'unité Threat Research & Detection de Proofpoint France. Au programme :

    L'actualité des escroqueries BEC/EAC axées sur la COVID-19
    Les nouvelles tactiques BEC qui ciblent la chaîne logistique des entreprises
    Les différences entre les attaques BEC et les autres cybermenaces, telles que les malwares ou le phishing d'identifiant
    Une analyse des motivations guidant le choix de certaines tactiques d'attaque et de la psychologie cybercriminelle.
  • (ISC)² Info Session: SSCP - The Premier Security Administrator Certification
    (ISC)² Info Session: SSCP - The Premier Security Administrator Certification
    Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)² Recorded: Sep 24 2020 62 mins
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets.

    In this info-session, we will cover:
    - How large the cybersecurity workforce gap is today
    - The value of (ISC)² certification
    - What you will learn in training for the SSCP exam
    - What to expect from the SSCP exam
    - How to become endorsed and earn the SSCP certification

    And, get to ask any question that will support your certification journey.

    =====================================================================

    The SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures.

    More details >> www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your certification journey today!
  • A New Era of Database Support with Hyper-Convergence & Database-as-a-Service
    A New Era of Database Support with Hyper-Convergence & Database-as-a-Service
    Jeremy Launier, Director, Product Management, Nutanix Recorded: Sep 24 2020 15 mins
    Organizations realize that the secret to success lies in their data. All eyes are on database and the teams that build and manage them. From IT to DBAs, there is an acute awareness of the inherent issues that most databases face today ranging from complexity to performance, risk to cost. Imagine flipping this on its head, where the database becomes the engine of innovation – developers can start building their new app that same day, IT can reign in operational costs by up to 62% and DBA’s can get their weekends back with automated database operations and services.

    Learn how Nutanix’s unique database platform and modern database services combine to transform what you think is possible with your databases – and your data.
  • Delivering the bottom line, Realize the economic value of data.
    Delivering the bottom line, Realize the economic value of data.
    Bill Schmarzo, Chief Innovation Officer, Hitachi Vantara; Gordon MacMaster, VP of Analytics, Reliable Software Recorded: Sep 23 2020 45 mins
    Abstract: Data is the most valuable asset of a business. Unlike other assets, data not only never wears out or depletes, but it actually gains value (more accurate, more complete, more reliable). A systematic approach to data and analytics that recognizes data as an economic asset brings tremendous benefits, but more importantly cost savings!

    Hitachi Vantara and its strategic partner, Reliable Software, will share practical methods and advice on defining the value of data and how to realize that value in your organization.

    Join us for this fireside chat to see how to build out your organization’s data and analytic capabilities - one use case at a time. Realize the benefits of embracing the economics of data and analytics and how it can help deliver on your bottom line.
  • Protect Remote Workers Against Account Takeovers
    Protect Remote Workers Against Account Takeovers
    Abby Guha, Sr. Director, Product Marketing, Yubico Recorded: Sep 23 2020 49 mins
    Securing cloud applications and services with strong authentication

    Covid-19 quickly, and in many instances, drastically changed the way your employees work—creating a dependence on the cloud like never before. While workloads are much easier to scale and manage in the cloud than more traditional on-premises solutions, it introduces additional risks.

    With the rapid expansion of remote workers, across all types of organizations and industries, comes the requirement to secure their overall environments and workflows. Sensitive data that may have been accessed securely in tightly controlled office environments is now likely being accessed via less secure and shared home networks and devices.

    While employees may not be as diligent about security while from home, the sophistication of phishing attacks and other forms of account takeovers continues to rise. With data being stored and transmitted outside corporate networks, strong authentication should be considered essential to verify user identities before they can access sensitive information in the cloud.

    Attend this webinar to learn:
    - How to secure remote workers as they navigate work in the cloud
    - Why MFA should be a top requirement for supporting a distributed workforce
    - Best practices for securing remote workers against phishing and other cyber attacks
  • Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate Links
    Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate Links
    Roger Grimes Recorded: Sep 23 2020 61 mins
    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

    Join us for this webinar when Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, shows you how to become a rogue URL expert.

    He’ll dive deep into the latest techniques and defenses to share:

    - Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
    - Safe forensic methods for examining URLs and other tactics for investigating phishy emails
    - Strategies for dissecting URLs on mobile without clicking
    - Simple ways you can train your users to scrutinize URLs and keep your network safe
  • A New Era of Database Support with Hyper-Convergence & Database-as-a-Service
    A New Era of Database Support with Hyper-Convergence & Database-as-a-Service
    Jeremy Launier, Director, Product Management, Nutanix Recorded: Sep 23 2020 15 mins
    Organizations realize that the secret to success lies in their data. All eyes are on database and the teams that build and manage them. From IT to DBAs, there is an acute awareness of the inherent issues that most databases face today ranging from complexity to performance, risk to cost. Imagine flipping this on its head, where the database becomes the engine of innovation – developers can start building their new app that same day, IT can reign in operational costs by up to 62% and DBA’s can get their weekends back with automated database operations and services.

    Learn how Nutanix’s unique database platform and modern database services combine to transform what you think is possible with your databases – and your data.
  • A Modern Approach to MFA for Office 365 Users
    A Modern Approach to MFA for Office 365 Users
    Teju Shyamsundar, Senior Product Marketing Manager, Okta Recorded: Sep 23 2020 28 mins
    Migrating to Office 365 means housing your email and documents in the cloud. While this brings the huge benefits of not having to manage your own server infrastructure, it also brings on new challenges of needing to protect access to your corporate resources from any entry point.

    In this webinar, we'll discuss:

    - How an identity and access management solution helps secure your Office 365 deployment
    - The role of MFA in securing Office 365 weaknesses
    - Different MFA policies and balancing security with usability
  • Prowatch ® 5.0, grandes cambios para la nueva realidad
    Prowatch ® 5.0, grandes cambios para la nueva realidad
    Manuel Benavides Recorded: Sep 23 2020 70 mins
    En este webinar presentaremos la más reciente actualización de ProWatch® 5.0 Integrated Security Suite de Honeywell, plataforma de seguridad e integración para empresas y clientes de infraestructura crítica. Hemos actualizado muchas de sus características, proporcionando una solución integrada, robusta y global de control de acceso, videovigilancia y detección de intrusos para proteger personas y propiedades, optimizar la productividad y cumplir con las últimas regulaciones de la industria y reduciendo costos operativos.
  • Love your NAS. Set it free.
    Love your NAS. Set it free.
    Adam Carr - SE Director EMEA (Scality) & Richard Feltham- UKI Director (Scality) Recorded: Sep 23 2020 36 mins
    Do you wonder how often you access data from your expensive NAS?

    Studies show that most of data is inactive. How much space on your NAS is occupied by dormant data?

    Find out how Scality NAS Archiver makes it easy to identify and migrate inactive

    data automatically and transparently to Scality RING, freeing-up

    premium primary storage capacity while cutting down overall

    backup and operating costs.
  • Think Like a Hacker: Learn How to Use OSINT to Defend Your Organization
    Think Like a Hacker: Learn How to Use OSINT to Defend Your Organization
    Rosa Smothers, SVP of Cyber Operations at KnowBe4 Recorded: Sep 22 2020 57 mins
    In today's digital age we are surrounded by massive amounts of data every day. This makes it ridiculously easy to gather shockingly detailed information about anyone… even your organization. Bad actors use open source intelligence (OSINT) techniques to gather this inside knowledge and create attacks your users will click on. No one knows this better than former CIA Cyber Threat Analyst and Technical Intelligence Officer, Rosa Smothers. But she can show you how to use OSINT to turn the tables on the bad guys and regain the upper hand.

    Join us as Rosa, now KnowBe4's SVP of Cyber Operations shares her insights on how to leverage OSINT to defend your organization and think like a hacker!

    Rosa will show you:

    How to go beyond general OSINT techniques to gather the details you need for effective investigations

    Apps and analytic techniques that enhance your research and data interpretation

    Live demonstrations of OSINT gathering techniques you can use before the bad guys do

    How training your users to understand OSINT and their digital footprint can protect your organization from threat actors

    Learn how to use hackers' best techniques against them!
  • You've Got Humans on Your Network!
    You've Got Humans on Your Network!
    Joanna Huisman (KnowBe4), Dr. Christopher Pierson (BlackCloak), Trip Hillman (Weaver), Tom Bechtold (SecureWorld) Recorded: Sep 22 2020 71 mins
    They are all over your network doing all sorts of things with company data. Most of them are doing exactly what they are supposed to be doing. Nothing new to report there but do you know who they all are? Should they have that level of access? Why is Carol in accounting downloading 1 TB of data? Did John in sales just send the competitors a price list? When is the last time you REALLY did some security awareness training besides that one video you sent 6 months ago?

    Now people are working from home. Who is using this corporate device? Where did this Chromebook come from on the network?

    We have a lot of questions and a lot of work ahead of us as it relates to the human element and Information Security. Some say there is are technical controls we need to put in place. Some say it is merely adopting a company culture shift toward security. The truth is probably somewhere in the middle. Bring our panelists your questions and let’s help our end-users!
  • Novel Trial Approaches for Rare Cancer Patients
    Novel Trial Approaches for Rare Cancer Patients
    Rupa Doshi, PhD, Executive Director – Program Strategy, Oncology and Sameena Sharif, PhD, Senior Vice President, Product Stra Sep 28 2020 2:00 pm UTC 58 mins
    Best practices for managing ongoing cell and gene therapy trials
    Rare cancers account for 22 percent of cancer diagnoses worldwide, yet there is no universally accepted definition for a “rare” cancer. Moreover, with the evolution of genomics and associated changes in categorizing tumors, some common cancers are now characterized into groups of rare cancers, each with a unique implication for patient management and therapy.

    This shifting paradigm may well underestimate the incidence of rare cancers, and further underscores the need for innovative approaches in developing new therapies. Challenges include patient access, biomarker testing requirements, selecting the right endpoints, developing alternative study designs that minimize sample size and improve data outcomes, and an ever-changing regulatory landscape.

    This webinar will explore the promise and challenges associated with the planning and execution of rare cancer trials.
  • Strategies to Overcome Low Endotoxin Recovery Using the Conventional LAL Assay
    Strategies to Overcome Low Endotoxin Recovery Using the Conventional LAL Assay
    Ruth Daniels, Senior Scientist, Microbiology Expert, Janssen and Kevin Williams Microbiological Test Development, bioMérieux Sep 28 2020 2:00 pm UTC 120 mins
    Presented by Dr. Ruth Daniels, Senior Scientist - Microbiology Expert at Janssen

    This webinar presentation will discuss:

    • Endotoxin hold time studies to identify LER
    • In silico assessment of interfering factors and associated LER mitigation strategies
    • Case study: optimization of product-specific LAL assay to overcome LER

    Followed By A Presentation From Kevin L. Williams, Microbiological Test Development at bioMérieux
  • Cell Press细胞出版社介绍及研究者资源分享
    Cell Press细胞出版社介绍及研究者资源分享
    Head of Strategy and Partnership in Greater China, Cell Press/Senior Scientific Editor, Cell Sep 29 2020 1:00 am UTC 90 mins
    与Cell(《细胞》)资深编辑谭家颖博士一道,了解Cell Press细胞出版社的创新之路,以及我们在多学科领域的发展和不断拓展的开放获取出版战略。

    你可以了解更多关于Cell Press细胞出版社为支持研究群体发展而提供的各类产品与服务,包括网络研讨会、Cell Mentor、Sneak Peek(先睹为快)、STAR Methods、STAR Protocols和更多可以帮助科研工作者和研究机构快速发展,并助力其在世界科研领域提升影响力的新项目。

    我们期待通过网络研讨会与您互动,回答您关于Cell Press细胞出版社的所有问题。在Cell Press细胞出版社,我们做的所有事情都是为了推动科研进步——不管是与作者携手合作,不断优化同行评议流程,还是推动出版领域的创新。我们将科学放在第一位。科学终将推动人类社会进步。

    您可以通过如下网址收看网络研讨会(会议语言为英文):
    https://www.brighttalk.com/webcast/16651/381846

    您也可以带上您的同事和朋友,一起与谭家颖博士加入这场网络研讨会,收获更多。
  • Stoppez les menaces avant qu’elles n’atteignent votre réseaux ou vos terminaux
    Stoppez les menaces avant qu’elles n’atteignent votre réseaux ou vos terminaux
    Jerome Bachelet, Senior Solutions Engineer Carbonite + Webroot Sep 29 2020 8:00 am UTC 45 mins
    Pour sécuriser avec précision les entreprises, vous avez besoin d'une approche multicouche à la sécurité des données, avec une protection au niveau du réseau et des terminaux. Rejoignez notre webinaire de 45 minutes où nous présentons nos solutions cloud de nouvelle génération pour sécuriser le réseau au niveau DNS et protéger les terminaux contre les attaques multi-vecteurs. Découvrez comment Webroot peut vous aider à être plus cyber-résilient.

    * DNS Protection
    * Endpoint Protection
    * DNS filtering controls benefits
    * Maximum security
    * Maximum privacy
    * Cyber Resilience
  • G-Cloud 12: Transforming legacy environments and delivering customer outcomes
    G-Cloud 12: Transforming legacy environments and delivering customer outcomes
    Andy Webb, Director of Products and James Maynard, Solution Director - UKCloud Sep 29 2020 1:30 pm UTC 60 mins
    In this webinar, Andy Webb, Director of Products, and James Maynard, Solution Director, will discuss how as a Crown Commercial Service (CCS) strategic supplier of multi-cloud services to the UK Public Sector, UKCloud’s G-Cloud 12 portfolio provides even more choice and options, secure solutions, and expert support to help public sector organisations navigate the journey to cloud.
  • Introducción a paneles S3 y E3 de Gamewell
    Introducción a paneles S3 y E3 de Gamewell
    Martin Saravia Sep 29 2020 2:00 pm UTC 60 mins
    ¿Tienes proyectos pequeños, medianos o grandes de protección contra incendio? ¿Se te haría más fácil especificar con una sola marca que cubra las diferentes necesidades de cada tamaño, brindando la solución indicada a tus clientes? Te invitamos a conocer nuestros paneles Gamewell S3 y E3, dos líneas con una oferta robusta entre las que se encuentran soluciones para todo nivel de necesidades de conectividad, administración del panel, audio-evacuación, entre muchas otras características más.
  • Top Trends to Protect Your Servers and Business with Centralized Infrastructure
    Top Trends to Protect Your Servers and Business with Centralized Infrastructure
    Amit Sharma, Director of Product Marketing at Splunk & Jason Odden, IT Evangelist at Splunk Sep 29 2020 2:00 pm UTC 38 mins
    The upheaval caused by the global pandemic has made it significantly more challenging to monitor your IT infrastructure, and also significantly more important to do it effectively. With employees working from home, or in a hybrid environment where some are at home and some in the office, the level of complexity—and potential risk—has skyrocketed. Add in an element of economic uncertainty, and the potential damage from an outage becomes even greater.

    It’s not easy finding and fixing underlying server issues even when you’re onsite. Traditional monitoring tools are often siloed and difficult to scale, and they weren’t built for a hybrid environment. Without effective monitoring, you risk costly outages, lost productivity and frustrated customers. It’s never been more vital to have an effective and dependable IT monitoring solution in place.

    Watch our On-demand webinar, ""Top Trends to Protect Your Servers – and Your Business – with Centralized Infrastructure Monitoring"" to learn:

    Top trends for maximizing IT performance with a centralized infrastructure monitoring strategy
    Practical tips for optimizing the performance, uptime and health of your IT environment
    How to get end-to-end visibility across your IT infrastructure to prevent outages before they happen
    What to look for when evaluating IT monitoring tools
  • Epithelial Barrier Homeostasis and Response to Infections
    Epithelial Barrier Homeostasis and Response to Infections
    Dr. Francesco Boccellato Sep 29 2020 2:00 pm UTC 60 mins
    The forefront of the gastrointestinal mucosa consists mainly of a continuous polarized epithelial monolayer protected by mucus. This strong defense barrier can be colonized by pathogens arousing a chronic inflammatory state. This exceptional colonization ability is associated with an increased risk of developing adenocarcinomas at the sites of infection. We have regenerated functional epithelial monolayers in vitro. These mucosoid cultures are human multi-lineage stem cell-based in vitro-equivalent of a real mucosa. They mimic the function of a homeostatic epithelial barrier including accumulation of mucus on the apical side. Use of human mucosoid cultures reveals novel insight into epithelial homeostasis and response to bacterial infection.

    About the presenter:
    Dr. Francesco Boccellato studied at Sapienza University of Rome. Ever since he was a student, he's been interested in the impact of pathogens in causing cancer in humans. During his Ph.D. in Rome, he studied the role of the Epstein - Barr virus (EBV) in deregulating microRNAs in diffuse large B cell lymphomas. After his Ph.D., Francesco moved to Berlin to the Max Planck Institute for Infection Biology, were he became interested in the causality of bacterial infection in human cancers. To study the impact of infection on healthy epithelial barriers Francesco invented a new cultivation systems for healthy epithelial cells called the mucosoids. The mucosoids are monolayers of polarised epithelial cells that recapitulate all the functions of an epithelial barrier in the body, including mucus production. Francesco recently started his independent group in the University of Oxford (UK) at the Ludwig Institute for Cancer Research.
  • Hooked in: Staying safe from phishing while WFH
    Hooked in: Staying safe from phishing while WFH
    Ken Thon, Security Awareness Sales Engineer @ Carbonite + Webroot, an OpenText company Sep 29 2020 3:00 pm UTC 60 mins
    Working from home is becoming the new normal. How can companies keep up while still managing their cybersecurity effectively? The truth of the matter is that you can invest large sums of money into security solutions such as next-generation firewalls and other protective tools, however, should one of your employees innocently click on a link that is malicious the cybercriminal can gain access to your systems. Especially now in the time that business will be adopting the hybrid model of work, it is more important that ever to keep employees trained and aware.

    Ken Thon from security experts at Webroot will take you through:

    • The Hybrid work model: What can slip through the cracks.
    • Common entry points and mistakes made by end users
    • Benefits of a cyber awareness programme
  • What SD-WAN means for your cybersecurity program
    What SD-WAN means for your cybersecurity program
    Mary Blackowiak- Lead Product Marketing Manager, Chris Johnson -Technical Product Manager, Greg Mohr- Senior Product Manager Sep 29 2020 4:00 pm UTC 56 mins
    Software Defined Wide Area Network or SD-WAN is a virtualized approach to networking that elevates network traffic management away from hardware and premises, to next-generation software in the cloud for enhanced agility, centralized control, and visibility. Organizations of all shapes and sizes are taking advantage of SD-WAN in order to modernize their networks, reduce latency, lower costs, and prepare to support future business initiatives.

    But what does it mean for your cybersecurity program?

    Join this webinar to discover:

    Why SD-WAN forces organizations to rethink their cybersecurity architecture
    Solutions to unify protection across office-based and mobile users
    How to navigate the many security products that are available
    You will also have the opportunity to see a live demo from AT&T Cybersecurity managed security services that helps to continuously protect your critical assets as you evolve your network with SD-WAN technologies.
    Register today.
  • COVID-19's Role in Federal Policy and the Upcoming Election
    COVID-19's Role in Federal Policy and the Upcoming Election
    Blair Childs, SVP Public Affairs, Premier, Inc. and Brian Lane, President & CEO, The Center for Health Affairs Sep 29 2020 5:00 pm UTC 60 mins
    This episode will feature a dynamic discussion with Blair Childs, senior vice president for public affairs at Premier Inc., about the upcoming 2020 United States presidential election and how the policy platforms of the two major parties will help shape the future of the healthcare supply chain.

    Childs will also address lessons learned within the supply chain during COVID-19, the current needs of suppliers and recommendations for consumers and leaders to help make positive change for the healthcare supply chain.
  • How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery
    How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery
    Augie Gonzalez, Director of Product Marketing, DataCore Software Sep 29 2020 5:00 pm UTC 40 mins
    Shifting weather patterns across the globe force us to re-evaluate data protection practices in locations we once thought immune from hurricanes, flooding and other natural disasters.

    Offsite data replication combined with advanced site recovery methods should top your list.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services that continuously replicate data, containers and virtual machine images over long distances
    • Differences between secondary sites you own or rent vs. virtual destinations in public Clouds
    • Techniques that help you test and fine tune recovery measures without disrupting production workloads
    • Transferring responsibilities to the remote site
    • Rapid restoration of normal operations at the primary facilities when conditions permit

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • Tycoon Ransomware and Zero Trust Threat Prevention
    Tycoon Ransomware and Zero Trust Threat Prevention
    Steve Struthers, BlackBerry; Konrads Klints, KPMG Singapore Sep 30 2020 4:00 am UTC 60 mins
    The BlackBerry Research and Intelligence team in partnership with KPMG’s Cyber Response Services team recently unearthed and named a new ransomware strain written in Java. The researchers have dubbed the ransomware “Tycoon.”

    Tycoon is a multi-platform Java ransomware targeting Windows® and Linux® that has been observed in-the-wild since at least December 2019. It is deployed in the form of a Trojanized Java Runtime Environment (JRE) and leverages an obscure Java image format to fly under the radar.

    The threat actors behind Tycoon were observed using highly targeted delivery mechanisms to infiltrate small to medium sized companies and institutions in education and software industries, where they would proceed to encrypt file servers and demand a ransom. However, due to the reuse of a common RSA private key it may be possible to recover data without the need for payment in earlier variants.

    Join BlackBerry, KPMG and (ISC)² on Sept 30, 2020 (Wed) at 12p.m. (GMT +8) to learn the latest Ransomware trends and threat prevention, with case studies on what should be the main defence in the modern ransomware attacks.

    Presenter: Steve Struthers, VP, Global Solutions & Alliance, BlackBerry
    Presenter: Konrads Klints, Director of Cyber Security and Incident Response, KPMG Singapore
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Introducing the New Cell Press Title: Med
    Introducing the New Cell Press Title: Med
    Med Sep 30 2020 7:00 am UTC
    Med, a new journal from Cell Press, publishes transformative, evidence-based science across the clinical and translational research continuum – from large-scale clinical trials to translational studies with demonstrable functional impact, offering novel insights in disease understanding.

    We aim to elevate the global standard of medical research by accelerating translation of bench research to the clinic, serving as a hub for engagement between all stakeholders, improving reproducibility, and changing medical practice.
  • Normativa en Data Centers  NFPA 72, NFPA 75, NFPA 76, NFPA 2001, ICREA y ANCI
    Normativa en Data Centers NFPA 72, NFPA 75, NFPA 76, NFPA 2001, ICREA y ANCI
    Oscar Salazar Sep 30 2020 2:00 pm UTC 60 mins
    Conoce de la mano de nuestro experto las normas que rigen el diseño e implementación de una solución de detección de incendio en un edifcio de Data Center. Hablaremos de la normativa que aplica tanto para la zona blanca como para los alrededores de la misma. No te lo pierdas, en él podremos resolver tus dudas y podrás conocer cómo Honeywell y XTRALIS lideran la vanguardia en la tecnología para esta vertical.
  • Internet of Medical Things: What is it and how do you secure it?
    Internet of Medical Things: What is it and how do you secure it?
    Paul de Curnou and Julio Merette, Device Authority Sep 30 2020 3:00 pm UTC 30 mins
    The Internet of Medical Things is a blend of medical devices and applications that can improve healthcare outcomes. Discover how and why healthcare leaders are prioritizing the biggest IoMT business opportunities. Learn how medical IoT is transforming the healthcare industry and how to protect your organization against cyber attacks.

    Join our webinar to learn more about:
    • What is the Internet of Medical Things or Healthcare IoT?
    • What are the challenges and risks?
    • Real world examples

    There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
  • Bad Bots are Striking Back and Ruining the Internet
    Bad Bots are Striking Back and Ruining the Internet
    Edward Roberts, Director, Product Marketing, Imperva and Amy DeMartine, VP, Research Director, Forrester Sep 30 2020 5:00 pm UTC 54 mins
    One in every four web requests is a bad bot looking to hurt your business. From price scraping to credential stuffing, bots are all over your website and mobile app. In today's environment, bad bots are also trying to legitimize their behavior. Data from Imperva's annual “Bad Bot Report,” prepared by its threat researchers, will explain what bots are doing and why you should be concerned.

    Join Imperva and a leading Forrester Analyst to learn more about the bot problem and understand the latest data from the Bad Bot Report 2020.

    Key takeaways will include:
    •How Forrester sees the bot problem and the solutions available to you.
    •The current state of the bot landscape supported by data from Imperva’s annual “Bad Bot Report 2020”
    •Why bot operators are actively trying to rebrand
    •How to enhance security and protect against bad bots with an Advanced Bot Protection solution
  • Privacy's Increasing Role in Cybersecurity: A View from Spirion and the IAPP
    Privacy's Increasing Role in Cybersecurity: A View from Spirion and the IAPP
    Bob Lewis, IAPP, Cathy Scerbo, IAPP, Scott Giordano, Spirion, Brandon Dunlap (Moderator) Sep 30 2020 5:00 pm UTC 60 mins
    Every organization today is in some state of digital transformation. While the understanding of security needs in the digital age has matured significantly in the last 2 decades, the implication for data privacy and in particular, its interaction with security, are still not well understood. As data regulations and laws continue to evolve, here in the U.S. and globally, organizations require increased understanding of privacy requirements and their impact to technology solutions. Join IAPP and (ISC)2 on September 30, 2020 at 1:00 p.m. Eastern as Bob Lewis and Cathy Scerbo from IAPP, along with Scott Giordano from Spirion, will share the evolution of privacy, discuss key privacy topics like Privacy by Design and the NIST Privacy framework, share their perspectives of the overlap between Security and Privacy and highlight the criticality of understanding the current implications of data privacy today.
  • CMMC: Recommendations to navigate the new Cyber Certification requirements
    CMMC: Recommendations to navigate the new Cyber Certification requirements
    Jeff Phillips(Yubico) Gregory Abrenio(Cyber Armed) Jeremy Haynes(ID.me) Dr. Chris Edwards(Intercede) Sep 30 2020 5:00 pm UTC 60 mins
    Join Cyber Armed, ID.me, Intercede, and Yubico for a roundtable on key recommendations to navigate and get started with Cybersecurity Maturity Model Certification (CMMC).

    Defense Industrial Base (DIB) partners and contractors need to meet the Department of Defense’s (DOD) new CMMC to bid on future procurement, but what does CMMC compliance entail?

    The roundtable will focus on:
    1. CMMC levels and domains to pay attention to in relation to Identity and Access Management, including Access Controls and Privileged Access
    2. Steps to take to adapt current projects and practices to meet specific CMMC level compliance

    Confidentiality and Data Processing:
    The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc., its Affiliates, and its Works with YubiKey partners: Cyber Armed Security, ID.me, Inc., and Intercede Ltd. Any personal information submitted in this form will be used by Yubico, Inc., its Affiliates, Cyber Armed Security, ID.me, Inc., and Intercede Ltd for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained by Yubico only as needed in accordance with Yubico data retention practices. Works with YubiKey partners will retain your personal data only as needed and in accordance with the respective data retention practices of each Works with YubiKey partner. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the respective privacy policies of the listed companies for more information about their privacy practices.
  • Ghost Hunt: How to Find and Secure SSH Keys in Your Network
    Ghost Hunt: How to Find and Secure SSH Keys in Your Network
    Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, & Sami Van Vliet, Principal Product Manager Sep 30 2020 5:00 pm UTC 60 mins
    IT and DevOps teams routinely use SSH keys to automate secure access to servers, yet there’s little to no control over how they’re generated or used. Unlike SSL certificates, SSH keys don’t expire. So what happens? Ghost (or inactive) SSH keys lay dormant and unmanaged on the network, creating potential backdoors for hackers to infiltrate critical servers.

    Do you know where your SSH keys are hiding? Who you gonna call?

    Join Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, and Sami Van Vliet, Principal Product Manager, as they discuss all you need to know about SSH keys, and how to find and manage them effectively, including:

    - How unprotected SSH keys create risks and audit challenges
    - Why now? Emerging risks of SSH key sprawl and attacks
    - 5 best practices for SSH key protection and management
  • Cloud-Native Analytics Driven XDR Drives Better Threat Detection & Response
    Cloud-Native Analytics Driven XDR Drives Better Threat Detection & Response
    Jeff Pollard, VP and Principal Analyst Serving Security & Risk Professional, Forrester & Nilesh Dherange, CTO, Gurucul Sep 30 2020 5:00 pm UTC 60 mins
    Cyber attacks. Unauthorized access. Misuse. It's not a matter of if your infrastructure and data
    will be attacked – it's a matter of when. XDR delivers the extended detection and response capabilities you need to defend against the most advanced threats.

    Join Gurucul for a deep-dive into XDR. Nilesh Dherange, Gurucul's CTO will host guest speaker Jeff Pollard, VP and Principal Analyst Serving Security & Risk Professionals at Forrester.

    Nilesh and Jeff will discuss the key areas of XDR:
    • How XDR Changes Things for CISOs and Security Teams
    • Continuum of SIEM to Security Analytics to XDR
    • Detection & Response Overview
    • XDR – A Bottom Up Approach
    • The Impact to Workflow
    • Introducing the Gurucul Cloud-Native Analytics Driven XDR Platform

    Attend this webinar to understand how to integrate endpoint, network, and application telemetry for
    real-time threat detection. Automate detection logic with MITRE ATT&CK mapping across the entire killchain. Triage activity, access, and transaction data for a holistic view of threat indicators. Transform unified telemetry data into risk prioritized alerts. And automate response actions with risk-based triggers and orchestration playbooks. Attend this webinar to learn more about the converging space of XDR and Security Analytics.
  • Nutanix & EUC Vision: Empower Your EUC Initiatives
    Nutanix & EUC Vision: Empower Your EUC Initiatives
    Nikola Bozinovic, Kees Baggerman Sep 30 2020 6:00 pm UTC 30 mins
    "I love my slow, complex, and insecure applications!" – said no one, ever.

    Learn why over 50% of organizations are empowering their end users to work from anywhere, on any device, at any time and ensuring secure, consistent access to apps and data beyond the office. Nutanix is here to jumpstart your EUC initiatives with desktop-as-a-service (DaaS), Windows-as-a-service, VDI, GPUs, and EUC monitoring across your clouds.

    In this session, Nikola Bozinovic, VP/GM of Desktop Services, and Kees Baggerman, "Doer of Things," will share their vision, insights, and the impact of Nutanix in EUC.”
  • Protect Your Data from IT Downtime with Nutanix Business Continuity Solution
    Protect Your Data from IT Downtime with Nutanix Business Continuity Solution
    Ed Collins, Sr. Product Marketing Manager, Nutanix Oct 1 2020 2:00 am UTC 30 mins
    The Nutanix Private Cloud takes all the guesswork out of deploying scalable, resilient, pay-as you grow software defined infrastructure, providing self-healing, highly available, resilient infrastructure that ensures application and data availability in the event of both planned and unplanned disasters.
    Hear from the experts on:

    - How deploying disaster recovery is a native extension of a hyperconverged infrastructure platform in the datacenter
    - How flexible disaster recovery and data protection services are able to meet increasingly stringent SLAs
    - How a single, unified management plane across a hybrid-cloud enterprise simplifies operations and saves money
  • Asia-Pacific – Taking Device Clinical Development to the US & Europe
    Asia-Pacific – Taking Device Clinical Development to the US & Europe
    Nach Dave, RPh. MSc, Vice President, Development Strategy and Marlis Sarkany, MD Senior Medical Director Oct 1 2020 8:00 am UTC 61 mins
    Medical devices play an increasingly critical role in the health and quality of life for millions of people worldwide. While clinical trials for medical devices have many similarities to those for pharmaceuticals, the regulatory evaluation of devices is distinct from that of drugs – and there are critical differences in the way the device trials are designed and executed.
    In this webinar, the presenters draw on their extensive experience in both medical device and clinical product development to share what manufacturers need to know. The pair will explore the latest US and European medical device regulatory pathways, agency expectations, and other critical best practices.
    To reflect the substantial technological and scientific advances made by the medical device sector and to respond to the need for regulations that would significantly tighten the controls around medical devices, the European Commission published the EU Medical Devices Regulation (MDR) on May 5, 2017.
    These new regulations seek to set the standard for medical device regulation globally and impact the entire product development cycle, from concept to clinical trial conduct and post-marketing surveillance. Manufacturers will need to conduct more rigorous clinical investigations than ever on both safety and effectiveness to support their claims both in Europe and in the USA. By understanding this evolving regulatory landscape, device manufacturers across the globe can better position their products to adapt to these changes in support of their device development programs.
    What You Will Learn
    • An Overview of the EU MDR/IVDR Regulations for Device Development
    • Ways to accelerate and optimize device development by partnering with the US FDA
    • Factors for clinical development success of combination products in therapeutic and aesthetic dermatology, including a selection of relevant evaluation scales, training of investigators, and quality of study monitoring