Hi [[ session.user.profile.firstName ]]

Health IT

  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Mar 20 2019 40 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT

    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Medical Device Risk Assessments - HIPAA Happenings
    Medical Device Risk Assessments - HIPAA Happenings
    24By7Security, Inc. Recorded: Mar 19 2019 60 mins
    Medical Devices are continually increasing in use and popularity, with the advent of so many new technologies in the healthcare space. They could pose several security and privacy risks. Learn from a leading hospital Chief Information Security Officer (CISO) about Medical Device Risk Assessments.

    Featured Speaker: Mauricio Angee, CISO of Mount Sinai Medical Center

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • An Inside View Into the Methods & Exploits of Kevin Mitnick
    An Inside View Into the Methods & Exploits of Kevin Mitnick
    Kevin Mitnick, Perry Carpenter Recorded: Mar 14 2019 63 mins
    Many of the world's most reputable organizations rely on Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, to uncover their most dangerous security flaws. Kevin’s experience as a security consultant and his vast knowledge of social engineering are part of what help you train your users to stay a step ahead of the bad guys.

    Wouldn’t it be great if you had insight into the latest threats and could find out “What would Kevin do”? Now you can!

    In this webinar you will:

    - Watch an exclusive demo of a shocking Outlook Exchange exploit
    - Find out how these vulnerabilities may affect your organization
    - Learn what you can do to stop the bad guys (What Would Kevin Do)
  • Smelling the Roses at 100Gb - Security Tooling at the Speed of Life
    Smelling the Roses at 100Gb - Security Tooling at the Speed of Life
    Ron Nevo, CTO, cPacket Networks; John Carnes, Info Sec. Architect; Gordon Rudd, 3rd Party Risk Officer, Venminder, B. Dunlap Recorded: Mar 14 2019 56 mins
    Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching speeds 100G, what are your security tools missing? Can they handle the increased volume of information that’s coming in? By making use of packet brokers, you can get the visibility you need and not miss out on life. Join cPacket Networks and (ISC)2 on March 14, 2019 at 1:00PM for a discussion on packet brokering visibility across the network, the need for pre-egress filtering and how the convergence of NetOps and SecOps can help protect your company’s top-line revenue and productivity.
  • Building Blocks for Your 2019 IT Security Program
    Building Blocks for Your 2019 IT Security Program
    Danielle Russell, Group Product Marketing Manager, AlienVault; Amy Pace, Principal Product Marketing Manager, AlienVault Recorded: Mar 14 2019 51 mins
    Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast and demo of the AlienVault Unified Security Management (USM) platform to learn how solutions from AlienVault, an AT&T Company, can help you to:

    - Determine your current security posture and make a prioritized plan for improvement
    - Centralize security monitoring across multi-cloud and on-premises environments
    - Automate threat detection and incident response activities for improved efficiency
    - Consolidate your regulatory compliance requirements to help accelerate audit readiness
    - Maintain continuous security monitoring all year long

    Register today to reserve your seat. Here's to a secure 2019!
  • ISO Compliance
    ISO Compliance
    Lockpath Recorded: Mar 14 2019 3 mins
    ISO compliance can be tedious, labor-intensive and an on-going task of managing processes. Learn how the Keylight Platform is the solution you need for ISO compliance.
  • Hybrid-Converged Infrastructure: Deploying HCI 2.0 with Existing SANs
    Hybrid-Converged Infrastructure: Deploying HCI 2.0 with Existing SANs
    Enrico Signoretti Analyst, GigaOm Research Manish Chacko Sr. Product Manager, DataCore Recorded: Mar 13 2019 61 mins
    Hyperconvergence is now adopted by an ever-growing number of enterprises because of its simplicity, but others don’t like it because of its lack of efficiency, or because they do not find it flexible enough to answer to all of their workload needs.

    Yet, it is not always possible to get everything you want. However, technology and products are quickly maturing, and now enterprises can ask for much more.

    Attend this free GigaOm webinar featuring experts in enterprise data storage and IT infrastructure, including GigaOm Analyst, Enrico Signoretti and DataCore’s Sr. Product Manager, Manish Chacko, discussing innovative solutions for infrastructure strategies.

    Attendees will learn innovative infrastructure strategies and explore solutions from both technical and business perspectives, including:

    The good, the bad and the ugly of hyper-convergence
    - Trade-offs of hyper-convergence
    - Evolution of hyper-convergence and benefits for the end users
    - New options that allow a smoother migration path to hyper-convergence
    - The next major features to expect from an HCI platform

    Join GigaOm and DataCore for this free expert webinar!
  • A Modern Digital Data Architecture: Best Practices for Adoption
    A Modern Digital Data Architecture: Best Practices for Adoption
    Alex Gurevich, DXC Technology’s Analytics CTO for the Americas & Clark Bradley, Solutions Engineer at Zaloni Recorded: Mar 13 2019 61 mins
    Organizations that put analytics and artificial intelligence (AI) at the core of their transformation strategy will survive and thrive in the age of digital disruption. To achieve this, a holistic, modern data architecture and a rock-solid information supply chain are critical for success.

    Organizations can deliver timely, self-service, democratized data access and analytical insights at enterprise scale by leveraging the innovation design principles of data lakes, scalable and elastic cloud infrastructures, and automated information pipelines. However, many find that these architectures are complex to create, deploy and operate — often resulting in poor performance, unnecessary expense and underutilized assets for the do-it-yourselfers. Transitioning to such architectures from legacy paradigms carries additional difficulty and risk, especially in hybrid environments that can span multiple design patterns and cloud providers.

    In this webinar, Clark Bradley, Zaloni solutions engineer, and Alex Gurevich, DXC Technology’s Analytics chief technology officer for the Americas, will present solution designs and representative field-use cases for simplifying and accelerating adoption of a modern, digital data architecture.

    Topics to be discussed will include:
    - Best practices for migrating from a legacy to a modern data architecture
    - Deploying a data catalog in support of data lake architectures
    - Data lake architectures for hybrid and cloud environments
    - Protecting data assets and privacy without obstructing access
  • Achieving IT Modernization and Flexibility Without the Pain of Migrations
    Achieving IT Modernization and Flexibility Without the Pain of Migrations
    Scott Sinclair, Sr. Analyst - Enterprise Strategy Group & Alfons Michel, Sr. Product Marketing Manager - DataCore Software Recorded: Mar 13 2019 60 mins
    Data is a strategic weapon of any institution or business. But, if you’re not leveraging it, then it can be a massive competitive disadvantage in the industry!

    So how can you, and your IT organization, gain this advantage? A transformation must occur.

    Maximizing IT infrastructure flexibility is paramount to keep pace in this newly formed digital age. But typically, any major change in your IT infrastructure, besides costs, requires risky, time consuming and disruptive data migrations. So how to overcome this obstacle?

    Join our brief webinar and Q&A at the end to hear more about the background, drivers and enablers to achieve IT modernization and flexibility without the pain of migrations. In other words: to disrupt without disruption. Experts from ESG and DataCore will jointly look at the challenges associated with the need of IT modernization and how it can be accomplished – within budget and without any disruption for your operations.

    Learn more about the hold-backs and how to overcome them, because there is nothing more constant than change. Join us to discover:

    • The need for change and transformations in IT
    • Seamless introduction of new technologies
    • Seamless migration options (e.g. to hyperconvergence)
  • 7 Mythen um elektronische Signaturen aufgedeckt.
    7 Mythen um elektronische Signaturen aufgedeckt.
    Gregor Kolk (Business Development Lead, Adobe) & Ulrich Isenmeyer (Senior Business Development Manager, Adobe) Recorded: Mar 13 2019 55 mins
    Um die Rechtskräftigkeit, den Mehrwert und die Sicherheit elektronischer Unterschriften ranken sich hartnäckige Mythen, die viele Entscheider zögern lassen.

    Tatsächlich sehen Digitalisierungsexperten E-Signaturen aber längst als das Schlüsselelement für komplett digitale Unternehmensprozesse, die heute als Grundlage langfristiger Kundenbindung und Effizienzsteigerung gelten.

    „Sign-Up 2019: Facts“, der zweite Teil unserer Webinar-Serie räumt mit den Mythen um E-Signaturen auf. Im Dialog behandeln unsere Experten Fragen wie:

    •Sind elektronische Unterschriften nur ein Nischenthema?
    •Wie gestaltet sich der Aufwand für Unternehmen und Anwender?
    •Und: Ist Ihre Unterschrift in der Cloud wirklich sicher?
  • Hidden In Plain Sight: Open Source Intelligence on the Rise
    Hidden In Plain Sight: Open Source Intelligence on the Rise
    Erich Kron, Stephen Lawton Recorded: Mar 12 2019 33 mins
    It’s all out there in the open — essentially the ways and means for bad actors to attack your company. There’s even a label for it: Open Source Intelligence.

    This is the underlying data that will help attackers create convincing attack emails with personal information and details about a target’s life so detailed that the attack appears to come from your best friend.

    This 20/20 webcast looks at how attackers use details about you either to attack you or to attacker others and make them think it’s from you — and what you can do about it.
  • Levers of Human Deception: The Science and Methodology Behind Social Engineering
    Levers of Human Deception: The Science and Methodology Behind Social Engineering
    Erich Kron, David Littman Recorded: Mar 7 2019 51 mins
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate for KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, We'll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting - OODA Loop's different components
    - How we can defend ourselves and our organizations
  • AIOps: See Fewer Tickets, Solve Them Faster, Without Rules
    AIOps: See Fewer Tickets, Solve Them Faster, Without Rules
    Matt Klassen ; Dominic Wellington Recorded: Mar 7 2019 45 mins
    Join Cherwell and Moogsoft for a webinar discussing how ITSM can be extended beyond simple ticketing to cover new collaborative ways of working. Integration of human expertise and AI-powered automation is the new reality in the network management center. Changes to processes and models are required to support the complexity and accelerating rate of change of modern IT infrastructures. As ongoing digital transformation drives increasing expectations of IT performance, a new multi-vendor IT Operations toolchain is emerging.
  • Implementing Digital Signatures For Regulatory Compliance in Life Sciences
    Implementing Digital Signatures For Regulatory Compliance in Life Sciences
    John Jolliffe (Strategic Engagement, Adobe Document Cloud) & Viky Manaila (CEO, Trans Sped) Recorded: Mar 7 2019 37 mins
    Pharmaceutical and Life Sciences companies are subject to unique legal and regulatory requirements that fundamentally impact the way they create and manage content and data. What role can digital signatures play in helping companies manage risk and comply with regulations for the management of clinical trials, securing patient informed consent, and the control of good manufacturing practices?

    Join our live webinar to learn how:
    • Life Sciences companies can achieve digital transformation in this highly regulated sector
    • To comply with ICH E6(R2) guidelines on data integrity to avoid rejection of clinical trial data.
    • To secure legally valid Informed Consent and comply with the new EU Regulations on clinical trials data.
    • To work alongside signature solutions in non-regulated areas of life sciences companies.
    • To achieve compliance with SAFE-BioPharma standards.
  • SAP HANA on Steroids: Hosting Provider Achieves 75% Reduction in Storage Delays
    SAP HANA on Steroids: Hosting Provider Achieves 75% Reduction in Storage Delays
    Jeremy Schulthess, Infrastructure Admin. - 1st Basis, Taylor Grove, Sr. Account Mngr. & Mark Kuffel, Sales Mngr. – MNJ Recorded: Mar 6 2019 61 mins
    Join us to hear the story of 1st Basis Consulting and MNJ Technologies. 1st Basis Consulting offers technical managed services and IT consulting in support of SAP and VM solutions. As a company providing hosting services for customers worldwide, 1st Basis Consulting needed a solution to maximize the performance of their SAP HANA test/dev environment and reduce their storage costs.

    With the help of MNJ technologies and DataCore Software, 1st Basis Consulting found a high-performance solution that helped them reduce storage delays by a massive 75% and cost savings of 50% during their hardware refresh while also decreasing their hardware footprint by 42% and increasing their VM density.

    Learn how 1st Basis Consulting transformed their SAP HANA environment from a traditional-SAN storage design to a modernized 2-server Hybrid-Converged solution with HA, plus the ability to present virtualized storage to external VMware hosts.

    In this webcast you will discover how 1st Basis Consulting:
    · Massively cut their SAP HANA databases’ load up times from 20 minutes to just 5 minutes
    · Saved $100,000 on storage costs by choosing a Hybrid-converged design
    · Consolidated from 12 VMware hosts to 7 hosts while increasing their VM growth
  • Support your service delivery with the power of knowledge
    Support your service delivery with the power of knowledge
    Heléne Källgården; Pierre de Gentile Recorded: Mar 6 2019 45 mins
    Today, everything is about service. Whether internal or external services, you need to deliver more, faster and higher quality than ever before. The bottleneck in your service delivery is a lack of automation, a poor self-service experience and no transparency in your processes. In addition to a world class, process driven service automation platform, you can deliver a world class experience with the power of knowledge management.
    Can you imagine how effective your service delivery to your organization and your customers could be if you enable the power of knowledge to everybody who needs it, at the time they need it? Empower your service delivery by combining service automation with a relevant knowledge base.
  • Installation / Upgrade to 8.2
    Installation / Upgrade to 8.2
    Scott Dabney, Enterprise and Solution Architect Recorded: Mar 5 2019 44 mins
    Please join us in a webinar focusing on setting-up Pentaho products for a quick and easy evaluation; production installation, configuration, and administration; and guidelines for upgrading to the current version of Pentaho.

    Along the way, we’ll explore the various components and technical requirements necessary to install and upgrade Pentaho. We’ll also share checklists and step-by-step instructions that can be part of your playbook to ensure a durable and repeatable upgrade/install process across your environments.
  • Future of Clinical Laboratories—Winning Strategies & Growth Opportunities
    Future of Clinical Laboratories—Winning Strategies & Growth Opportunities
    Divyaa Ravishankar, Industry Principal,Frost & Sullivan, Kyle Fetter, Executive Vice President, XIFIN Recorded: Mar 5 2019 64 mins
    What are the winning strategies for a laboratory to be successful? This webinar will focus on the state of the clinical laboratories market in the US, Canada, and Europe. Given the reimbursement cuts, it is essential to understand how this can impact the revenue-generating abilities of clinical laboratories and what strategies they can take now to keep the business profitable.

    Frost & Sullivan invites you to join Divyaa Ravishankar, Industry Principal, Frost & Sullivan and Kyle Fetter, Executive Vice President & General Manager of Diagnostic Services, XIFIN, for the webinar: Future of Clinical Laboratories—Winning Strategies & Emerging Growth Opportunities. The event will provide an overview of the current state of clinical laboratories and recommendations for future success followed by an interactive, live question-and-answer session.

    Key Takeaways:

    • Understand what is driving business for clinical laboratories and what will change in the future
    • Learn how are clinical laboratories adjusting to the declining reimbursement situation
    • Gain insight on ways a data-driven approach can help laboratories increase efficiency
    • Better understand how blockchain applies in the world of clinical laboratory services testing
  • Sourcing and Vendor Management – A Critical Component of Digital Strategy
    Sourcing and Vendor Management – A Critical Component of Digital Strategy
    Aaron Polikaitis, VP, Vendor Sourcing & Management, IDC's IT Executive Program Recorded: Feb 28 2019 36 mins
    CIOs, CPOs and business unit leaders overwhelmingly agree that technology sourcing and procurement is critical for digital transformation and legacy system modernization. Nevertheless, recent IDC research confirms that technology sourcing and procurement organizations are challenged to deliver what their businesses require. IT and line of business executives report of their procurement organizations that:
    • 54% do not understand business needs
    • 62% are undermined by shadow procurement
    • Only 10% work effectively within cross-functional teams

    Procurement organizations have a choice of transforming themselves or watching other enterprise organizations assume the responsibility for sourcing the technology that supports key business initiatives. In this IDC web conference, we will identify the top challenges identified by Procurement, IT, and LOB executives, and discuss strategies for transforming procurement organizations from tactical administrative centers to strategic sourcing partners for the enterprise.
  • Going Beyond e-Signature: Automate your Agreement Processes
    Going Beyond e-Signature: Automate your Agreement Processes
    Alex Goulding, Major Account Executive Recorded: Feb 28 2019 33 mins
    Agreements are often plagued by slow, costly processes due to a lack of automation. These disconnected steps require customers or employees to re-enter the information you already have, hinder the ability to get business done, and provide a poor user experience.

    There is a better way: a modern System of Agreement.

    The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process.

    Discover all that’s possible, next, and new, with DocuSign during this webinar. We’ll give you the know-how, insights, and inspiration so you can:

    •Prepare agreements with a high degree of automation
    •Sign agreements quickly and securely
    •Act on agreement terms after signing
    •Manage agreements with flexible options
  • So You’ve Got a Data Catalog...Now What?
    So You’ve Got a Data Catalog...Now What?
    Scott Gidley, Vice President of Product Recorded: Feb 27 2019 40 mins
    Achieving actionable insights from data is the goal of any organization. To help in this regard, data catalogs are being deployed to build an inventory of data assets that provides both business and IT users a way to discover, organize and describe enterprise data assets. This is a good first step that helps all types of users easily find relevant data to extract insights from.

    Increasingly, end users want to take the next step in provisioning or procuring this data into a sandbox or analytics environment for further use. Attend this session to see how organizations are looking to build actionable data catalogs via a data marketplace, that allow self-service access to data without sacrificing data governance and security policies.

    Learn how to provide governed access and visibility to the data lake while still staying on track and within budget. Join Scott Gidley, Zaloni’s Vice President of Product, as he discusses:
    - Architecting your data lake to support next-gen data catalogs
    - Rightsizing governance for self-service data
    - Where a data catalog falls short and how to address
    - Success use cases
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Recorded: Feb 21 2019 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • How to drive digital agility & efficiency in the Pharma & Life Sciences industry
    How to drive digital agility & efficiency in the Pharma & Life Sciences industry
    Sean Donnelly (Econsultancy), Toby Donnison (Pharma Lead - Adobe), and Rupert Wills (Solutions Consultant - Adobe) Recorded: Feb 21 2019 54 mins
    The 2018 Digital Trends report released by Adobe & Econsultancy found that only 5% of healthcare and pharma organizations reported being digital-first. Yet in today’s digital world, there has never been a better time for the Pharma industry to innovate and improve health outcomes whilst driving business performance. Technology has sparked a revolution across all functions, from research and development to sales and operations. However, meeting these demands is not without its challenges. The unique nature of the pharma and life sciences industry means that it faces issues that other businesses do not have to grapple with. There are complex supplier networks, growing regulatory requirements and increasing pressure to reduce costs – so what can digital leaders do to effect change quickly?

    Join Econsultancy & Adobe in this webinar to learn:
    • The reality of the digital first challenge and the trends causing complexity.
    • How technology is shaping the future and the opportunities for digital agility & efficiency.
    • How Merck transformed time consuming business processes though digital workflows – accelerating business, and improving the employee & customer experience.
    • How electronic signatures can digitally transform your documents and workflows, accelerating an organisations digital transformation journey.
    • How to ensure you stay compliant with regulations including a live demonstration the BioPharma module (covering Title 21 CFR Part 11)
  • Know your Vendor Risk
    Know your Vendor Risk
    Rema Deo, Managing Director, 24By7Security, Inc. Recorded: Feb 19 2019 56 mins
    About this webinar:
    We discuss key requirements related to a Vendor Risk Assessment. If you have vendors performing important duties for you and/ or have access to your or your clients' confidential information, you may need to perform a Vendor Risk Assessment. This session is part of our Cyber Conversations webinar series.

    Learn, among other topics, how to:
    - Identify the vendors that need a risk assessment.
    - Risk Rating your vendors
    - How do you go about performing a step-by-step vendor risk assessment, sometimes also called a Third Party Risk Assessment or Third Party Information Security Assessment?

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. We will issue a Certificate of Completion to those who attend the webinar, to the specific email address and attendee name on the registration form. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar.
  • Cyber Security vs. Cyber Safety – Are Medical Devices Secure and Patients Safe?
    Cyber Security vs. Cyber Safety – Are Medical Devices Secure and Patients Safe?
    Juan Asenjo, nCipher Security and Rao Cherukuri, Device Authority Recorded: Feb 19 2019 61 mins
    Learn about the main challenges for securing connected medical devices, including how to design and deploy scalable credential management systems, end-to-end data security, at rest, in motion, using encryption, establishing enforceable security policies for regulatory compliance and creating root of trust with certified HSMs to deliver patient safety.

    The Internet of Things (IoT) holds enormous potential across a wide range of applications. From industrial sensors that manage and optimize manufacturing processes, to medical devices that monitor and deliver specialized treatment. However, to realize this potential, security and safety must become the primary focus for deployment. In this webinar, Rao Cherukuri - CTO of Device Authority, a leading provider of IoT identity and access management solutions and Juan Asenjo - Senior Manager at nCipher Security, pioneers in the development of hardware security modules (HSMs), will discuss breakthrough technology that delivers automated device provisioning, authentication, credential management, and end-to-end data privacy, with a robust root of trust.

    Sign up now to save your seat on our webinar!
  • Avoiding Commodity Cybercrime
    Avoiding Commodity Cybercrime
    David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloud Mar 21 2019 11:00 am UTC 60 mins
    Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.

    This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will also discuss why it's going to get worse, why should we care and what we can do about it.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Mar 21 2019 2:00 pm UTC 30 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • Navigating new frontiers: Ways to find space in the future RA market
    Navigating new frontiers: Ways to find space in the future RA market
    Helen Parfitt, Head of Therapy Watch, Research Partnership, Mariel Metcalfe and Mark Hollis, Research Partnership Mar 21 2019 3:00 pm UTC 75 mins
    Rheumatoid arthritis (RA) has been a major growth driver for the pharmaceutical industry over the last 15 years, led by AbbVie’s blockbuster anti-TNF inhibitor treatment Humira (adalimumab).

    The emergence of low-cost biosimilar versions of Humira and the new janus kinase (JAK) inhibitors, are shaking up a once-stable market.

    Although there are only two drugs in this class available in the region – Eli Lilly’s Olumiant (baricitinib) and Pfizer’s Xeljanz (tofacitinib) – this is not likely to be the case for much longer, as several other candidates reach late-stage development.

    Analysis of Therapy Watch data, a real-time' syndicated market tracking tool from Research Partnership, shows that JAK inhibitors have already made a strong impression in the European RA market, where their convenient oral administration advantage may override cost considerations that would otherwise favour biosimilar uptake.

    This pharmaphorum webinar, held in conjunction with Research Partnership, will use the latest intelligence from both physicians and patients to look at emerging trends in the RA market, how these will shape the RA market of tomorrow and how companies can best position themselves for future success.

    This webinar will provide an opportunity to interact with the panel about how companies can best harness the potential of this increasingly complex, but highly rewarding, market.

    Topics to be covered include:

    The European RA market
    Current status and market situation of JAK inhibitors (key EU5 countries)
    Uptake curve of JAKs compared to other new entrants and biosimilars
    Profile of physicians prescribing JAKS
    Country differences
    The future of new classes of JAK inhibitors
  • Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of Carmel Mar 21 2019 6:00 pm UTC 60 mins
    Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.

    Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.

    The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.

    Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.

    In this webcast you will discover how City of Carmel:
    • Has experienced 100% uptime for nearly 10 years
    • Extended their storage life expectancy by 80% and saved $75k
    • Replaced every storage component without doing a forklift and replace
  • Cyberattacks: Q1 Review and Emerging Trends
    Cyberattacks: Q1 Review and Emerging Trends
    Kelvin Murray, Threat Expert, Webroot Mar 26 2019 11:00 am UTC 60 mins
    With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.

    Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.

    Join Webroot’s Threat expert as he discusses topics such as:

    •The rise of information stealers
    •The changing face of ransomware
    •Relentless phishing attacks
    •The theft, trade and cracking of passwords
  • IT Org Transformation – Seven Strategies We Can Implement This Week
    IT Org Transformation – Seven Strategies We Can Implement This Week
    Joe Pucciarelli / Marc Strohlein / Cora Carmody Mar 26 2019 3:00 pm UTC 60 mins
    Many enterprises and their IT teams continue to struggle with the accelerating pace of change being brought about by the new digital technologies, business model innovation and increased competitive tempo. This challenge is more than “change management”; this is a broader problem – a need to accelerate organization transformation and evolve cultural norms. During this IDC web conference, our analysts will share both cultural frameworks and specific, tangible tactics for executive IT leaders, noted within our research, that have been found to power IT’s broader organizational transformation.
  • Third-Party Risk Management Trends & Predictions
    Third-Party Risk Management Trends & Predictions
    Tom Garrubba, Linda Tuck Chapman, Kelly White, Shane Deay Mar 28 2019 4:00 pm UTC 60 mins
    Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
  • Guidelines for Metadata Injection
    Guidelines for Metadata Injection
    Mark Monroe, Solution Architect Apr 2 2019 4:00 pm UTC 60 mins
    This webinar covers some best practices for using template-driven designs and navigating and operating levels of Metadata Injection. We’ll go over examples of how to build the data-driven rule Extract/Transform/Load (ETL) transformation, making it flexible so that it can be added to, changed, or removed without adding development cycles.

    We’ll also cover some tips on building the metadata layer that Pentaho Interactive Reports uses, along with a few recommendations to consider while in the design phase.
  • InnovationX2 – Doubling down to overcome multi-cloud complexities
    InnovationX2 – Doubling down to overcome multi-cloud complexities
    Toby Owen, CTO and Don Barlow, COO Apr 3 2019 3:00 pm UTC 60 mins
    The recent merger of Hostway and HOSTING didn’t just multiply our office space and workforce. More importantly, it’s allowed us to meld our most valuable offerings and the expertise of each company to provide a healthy list of unmatched products and services.

    This is a particularly critical time for IT organizations as they come to grips with the fact that the “easy migration” to public cloud preached a few years ago is not so simple. And “One-size-fits-all” is a risky and costly approach to take when you’re trying to control IT spend, maintain compliance, and stay secure—all while bringing real value to the entire business.

    During this 45-minute webinar, two Hostway|HOSTING technology experts will share our most exciting combined services, including:

    Monitoring Insights: Offering an unmatched, game-changing single view of your infrastructure, operating systems, and applications.

    Guidance Level Agreements (GLAs): Uniquely going ten steps further than standard SLAs to offer a regular cadence of actionable recommendations that guarantee positive outcomes.

    Critical Availability Services: Offering the BEST availability guarantee in the industry.

    Database Services: Not many companies in our space also offer full data lifecycle management capabilities. A service not to be understated, Gartner Analysts have found that nearly 90% of businesses have little or no analytics expertise in house.
  • Blockchain: Worldwide Technology Market Update and Spending Outlook
    Blockchain: Worldwide Technology Market Update and Spending Outlook
    Stacey Soohoo, Research Manager and James Wester, Research Director Apr 4 2019 3:00 pm UTC 60 mins
    The future of blockchain remains promising as enterprises move along their digital transformation journeys and look to blockchain to gain a competitive advantage. End users will realize the long-term value this new and innovative technology holds, building upon their existing technology infrastructure and also layering on new and emerging technology to create a complete ecosystem. In this webinar, we will share market insights on expectations about technology adoption from the field and key insights on the spending landscape for key blockchain use cases and trends.
  • Going Off Script – Code Eats InfoSec
    Going Off Script – Code Eats InfoSec
    Tarik Saleh, Senior Security Engineer, DomainTools; Erik von Geldern, CISO, FXCM; Brandon Dunlap (Moderator) Apr 11 2019 5:00 pm UTC 60 mins
    Marc Andreessen famously said “Software is eating the world”, but what about in InfoSec? In the beginning, security practitioners depended on Excel and VB scripts to make sense of their data. Today, machine learning is aiding in the discovery and reporting of insights. As more and more cloud-forward companies are embracing an “infrastructure-as-code” model, what does this mean for the security leaders of tomorrow? Is automation important to your role and to the organization’s infosecurity posture? If so, join DomainTools and (ISC)2 on April 11, 2019 at 1:00PM for a discussion on security automation and how being fluent with programming languages and scripting can expand your knowledge and value to an organization, as well as strategizing for machines to work in harmony with the compliance and risk teams.
  • Compliance and Policy Management for 2020 and Beyond
    Compliance and Policy Management for 2020 and Beyond
    Sam Abadir, Lockpath Apr 18 2019 4:00 pm UTC 60 mins
    Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:

    • How your organization can gain efficiency from compliance and policy management
    • Strategies for collaborating across departments
    • How streamlining processes can boost productivity
    • Planning ahead for sustained growth

    Discover the future for compliance and policy management by attending this educational webinar. Register now!
  • Are e-Signatures Legal in Europe? Understanding eIDAS
    Are e-Signatures Legal in Europe? Understanding eIDAS
    John Jolliffe, Strategic Engagement, Adobe Document Cloud. Apr 25 2019 1:00 pm UTC 45 mins
    When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?

    Join our webinar, to learn:

    • Why e-signatures are essential to your company's success now and in the future.
    • Which three signature types are legal under eIDAS.
    • How to select the right approach for your business.
    • Next-gen e-Signatures and The Cloud Signature Consortium.
  • A New Approach to Managing "Identity Risk"
    A New Approach to Managing "Identity Risk"
    Focal Point Data Risk, Lockpath, SailPoint May 2 2019 4:00 pm UTC 60 mins
    More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.

    So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.

    In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.

    In this webinar, attendees will learn:

    • The benefits of applying an integrated approach to identity risk
    • The key strategies for overcoming common identity risk management
    • How to integrate enterprise systems to more effectively manage identity risk
  • Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Charlie Whelan, Vice President of Consulting, Transformational Health, Americas, Frost & Sullivan May 14 2019 3:00 pm UTC 75 mins
    For most cities and states, the healthcare technology and biosciences sector is one of the most attractive industries of the future that can grow their communities. However, that attention attracts significant competition among players seeking to expand in a field that is highly complex. How should your community address this industry, and what is the best path to nurturing start-ups, retaining existing employers, attracting new companies and encouraging workforce development?

    Key Takeaways:

    • The healthcare technology and biosciences market is large and complex. Learn how the industry is structured and which segments might align best with your community.
    • Cities and states across the country are all competing to grow their own biosciences economies. Find out what types of programs and strategies are the most effective.
    • Come away with a simple model for assessing your own community’s strength relative to the healthcare technology and biosciences market.
  • Audit Management for 2020 and Beyond
    Audit Management for 2020 and Beyond
    Sam Abadir, Lockpath May 16 2019 4:00 pm UTC 60 mins
    As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.

    Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.

    Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.

    In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:

    • What audit management encompasses
    • How your organization can gain efficiency from proper audit management
    • Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!