Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Cell therapy is the fastest growing segment of regenerative medicine. Cell therapy is comprised of immune cell therapy and stem cell therapy, with stem cell therapy making up the largest part of this market: it is estimated that the global stem cell therapy market will reach $40 billion by 2020 and $180 billion by 2030.

    Many factors determine the rate at which the stem cell therapy market advances. It is driven by the success of stem cell treatments in curing life-threatening diseases such as cancer, heart diseases and neuromuscular diseases in the worlds aging populations. In contrast, stem cell market growth rate is hindered by manufacturing and regulatory concerns. For example, if only 20% of the 318 global late stage clinical trials are approved for release on the market, there will not be enough stem cell therapy manufacturing facilities to produce the 64 resulting products. This is due, in part, to funding concerns, the high cost of build-out as well as cGMP compliance, standardization of production processes, and ever changing industry regulations.

    Join us as we discuss these and other key topics.
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • There are many decisions when choosing a video conferencing solution. Free versus subscription? Cloud solution or not? What type of video system is best suited for your meeting rooms? Join Gagan Verma, Regional Director of Lifesize, in this webinar where he will breakdown the top five considerations of video conferencing for 2015. Gagan will also elaborate on the competitive landscape and which solutions best fit your company’s needs.

    For enquiry: apac-mktg@lifesize.com or +65 6303 8379
  • Next to performance and scalability, cost efficiency is one of the top three reasons most companies cite as their motivations for acquiring storage technology. Businesses are struggling to control the storage costs, and to reduce OPEX costs for administrative staff, infrastructure and data management, and environmental and energy. Every storage vendor, it seems, including most of the Software-defined Storage purveyors, are promising ROIs that require nothing short of a suspension of disbelief.

    In this presentation, Jon Toigo of the Data Management Institute digs out the root causes of high storage costs and sketches out a prescription for addressing them. He is joined by Ibrahim “Ibby” Rahmani of DataCore Software, who will address the specific cost efficiency advantages that are being realized by customers of Software-defined Storage.
  • Wie Sie sicher wissen, untersagt das deutsche Bundesdatenschutzgesetz in seiner Zweckbindungsklausel das Verwenden von sensitiven Echtdaten in Test-, Entwicklungs- und Schulungssystemen. Dennoch sehen wir, dass eine Vielzahl von Unternehmen dieses Risiko immer noch eingeht und sich davor scheut, die nötigen Anpassungen durchzuführen.

    Die deutsche Versicherungswirtschaft begegnet diesem Thema mit dem Code of Conduct über den GDV als Vorreiter nun offensiv.

    Der GDV (Gesamtverband der deutschen Versicherer) ist der erste Verband in Deutschland, der für eine freiwillige Selbstverpflichtung zum Schutz von personenbezogenen Versichertendaten die Zustimmung der Datenschutzbehörden erhalten hat.

    Sämtliche deutschen Versicherungsunternehmen die dem Code of Conduct (CoC) bis Ende 2014 beigetreten sind haben sich damit verpflichtet, dem Datenschutzkodex des GDV innerhalb von 3 Jahren gerecht zu werden.

    Mit den neuen Verhaltensregeln wird transparent, was von der Antragstellung bis zur Schadenregulierung mit personenbezogenen Daten geschieht.

    Lernen Sie wie Informatica die Anforderungen aus dem CoC (Anonymisierung für sensitive Daten in Produktion sowie Test & Entwicklung) umsetzt und gleichzeitig Ihr Testdatenmanagement modernisieren kann.

    Da gemäß BSDSG als auch neuester EU-Novelle Datenschutz ein branchenübergreifendes Thema ist, sind alle Interessenten herzlich zu diesem Webinar eingeladen, die direkt (z.B. Datenschützer) oder indirekt (z.B. Test-Manager, Enterprise Architekten) mit dem Thema konfrontiert werden.

    Unternehmensweiter Datenschutz vom Marktführer – seien sie dabei !
  • Large enterprises want to use all the data they can get to earn the trust and the dollars of their customers. At the same time, they must secure this data, which is increasingly the target of sophisticated cyber-attacks. Traditional triple A (access, authentication and audit) security solutions are no longer sufficient-data-centric security must be added to the mix. In this webinar, join Stratecast | Frost & Sullivan, HP Security Voltage and (ISC)2 on July 16, 2015 at 1:00PM Eastern for an examination of ICT technology trends and business policies that have brought us to this point and how format preserving encryption can be used to protect data at rest, in motion and in use.
  • RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.
  • RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.
  • This free webinar will summarise the results of the HFMA’s NHS Financial Temperature Check survey of UK finance directors and chief financial officers, published in early July. You will hear from Paul Briddock, HFMA Director of Technical and Policy, about the financial outlook for the NHS, the views of finance directors from 209 NHS organisations and what the HFMA thinks needs to happen to ensure the NHS can meet the financial challenges ahead.
  • If you’re running production workloads on Amazon Web Services, you’ve probably seen some of the limitations to AWS’ monitoring capability. HOSTING has a great solution to this! In partnership with ScienceLogic, and as part of our Unified Cloud vision, HOSTING is pleased to offer infrastructure monitoring for AWS. Join us for a live demonstration of this comprehensive alternative to AWS monitoring. We’ll review the AWS monitoring platform in terms of strengths and weaknesses, and compare it to the HOSTING offering. We’ll close with a live demonstration of our capabilities and a Q&A session.
  • The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being seen today, and what could be around the corner tomorrow? Join Check Point Software and (ISC)2 on July 9, 2015 at 1:00PM Eastern for a roundtable discussion on tackling mobile security challenges to keep on-the-go employees productive and your enterprise secure.
  • Understanding your customers is fundamental to effective communication. Current segmentation strategies draw on ever more detailed information about how patients, physicians and payers behave through the use of open source, social media and real world data. However, segmentation still lacks clear insight into why these stakeholders behave as they do – and therefore how best to change their behaviour.
    Working with behavioural change experts Hamell, this one hour live discussion will look at why current segmentation strategies are failing, and the importance of understanding what drives patient or customer behaviour. Using case studies, speakers will explore how segmenting by behavioural drivers can create advanced, effective strategies to change patient, customer and payer behaviour.
    This event will focus on three key areas:

    •The theory behind behavioural segmentation and how it challenges the status quo
    •Benefits of behavioural segmentation communication strategies and the problems answered by behavioural segmentation strategies
    •Behavioural segmentation in action: practical application of this approach
  • The professional use of social media in healthcare is fast becoming the default way to share information, ideas, support and expertise on a global scale. Join this webinar to go beyond the basics and learn how to build a lasting community.
  • Informatica and HighPoint Solutions will be co-hosting a panel discussion with leading global Pharmaceutical companies where they will discuss the challenges, solutions and most importantly, how their companies can benefit from IDMP compliance.
  • Government funding for health and social care over the next decade is a key concern for commissioners, providers and service users. As financial and service pressures facing the NHS and local government intensify, the need for integrated care to improve people’s experience of health and care, the outcomes achieved and the efficient use of resources will only grow. On top of facing a predicted financial crisis in the NHS and local government as austerity 2.0 comes into effect, the sectors are facing significant increases in demand which could prove all but impossible to meet. What is the long view? And to what extent can a more integrated approach to managing health deal with this dilemma?
  • Life sciences companies need to make better use of the insights that real world data (RWD) can provide in order to improve market access, sales and market growth strategies – and ultimately to improve the applicability of new and existing therapeutics for patients. Insights come not just from the multiple sources of RWD available, but from advanced analytics that highlight the effectiveness of a treatment by geographic area, and link healthcare providers, institutions and patients to relevant and meaningful outcomes.

    This one-hour event will take a hands-on approach – detailing how insights derived from RWD (and collaboratively with other sources) are enabling all elements of the life science industry to do things better.

    Insights experts Robin Munro and Christian Marcazzo will deliver case studies on how RWD can help life science companies in:

    Sales and Marketing – incorporate RWD and evidence into segmentation, targeting, and engagement of physicians and institutions
    Commercial Effectiveness – measure commercial campaigns, and demonstrate the impact to the healthcare system
    Medical Affairs – find and engage medical education prospects and target appropriate healthcare authorities, healthcare professionals and payers, to improve quality of care and outcomes
    Public Affairs and Market Access – develop qualitative and quantitative insights to design education, advocacy and access-related campaigns within the healthcare ecosystem

    The event will also give an exclusive look at what can be achieved from combining data sources – using Diabetes in England as a case study, Zephyr has implemented novel methods to demonstrate an evidence-based approach to improving information sharing within sales teams and to engaging accounts and payers. We explore how patient outcomes from RWD can add value to commercial strategy.
  • Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:

    In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn

    · How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds

    · What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others

    · How to understand and clarify overlaps and conflicts between documents in your regulatory requirements

    · How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously

    Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.
  • It is often through hindsight that the value of a Board decision is judged. Years, even months after, both those affected by a decision and those who took it will sometimes ask, “Who decided that?”

    There are many factors that play into a good Board decision, including the quality of Board paper, the range of options, the quality of debate, effective challenge, corporate perspective, understanding of the context, and the ability of the Chair to effectively steer discussion and move to a decision. Boards make many fewer decisions than they think they do. In observing a Board meeting, held over 7 hours with over 650 pages of papers, there was not one paper for decision.

    This Webinar will delve into decision making as one of the key roles of the Board. We’ll look at the four levels of Board engagement in decision making: rubber stamping, probing and questioning, setting strategic direction, and shadowing. For each level we’ll explore what it means for the Board and the organisation it directs. We’ll also consider a range of related factors that influence decision making:

    • Best practice in Board papers
    • Strategic versus operational focus
    • The roles of board members
    • Corporate versus functional perspective

    We’ll use a range of models to explore Board decision making, and will draw on experience from across the NHS and beyond.

    John Deffenbaugh, a director of Frontline and an NHS non-executive director, will host this Webinar.
  • Achieving your ADME/Tox testing goals requires experience, quality data, and proper alignment with regulatory guidance. Failure to meet these important requirements can put your drug discovery and pre-clinical goals at risk.
    This presentation will provide an informative overview of how you can advance and reach your pre-clinical drug discovery goals. It will discuss the importance of core contract research capabilities, including enzyme induction, enzyme inhibition, and transporter interaction. In addition, we will review new capabilities and opportunities including CYP induction and SLC transporter assay services – all designed to align with regulatory agency guidance documents.

    Speaker Bio:
    David Stresser is the Program Manager of Corning® Gentest℠ Contract Research Services at Corning Life Sciences since 2001, having held prior positions of Product Manager and Study Director since joining Corning in 1998. Prior to this, he was a post-doctoral associate in the laboratory of David Kupfer at the University of Massachusetts Medical School in Worcester, Massachusetts. He did his graduate work in the laboratory of David E. Williams at Oregon State University in Corvallis, Oregon receiving a Ph.D. in toxicology in 1994. Dr. Stresser has authored or co-authored 40 articles or book chapters in the field of drug metabolism and has been an invited speaker at various national and international meetings, pharmaceutical companies, and universities.
  • The biggest challenge in security is no longer technology. We need to rise from recognition as security experts and experts within security teams to leaders protecting information from a world of risk and vulnerabilities.

    Michael Santarcangelo cracked the code on the pathway to becoming an exceptional security leader. On July 30, 2015 at 1:00PM Eastern Michael will share the Exceptional IT Leadership Framework, including the 5 foundational elements, 9 competencies, and 5 essential habits. The webcast will explore the benefits of a framework-based, competency-driven approach to developing your leadership and how to assess where you really are in your leadership journey.
  • Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Business requirements and technology trends are constantly on a change. Organizations are looking for partners who can provide solutions that are scalable and built on extensible architectures to support global needs with faster time-to-market and lower costs. Dell Application Development Maintenance and Support (ADMS) services cut across industries and verticals with expertise and capability in a host of technology platforms Microsoft, Java, Open source, Mainframe and other legacy platforms. We have partnered with niche players as well as leading vendors like Oracle, IBM and SAP in their database and platform solutions.

    Attend this webinar to learn how Dell Application Development and Maintenance services can help build a scalable and growth-focussed enterprise.
  • Ever wonder what tech tools the world’s most successful companies and executives use to get so much done in one day? Recorded videos are one of them!

    Join Lifesize Product Manager Robert Maloney as he takes you through an in-depth look and discussion on how video recording and sharing can help you and your team drive success by:

    * Capturing and sharing tribal knowledge
    * Delivering training sessions globally
    * Practicing sales pitches
    * And more

    He’ll also share how you can effortlessly create on-demand videos that are instantly accessible from any location, on any device.
  • Joel Daly, Founder and Chief Operating Officer of HOSTING will discuss ways healthcare CIOs can leverage new business models to realize increased technology efficiencies, enable information-driven decisions and improve patient service. This session will draw upon real world case studies from Uber and the nation’s leading behavioral health organization to illustrate how healthcare CIOs can learn from other industry players to successfully meet today’s challenges including: management of data convergence, HIPAA compliance, mobile (BYOD) integration and securing protected health information (PHI) from sophisticated cyberattacks and breaches – all while meeting high patient expectations and adhering to best practices prescribed by the IHI Triple Aim.
  • Due to the widespread adoption and use of cloud applications, a burgeoning mobile workforce and the rise in APTs, endpoint risks have become more prevalent and a challenge to manage. Indeed, endpoint penetrations and breaches take only minutes to occur. An effective endpoint detection & response solution is critical to a timely response, as is properly trained incident response team. Join Guidance Software and (ISC)2 on August 6, 2015 at 1:00PM Eastern for a discussion on EDR and the need for effective Incident Response and automation to hasten mitigation.
  • Enterprises receive, create and store enormous amounts of email data each year: roughly 30,000 emails for every information worker, a large proportion of which contains attachments that are often sensitive or confidential. Increasingly, this information must be encrypted to ensure that data breaches are prevented and that data protection obligations are satisfied. At the same time, information must be retained for long periods in compliance with corporate, legal and regulatory obligations.

    However, encryption and archiving are often at odds with one another: data that must be encrypted can be rendered difficult or impossible to access when archived. Data that is archived, but not encrypted, can be more susceptible to data breaches. As a result, the use of an integrated eDiscovery solution becomes more critical than ever. Join HP/Voltage Security and (ISC)2 on August 13, 2015 at 1:00PM Eastern to learn how to protect your enterprise communications with data-centric email encryption ands make it easy to access encrypted and archived content in support of eDiscovery, regulatory and other requirements.
  • Abstract: Demonstrating compliance with PCI DSS is far from a trivial exercise. With the deadline for complying with the new PCI DSS 3.0 requirements coming up soon, are you sure you can document your compliance? Join us for this demo-based customer training where we will show you how to get the most out of USM for your PCI DSS compliance efforts, and your overall security posture.
    We'll review:
    Core USM capabilities that map to specific PCI DSS requirements
    NEW PCI DSS reports added in the latest product release
    Specific use cases illustrating how to use USM to ensure compliance and improve security
  • (ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.
  • “Better data is everyone’s job” is a bold statement and an audacious goal for every organization. At University of Pittsburgh Medical Center (UPMC), it is precisely what drives their data governance initiative. As the largest nongovernmental employer in Pennsylvania, UPMC is committed to delivering superior medical service to its millions of patients. To achieve that goal, every piece of data could have impact on the outcome.

    Join us to hear a refreshing dialogue between Terri Mikol, Director of Data Governance at UPMC, and Rob Karel, VP of Product Strategy and Marketing at Informatica, on the revolution (instead of evolution) of the data governance program at UPMC.

    Their conversation will reveal:

    •The business imperatives behind the data governance program
    •Secrets that inspire everyone in the organization to become a data hero
    •Key aspects of the data that need to be governed to ensure clean, connected and safe data is always available and fit for use
  • Health plans push for their members to visit their primary care provider for a checkup. It improves health outcomes and reduces the medical spend from costs related to illness and disease. Like their members, health plans also need checkups that will identify the challenges to which they are increasingly exposed, such as issues around information security, revenue maximization, and staffing needs. In this webinar, we will discuss how to specifically deal with key issues related to each of these areas.
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    •Top six areas of security spend
    •How to maximize budget – and minimize risk
    •Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • These words were calmly stated by Commander Jim Lovell on 14 April 1970, and immortalised 25 years later in the movie Apollo 13. Lovell’s phrase has become a byword for focus. For this seminar we will draw on an analysis of the letters from Monitor addressed to Chairs. These are not letters that are welcomed. Rather, they are ones that the recipient would prefer were lost in the post.

    They are sent because problems have occurred in the Foundation Trust. To paraphrase, Houston, you’ve got a problem. Having analysed these letters, we see four problem areas that Commander Lovell would wish to discuss with Chairs:

    • Level of understanding among board members about their business
    • Quality of information and intelligence available for decision making
    • Effectiveness of non-executive director challenge
    • Ability to hold executive directors to account for implementation of board decisions

    This Webinar will go into each of these inter-linked areas, to see what the problem is, its impact, and what can be done about it. We’ll use a range of models that bring theory to the practice, and will draw on experience from across the NHS.

    John Deffenbaugh, a director of Frontline and an NHS non-executive director, will host this Webinar.
  • “Time is the coin of your life. It is the only coin you have, and only you can determine how it will be spent. Be careful lest you let other people spend it for you.”
    Carl Sandburg
    If you google ‘Time Management Techniques’ you get 99,200,000 results. Brilliant, information at our fingertips, but no good if you have no time to find out more!
    In this webinar, ‘Time Management for Human Beings,’ we distil down the very best bits and address time management from a different perspective. We believe that successful time management starts in your head with how you think. Then we need to unpick our habits, understand the nature of our workload and the culture that we’re working in. All have an influence over the way we choose to use the time that we have available.
    More importantly, we’ll share with you some simple and practical approaches that will put you firmly back in control when it comes to managing your time.
    In this one hour webinar……
    •you’ll uncover how your thinking can help you to change your relationship with time for the better
    •you’ll learn more about the impact that your workload, your habits and your organisational culture is having on your time
    •you’ll discover some simple and practical approaches for boosting confidence and resilience that will have immediate implications for you in your work and life
    •we’ll answer some of your burning questions about time management for human beings
  • What you will learn about the AU5800 chemistry analyzer:
    - Typical performance observed.
    - Impact on the laboratory's turnaround time targets.
    - Operator feedback on instrument features.
    - Instrument uptime metrics.
  • Infection spread throughout healthcare facilities due to drug diversion has become a major problem, with some potentially serious long-term effects to patients. Infection from drug diversion is not a matter of “if” anymore, but “when.” In this webinar, Kim New will discuss:
    •Methods diverters use that can spread infection
    •Long-term impact on both the patient and the hospital
    •Best practices to prevent the spread of infection and protect both the patient and your hospital


    PLEASE BE SURE TO TEST YOUR SYSTEM'S COMPATIBILITY ON THE BRIGHTTALK PLATFORM PRIOR TO ATTENDING THE EVENT TO ENSURE AN OPTIMAL EXPERIENCE. SMARTPHONES MAY NOT WORK DURING THE LIVE EVENT, BUT WILL WORK IN THE RECORDED PLAYBACK MODE AFTER THE EVENT.
  • They may be the oldest tricks in the book, but SQL injection and cross-site scripting (XSS) attacks still put a hurt on thousands of web applications every year, impacting millions of users—your users and customers. SIEM solutions are essential in finding these exposures quickly, by collecting and correlating data to spot patterns and alert you of an attack. Join us for this demo to learn more about how these attacks work and how AlienVault USM gives you the built-in intelligence you need to spot trouble quickly.
    You'll learn:
    How these attacks work and what you can do to protect your network
    What data you need to collect to identify the warning signs of an attack
    How to identify impacted assets so you can quickly limit the damage
    How AlienVault USM simplifies detection with built-in correlation rules & threat intelligence
  • In October 2013, the Prime Minister announced the £50 million Challenge Fund to help improve access to general practice and stimulate innovative ways of providing primary care services. Twenty pilot schemes were selected covering a wide variety of innovative ideas including extended opening hours, more ways for patients to access services and new services to better support patients with complex needs. Applications for £100 million of second wave of funding for 2015/16 have now taken place, so can we learn from some of those pilots involved in the first wave?
  • This workshop will introduce Corning® HepatoCells for ADME/Tox study. Derived from primary human hepatocytes, Corning HepatoCells are a renewable hepatocyte-like cell line and retain most of the physiological properties of their parental hepatocytes, such as mature hepatocyte-like morphology and induction response to prototypical inducers of CYP3A4, 1A2, and 2B6 similar to primary human hepatocytes. An overview of the characterization of Corning HepatoCells for ADME/Tox studies will be presented, along with using the model system for prediction of clinical CYP induction. The attendees will gain an understanding of the capability of Corning Hepatocyte-cells for drug ADME/Tox study.