Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
  • Achieving your ADME/Tox testing goals requires experience, quality data, and proper alignment with regulatory guidance. Failure to meet these important requirements can put your drug discovery and pre-clinical goals at risk.
    This presentation will provide an informative overview of how you can advance and reach your pre-clinical drug discovery goals. It will discuss the importance of core contract research capabilities, including enzyme induction, enzyme inhibition, and transporter interaction. In addition, we will review new capabilities and opportunities including CYP induction and SLC transporter assay services – all designed to align with regulatory agency guidance documents.

    Speaker Bio:
    David Stresser is the Program Manager of Corning® Gentest℠ Contract Research Services at Corning Life Sciences since 2001, having held prior positions of Product Manager and Study Director since joining Corning in 1998. Prior to this, he was a post-doctoral associate in the laboratory of David Kupfer at the University of Massachusetts Medical School in Worcester, Massachusetts. He did his graduate work in the laboratory of David E. Williams at Oregon State University in Corvallis, Oregon receiving a Ph.D. in toxicology in 1994. Dr. Stresser has authored or co-authored 40 articles or book chapters in the field of drug metabolism and has been an invited speaker at various national and international meetings, pharmaceutical companies, and universities.
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Cell therapy is the fastest growing segment of regenerative medicine. Cell therapy is comprised of immune cell therapy and stem cell therapy, with stem cell therapy making up the largest part of this market: it is estimated that the global stem cell therapy market will reach $40 billion by 2020 and $180 billion by 2030.

    Many factors determine the rate at which the stem cell therapy market advances. It is driven by the success of stem cell treatments in curing life-threatening diseases such as cancer, heart diseases and neuromuscular diseases in the worlds aging populations. In contrast, stem cell market growth rate is hindered by manufacturing and regulatory concerns. For example, if only 20% of the 318 global late stage clinical trials are approved for release on the market, there will not be enough stem cell therapy manufacturing facilities to produce the 64 resulting products. This is due, in part, to funding concerns, the high cost of build-out as well as cGMP compliance, standardization of production processes, and ever changing industry regulations.

    Join us as we discuss these and other key topics.
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • There are many decisions when choosing a video conferencing solution. Free versus subscription? Cloud solution or not? What type of video system is best suited for your meeting rooms? Join Gagan Verma, Regional Director of Lifesize, in this webinar where he will breakdown the top five considerations of video conferencing for 2015. Gagan will also elaborate on the competitive landscape and which solutions best fit your company’s needs.

    For enquiry: apac-mktg@lifesize.com or +65 6303 8379
  • Next to performance and scalability, cost efficiency is one of the top three reasons most companies cite as their motivations for acquiring storage technology. Businesses are struggling to control the storage costs, and to reduce OPEX costs for administrative staff, infrastructure and data management, and environmental and energy. Every storage vendor, it seems, including most of the Software-defined Storage purveyors, are promising ROIs that require nothing short of a suspension of disbelief.

    In this presentation, Jon Toigo of the Data Management Institute digs out the root causes of high storage costs and sketches out a prescription for addressing them. He is joined by Ibrahim “Ibby” Rahmani of DataCore Software, who will address the specific cost efficiency advantages that are being realized by customers of Software-defined Storage.
  • Wie Sie sicher wissen, untersagt das deutsche Bundesdatenschutzgesetz in seiner Zweckbindungsklausel das Verwenden von sensitiven Echtdaten in Test-, Entwicklungs- und Schulungssystemen. Dennoch sehen wir, dass eine Vielzahl von Unternehmen dieses Risiko immer noch eingeht und sich davor scheut, die nötigen Anpassungen durchzuführen.

    Die deutsche Versicherungswirtschaft begegnet diesem Thema mit dem Code of Conduct über den GDV als Vorreiter nun offensiv.

    Der GDV (Gesamtverband der deutschen Versicherer) ist der erste Verband in Deutschland, der für eine freiwillige Selbstverpflichtung zum Schutz von personenbezogenen Versichertendaten die Zustimmung der Datenschutzbehörden erhalten hat.

    Sämtliche deutschen Versicherungsunternehmen die dem Code of Conduct (CoC) bis Ende 2014 beigetreten sind haben sich damit verpflichtet, dem Datenschutzkodex des GDV innerhalb von 3 Jahren gerecht zu werden.

    Mit den neuen Verhaltensregeln wird transparent, was von der Antragstellung bis zur Schadenregulierung mit personenbezogenen Daten geschieht.

    Lernen Sie wie Informatica die Anforderungen aus dem CoC (Anonymisierung für sensitive Daten in Produktion sowie Test & Entwicklung) umsetzt und gleichzeitig Ihr Testdatenmanagement modernisieren kann.

    Da gemäß BSDSG als auch neuester EU-Novelle Datenschutz ein branchenübergreifendes Thema ist, sind alle Interessenten herzlich zu diesem Webinar eingeladen, die direkt (z.B. Datenschützer) oder indirekt (z.B. Test-Manager, Enterprise Architekten) mit dem Thema konfrontiert werden.

    Unternehmensweiter Datenschutz vom Marktführer – seien sie dabei !
  • Large enterprises want to use all the data they can get to earn the trust and the dollars of their customers. At the same time, they must secure this data, which is increasingly the target of sophisticated cyber-attacks. Traditional triple A (access, authentication and audit) security solutions are no longer sufficient-data-centric security must be added to the mix. In this webinar, join Stratecast | Frost & Sullivan, HP Security Voltage and (ISC)2 on July 16, 2015 at 1:00PM Eastern for an examination of ICT technology trends and business policies that have brought us to this point and how format preserving encryption can be used to protect data at rest, in motion and in use.
  • RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.
  • RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.
  • This free webinar will summarise the results of the HFMA’s NHS Financial Temperature Check survey of UK finance directors and chief financial officers, published in early July. You will hear from Paul Briddock, HFMA Director of Technical and Policy, about the financial outlook for the NHS, the views of finance directors from 209 NHS organisations and what the HFMA thinks needs to happen to ensure the NHS can meet the financial challenges ahead.
  • If you’re running production workloads on Amazon Web Services, you’ve probably seen some of the limitations to AWS’ monitoring capability. HOSTING has a great solution to this! In partnership with ScienceLogic, and as part of our Unified Cloud vision, HOSTING is pleased to offer infrastructure monitoring for AWS. Join us for a live demonstration of this comprehensive alternative to AWS monitoring. We’ll review the AWS monitoring platform in terms of strengths and weaknesses, and compare it to the HOSTING offering. We’ll close with a live demonstration of our capabilities and a Q&A session.
  • The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being seen today, and what could be around the corner tomorrow? Join Check Point Software and (ISC)2 on July 9, 2015 at 1:00PM Eastern for a roundtable discussion on tackling mobile security challenges to keep on-the-go employees productive and your enterprise secure.
  • Understanding your customers is fundamental to effective communication. Current segmentation strategies draw on ever more detailed information about how patients, physicians and payers behave through the use of open source, social media and real world data. However, segmentation still lacks clear insight into why these stakeholders behave as they do – and therefore how best to change their behaviour.
    Working with behavioural change experts Hamell, this one hour live discussion will look at why current segmentation strategies are failing, and the importance of understanding what drives patient or customer behaviour. Using case studies, speakers will explore how segmenting by behavioural drivers can create advanced, effective strategies to change patient, customer and payer behaviour.
    This event will focus on three key areas:

    •The theory behind behavioural segmentation and how it challenges the status quo
    •Benefits of behavioural segmentation communication strategies and the problems answered by behavioural segmentation strategies
    •Behavioural segmentation in action: practical application of this approach
  • The professional use of social media in healthcare is fast becoming the default way to share information, ideas, support and expertise on a global scale. Join this webinar to go beyond the basics and learn how to build a lasting community.
  • Informatica and HighPoint Solutions will be co-hosting a panel discussion with leading global Pharmaceutical companies where they will discuss the challenges, solutions and most importantly, how their companies can benefit from IDMP compliance.
  • Government funding for health and social care over the next decade is a key concern for commissioners, providers and service users. As financial and service pressures facing the NHS and local government intensify, the need for integrated care to improve people’s experience of health and care, the outcomes achieved and the efficient use of resources will only grow. On top of facing a predicted financial crisis in the NHS and local government as austerity 2.0 comes into effect, the sectors are facing significant increases in demand which could prove all but impossible to meet. What is the long view? And to what extent can a more integrated approach to managing health deal with this dilemma?
  • Life sciences companies need to make better use of the insights that real world data (RWD) can provide in order to improve market access, sales and market growth strategies – and ultimately to improve the applicability of new and existing therapeutics for patients. Insights come not just from the multiple sources of RWD available, but from advanced analytics that highlight the effectiveness of a treatment by geographic area, and link healthcare providers, institutions and patients to relevant and meaningful outcomes.

    This one-hour event will take a hands-on approach – detailing how insights derived from RWD (and collaboratively with other sources) are enabling all elements of the life science industry to do things better.

    Insights experts Robin Munro and Christian Marcazzo will deliver case studies on how RWD can help life science companies in:

    Sales and Marketing – incorporate RWD and evidence into segmentation, targeting, and engagement of physicians and institutions
    Commercial Effectiveness – measure commercial campaigns, and demonstrate the impact to the healthcare system
    Medical Affairs – find and engage medical education prospects and target appropriate healthcare authorities, healthcare professionals and payers, to improve quality of care and outcomes
    Public Affairs and Market Access – develop qualitative and quantitative insights to design education, advocacy and access-related campaigns within the healthcare ecosystem

    The event will also give an exclusive look at what can be achieved from combining data sources – using Diabetes in England as a case study, Zephyr has implemented novel methods to demonstrate an evidence-based approach to improving information sharing within sales teams and to engaging accounts and payers. We explore how patient outcomes from RWD can add value to commercial strategy.
  • Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:

    In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn

    · How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds

    · What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others

    · How to understand and clarify overlaps and conflicts between documents in your regulatory requirements

    · How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously

    Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.