Hi [[ session.user.profile.firstName ]]

Health IT

  • Making Risk Meaningful
    Making Risk Meaningful Adam Billings, Lockpath Recorded: May 24 2018 44 mins
    How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:

    · Common methodologies for interpreting risk

    · Status of risk management in your organization

    · Frameworks and strategies for seeing risk in a new light

    · Keys to success in advancing your risk program

    There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
  • Ransomware:  The Not So Good, Really Bad and Truly Ugly!
    Ransomware:  The Not So Good, Really Bad and Truly Ugly! Erich Kron CISSP, Security Awareness Advocate Recorded: May 23 2018 54 mins
    Ransomware is spreading at an alarming pace and infecting networks across all industries and company sizes, primarily through phishing attacks. The cyber criminals behind the attacks are furiously innovating and keeping ahead of the defenses. In this session, we will have an interactive discussion related to the latest in ransomware threats and how to best protect your organization and yourself against this growing threat.
     
    This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also discuss recent attacks and how the organizations could have better protected themselves.
     
    The session will examine:
     
    •         Current phishing trends
    •         Ransomware and how it is infecting networks
    •         Effective mitigation strategies
    •         Recovering from an attack
  • Getting to Grips with the GDPR: How to Fast-Track Your Compliance
    Getting to Grips with the GDPR: How to Fast-Track Your Compliance Phil Lee, Partner at Fieldfisher and Jacqueline de Gernier, AVP at DocuSign Recorded: May 23 2018 32 mins
    The General Data Protection Regulation (GDPR) represents the most important data protection regulation change in 20 years. All companies processing and holding the personal data of subjects residing in the EU must comply once it comes into effect on 25 May 2018, regardless of location.

    One of the biggest changes is around obtaining consent to use personal data. The new requirements not only impact how businesses attain and renew consent but also introduce the need to record the details for auditing purposes.

    Hear from Phil Lee, Partner at Fieldfisher, who will discuss the key changes under the GDPR, the challenges facing businesses, and how digital tools like eSignatures can streamline your compliance.

    Join this webinar to understand:

    - The impacts of the GDPR on businesses
    - How to obtain and record consent in a compliant manner
    - How to re-procure suppliers with contracts that contain the terms of the GDPR
    - How digital tools can be part of a GDPR solution
  • Comparison of Hemoglobin A1c Test Methods in the Clinical Lab
    Comparison of Hemoglobin A1c Test Methods in the Clinical Lab Brooke Medaugh Recorded: May 22 2018 30 mins
    Clinical laboratories must provide precise and accurate results while managing increasing test volumes and shrinking reimbursement rates. The importance of HbA1c testing to patient monitoring in diabetes mellitus is well known. However because of the multiple commercially available methodologies, selecting the method that is best for your lab can be a challenge. This webinar will address the current state of HbA1c testing in the clinical laboratory, considerations for each test methodology, and provide a solution for integrating HbA1c testing into existing labs.

    Join this webinar to learn:

    1. What are the common methods of HbA1c detection in use today?
    2. What are the advantages and disadvantages of each?
    3. How do different methods compare?
    4. A potential solution for integrating HbA1c testing into your existing lab workflow.
  • Understanding What's Blocking Digital Transformation (DX)
    Understanding What's Blocking Digital Transformation (DX) Joseph Pucciarelli, Group Vice President, IDC IT Executive Programs Recorded: May 21 2018 2 mins
    Watch this video to understand where IT and business leaders are being challenged in their digital transformation journey and key ways to take on the challenges.
  • AI – Warriors and Weapons
    AI – Warriors and Weapons Dr. Umesh Hodeghatta Rao, CTO, and Umesha Nayak, CEO, Nu-Sigma Analytics Labs Recorded: May 17 2018 53 mins
    Artificial Intelligence, Machine Learning, Deep Learning are the buzz words across the globe today. Businesses, as well as people, are trying to make out if it is simply hype or not. While there is hope there is also gloom somewhere, as far as AI is concerned. There is a lot of work to be done to ensure effective and valid deployment of AI solutions.

    Today’s AI concern is Frameworks and toolsets to manage the entire lifecycle in an integrated manner to ensure dependable results - which is the burgeoning need for AI to move forward. In this discussion, we will be focussing on some of the important challenges faced with respect to resources, frameworks, tools, and techniques for implementing AI and also the direction it is trending towards.
  • A Bias for Action: Security Analytics for the Advanced SOC
    A Bias for Action: Security Analytics for the Advanced SOC Jon Oltsik, Sr. Principal Analyst, ESG, and Barbara Kay, Sr. Dir. Security, ExtraHop Recorded: May 17 2018 64 mins
    Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.

    The foundation of a successful security architecture in this model requires:
    - Rich, trustworthy data covering all aspects of the environment
    - Consolidated data sources and analytics processes
    - Automated investigation and response capabilities
    - Integration between tools and services for total coverage of every critical asset and data set.

    In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
  • GDPR: Have Questions? Ask the Experts!
    GDPR: Have Questions? Ask the Experts! Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: May 17 2018 63 mins
    The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.

    Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:

    - What is GDPR and who is affected?
    - How will GDPR impact organizations outside the EU?
    - What is meant by personal data in the context of GDPR?
    - What are some of the steps and effective tools you need to comply?
    - What should your incident response plan look like in the event of a breach?
    - What happens to companies that fail to comply?

    We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager, AlienVault

    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
  • 3D Imaging of 3D Cell Culture Models
    3D Imaging of 3D Cell Culture Models Tom Villani, Ph.D., Ann Rossi, Ph.D. Recorded: May 17 2018 60 mins
    One of the obstacles to working with 3D cell cultures is how to extract meaningful data from them. To address this problem, Visikol has developed their Visikol® HISTO-M™ tissue clearing reagent that allows for complete 3D cell culture characterization using confocal imaging or a 3-fold increase in cells detected using wide-field microscopy. This tissue clearing approach has been developed to be rapid and compatible with multi-well plates so that it can be conducted using automated pipetting robots and high content confocal imaging systems.
    By attending this webinar you will learn about:
    • Methods to enable 3D cell culture
    • Ways to enhance imaging and characterization of 3D spheroids

    Presenter Bios:
    Dr. Tom Villani is the CSO and Co-founder of Visikol Inc and is responsible for the companies scientific strategy. Since launching Visikol with Co-Founders Dr. Michael Johnson and Nick Crider, Dr. Villani has led the development of the Visikol HISTO tissue clearing technology for three-dimensional tissue imaging as well as a suite of digital pathology tools. Visikol has leveraged these technologies in its 3Screen service offering where the company is focused on transforming tissues into actionable insights as a service for primarily pharmaceutical companies.

    Dr. Ann Rossi graduated from the University of Rochester School of Medicine and Dentistry with a Ph.D. in Pharmacology and received postdoctoral training at the University of Chicago. Prior to joining Corning, Ann worked as a Senior Scientist at ARMGO Pharma, Inc., a small private pharmaceutical company, contributing her expertise in calcium signaling toward developing new assays for the company’s screening cascade. Ann is new to Corning Life Sciences as the Applications Lab Manager in Kennebunk, Maine and is drawing on her strong academic and industry research experience to direct the activities of the applications group.
  • From BI to AI
    From BI to AI Naser Ali, Head of Solutions Marketing, Hitachi Vantara Recorded: May 16 2018 38 mins
    Business intelligence is evolving from traditional look-back analysis to forward-thinking prediction and prescription. Join Naser Ali of Hitachi Vantara in this webinar where he'll cover the following concepts:

    - Understanding why AI isn’t an academic pursuit or anything like traditional analysis
    - Why the value of AI comes from developing whole new processes
    - What to expect and when on the journey to predictive and prescriptive outcomes
    - A skills and infrastructure checklist
    - Plus: Gotchas - spotting the pitfalls and roadblocks
  • Enhancing GDPR Compliance: How to Obtain Consent with DocuSign
    Enhancing GDPR Compliance: How to Obtain Consent with DocuSign Tom Wilson and Iain Jones of DocuSign, Paul Day of Filestream Recorded: May 16 2018 26 mins
    Under the GDPR, consent must be obtained in an understandable and easily digestible format, using clear and simple language. By offering people genuine choice and control over how you use their data, it helps you build trust and enhance your reputation.

    The problem for a lot of businesses is that their legacy systems usually don’t document the level of data required to prove that a valid, unambiguous consent or contractual acceptance was obtained. Manual processes and paper plague the most common transactions and introduce friction in the moments that matter most to their business.

    Whether acquiring consent from new customers or renewing consent from your existing database, you can do so with DocuSign’s secure and user-friendly solution. Attend this webinar to:

    - Learn how DocuSign's eSignature solution can help customers collect consent to demonstrate compliance
    - See a demo of DocuSign's consent-capture process, with built-in documentation and tracking
    - Hear from Filestream's Technical Director on how the company is using DocuSign for GDPR purposes
  • Securing the Human Layer
    Securing the Human Layer Perry Carpenter, Chief Evangelist and Strategy Officer Recorded: May 4 2018 49 mins
    The intersection between technology and human security is a difficult challenge for any organization to tackle, and although detection technologies are advancing, criminals are rapidly evolving their techniques and tactics to even greater levels of sophistication.

    Their attacks are difficult to detect, and even security administrators themselves fall victim.

    Join Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, as he explains the value of better understanding human nature, patterns and success practices when using technology to build a more secure operating environment. Hear practical advice on how to make both security and technology work with (rather than against) human nature to help reduce technology friction and simultaneously raise the security posture and resilience of the organization.

    Topics Perry covers:
    - Looking at the multi-dimensional nature of security
    - Finding relevant intersections between technology and behavior
    - Strategies to make awareness stick
    - Brainstorming activities for planning your custom "Human Firewall"
  • Roadmap to Smarter Vendor Risk Management
    Roadmap to Smarter Vendor Risk Management Lockpath Recorded: May 3 2018 37 mins
    Vendors are essential to your company's success; however, they also add a layer of risk. A data breach is often traced to a service provider. A supplier botches a shipment and upsets a key customer. For risk challenges with vendors, the answer is proactive vendor risk management. In this webinar, you'll learn the roadmap to smarter vendor risk management, including:

    · Guidance on managing collected vendor data
    · Time-saving features with assessments
    · Tips on spotting trends and high-risk vendors
    · Pros and cons of continuous monitoring
    · Impact of vendor risk on operational risk

    Don't wait for an incident or a high-level exec questioning your vendor risk management processes to get smarter about vendor risk management. Learn smart strategies for the road ahead in VRM. Register for this webinar.
  • 3D Printing: Market Spending and Trend Outlook for 2018 and Beyond
    3D Printing: Market Spending and Trend Outlook for 2018 and Beyond Marianne D'Aquila & Tim Greene Recorded: May 1 2018 35 mins
    3D printing solutions have moved well beyond prototyping to become prevalent within and across multiple industries. End users will realize the long-term value this innovative technology holds. Organizations continue to move beyond pilot deployments to realize the promise of 3D printing. To help vendors, capitalize on the opportunity, we will share market insights and data on the key 3D printing use cases and trends shaping the global landscape.
  • How to Integrate Hyperconverged Systems with Existing SANs
    How to Integrate Hyperconverged Systems with Existing SANs Augie Gonzalez, Director of Product Marketing - DataCore Software Recorded: Apr 24 2018 40 mins
    Hyperconverged systems offer a great deal of promise and yet come with a set of limitations.

    While they allow enterprises to re-integrate system components into a single enclosure and reduce the physical complexity, floor space and cost of supporting a workload in the data center, they also often will not support existing storage in local SANs or offered by cloud service providers.

    However, there are solutions available to address these challenges and allow hyperconverged systems to realize their promise. Sign up to discover:
    • What are hyperconverged systems?
    • What challenges do they pose?
    • What should the ideal solution to those challenges look like?
    • A solution that helps integrate hyperconverged systems with existing SANs
  • Transform Your Appliance: adopt a modern hyper-converged architecture
    Transform Your Appliance: adopt a modern hyper-converged architecture Quentin Esterhuizen, Sr Product Mgr, Storage & Josh Adkinson, Business Development Mgr - both of Dell EMC OEM Solutions Group Recorded: Apr 24 2018 36 mins
    Cloud adoption continues to grow with an increasing number of customers choosing this operating model for their data, virtual machines and applications. The traditional appliance must evolve to provide a more cloud like experience for your customers who are experiencing a digital transformation.

    In the session we will be covering:
    *Overview of the two HCI strategies you can adopt
    *Benefits of adopting a modern HCI architecture
    *The Dell EMC OEM solutions approach
    *Q&A
  • What is covered in AI Warriors and Weapons AI-inar on May 17th
    What is covered in AI Warriors and Weapons AI-inar on May 17th Dr. Umesh Hodeghatta CTO, and Umesha Nayak, N-U Sigma U-Square Analytics Lab Recorded: Apr 24 2018 3 mins
    Artificial Intelligence, Machine Learning, Deep Learning are the buzz words across the globe today. Businesses as well as people are trying to make out if it is hype or not. While there is a hope there is also gloom somewhere, as far as AI is concerned. Lots of work needs to be done to ensure effective and valid deployment of AI solutions. Today’s AI concern is Frameworks and toolsets to manage the entire lifecycle in an integrated way to ensure dependable results is the beckoning need for AI going forward. In this discussion, we will be focussing on some of the important challenges faced with respect to the resources, frameworks, tools and techniques and also the direction AI is trending towards.
  • Making Awareness Stick: Secrets to a Successful Security Awareness Program
    Making Awareness Stick: Secrets to a Successful Security Awareness Program Erich Kron CISSP, Security Awareness Advocate Recorded: Apr 18 2018 51 mins
    With 91% of data breaches being the result of human error, security leaders, auditors, and regulators increasingly recognize that a more intentional focus on the human side of security is critical to the protection of organizations. However, organizations have been struggling with and debating the effectiveness of traditional security awareness and training.

    Join Erich Kron, Security Awareness Advocate at KnowBe4, for this webinar "Making Awareness Stick: Secrets to a Successful Security Awareness Training Program" as he shares results-focused strategies and practical insight on how to build a world-class program.

    Key topics covered in this webinar:
    - Why awareness and training matters
    - Key data points to help make the case for awareness in your organization
    - Five secrets to making awareness work in 2018
    - How to create your "Human Firewall"

    Make this the year that you refuse to settle for mediocrity. Are you ready to go all-in?
  • Maintaining Mission-Critical Levels of Availability in Healthcare
    Maintaining Mission-Critical Levels of Availability in Healthcare Bob Strachan & Giovanni Greci, Solutions Architects - DataCore Software; Gabriel Sandu, CTO - Maimonides Medical Center Recorded: Apr 18 2018 58 mins
    Running mission-critical applications and providing continuous access to data are the lifeblood of any healthcare organization. That’s why a business continuity plan is uniquely important to the healthcare sector.

    Hear directly from Maimonides Medical Center’s CTO Gabriel Sandu as he shares how their organization uses software-defined storage as a strategic solution to achieve their business continuity plans.

    DataCore has been assisting many hospitals and healthcare organizations throughout the world in building upon their continuity planning efforts.

    During this webinar, our technical business continuity experts will walk you through real-life healthcare disaster incidents. They will share how major hospitals have survived hurricanes, floods, power outages and building failures by using software-defined storage to provide uninterrupted operations to applications and critical medical data systems during crisis events.

    Join this session and learn how DataCore’s software empowers business continuity for healthcare organizations such as New York-Presbyterian, Mount Sinai, Maimonides Medical Center, and Englewood Hospital and Medical Center.
  • Building Blocks for Your IT Security Program
    Building Blocks for Your IT Security Program Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Apr 12 2018 61 mins
    Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.

    View this on-demand webcast and demo to see how the AlienVault Unified Security Management platform can help with these essential capabilities:

    - Discover all assets across your cloud and on-premises environments
    - Get alerted when new assets connect to the network
    - Schedule vulnerability scans of individual assets, asset groups or entire networks
    - Prioritize vulnerabilities by severity and likelihood of exploit
    - Quickly identify availability of patches, saving time researching each vulnerability

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Effizientes Informationssicherheitsmanagement (ISMS) mit Cherwell
    Effizientes Informationssicherheitsmanagement (ISMS) mit Cherwell Patrick Schweichler, Implementation Specialist, DextraData GmbH Recorded: Apr 11 2018 57 mins
    Im Zusammenhang mit der ab 25. Mai 2018 gültigen EU Datenschutzgrundverordnung (DSVGO) ergeben sich für Unternehmen neue Compliance-Verpflichtungen. So müssen sie u.a. die Sicherheit personenbezogener Daten durch ein Informationssicherheitskonzept garantieren.

    Patrick Schweichler, Implementation Specialist bei DextraData, zeigt Ihnen in unserem exklusiven Webcast, wie Unternehmen von Cherwell mergeable Apps und einem kostengünstigen, effizienten und gesetzeskonformen Informationssicherheitsmanagement profitieren. Mit mApps von Cherwell können Sie der Wirksamkeit der EU-Datenschutzgrundverordnung (DSGVO) gelassen entgegensehen.

    Der Webcast richtet sich insbesondere an IT-Service Verantwortliche, Service Manager, Operations-Verantwortliche und Datenschutzbeauftragte, die sich mit dem Thema Informationssicherheitsmanagement beschäftigen.

    Agenda

    Lernen Sie die Vorteile der Cherwell mergeable Applications kennen
    Übersichtlich und komfortabel: Die ISMS mApp im Detail
    Live Demo
    Wrap Up
    Q & A
  • The Laboratory’s Role in the National Healthcare Safety Network
    The Laboratory’s Role in the National Healthcare Safety Network Robert L. Sautter, Ph.D., HCLD (ABB), CC Recorded: Apr 9 2018 58 mins
    In this webinar, Dr. Sautter will discuss the important collaboration efforts between the government and healthcare facilities to stop prevalent and dangerous hospital-acquired infections. After the webinar, you will be able to:

    • Explain how the laboratory and the NHSN can work together to lower infection rates in hospitals
    • Learn how to lower rates of infections, such as blood culture contamination, MRSA and C. difficile
    • Identify how pre-analytic culture collection can affect the results of clean catch and catheter-related infections
    • Discuss how laboratories can work together with the NHSN, an infection surveillance program created by the CDC to eliminate HAIs, to identify problem areas and measure the progress of prevention initiatives

    P.A.C.E. credit* is available for your participation at http://qmark.beckmancoulter.com/r/325Safety.html

    Presenter: Dr. Sautter is a teacher, lecturer and industry consultant. He earned his B.S. and M.S. degrees from Eastern Michigan University in the areas of biology and molecular biology, respectively, and his Ph.D., from Wayne State University, in Detroit, Mich., in microbiology. During his career, he held positions as a medical technologist, director of microbiology and medical director for a number of laboratories, before becoming an esteemed consultant for a variety of industry leaders in the area of microbiology.

    *Beckman Coulter Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E.® Program. These credits are recognized by the State of California. Most programs also provide State of Florida credits (with valid license number). At this time, we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It?
    Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Speakers: Ajay Uggirala, Product Marketing, Imperva; Marty Jost, Sen Product Mktg Mgr; Brandon Dunlap, Brightfly (Moderator) Recorded: Apr 5 2018 59 mins
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
  • Roadmap to Smarter IT Risk Management
    Roadmap to Smarter IT Risk Management Sam Abadir - Lockpath Recorded: Apr 5 2018 47 mins
    The latest data breach or vulnerability may capture headlines and prompt speculation, but where the rubber meets the road is being smarter about IT risk management (ITRM). In this webinar, you'll learn what being wiser entails, including:

    · What IT and security disciplines ITRM encompasses
    · How to tailor your ITRM message to different departments
    · Strategies for working with cross-functional teams
    · Advantages and disadvantages of using spreadsheets
    · Quick wins and ideas for sustained growth

    Don't wait for a breach or a vulnerability to get smarter about ITRM. Learn what you need to know to get where you're going. Register for this webinar.
  • So liefern Sie transformatorische Geschäftsprojekte mithilfe des Projektportfoli
    So liefern Sie transformatorische Geschäftsprojekte mithilfe des Projektportfoli Oliver Stöeckl - Software Senior Solution Consultant May 30 2018 8:00 am UTC 60 mins
    Angesichts der immer schneller voranschreitenden digitalen Transformation steht Ihr IT-Team mehr denn je unter Druck, neue Initiativen zu ergreifen. Aber wie priorisieren und führen Sie Transformationsprojekte mit eingeschränkter Transparenz in Bezug auf Kosten, Nachfrage, verfügbare Ressourcen und Geschäftsauswirkungen durch?
    In diesem Webinar erfahren Sie, wie Sie mit der neuen PPM-Lösung von Cherwell Ihre Unternehmensziele durch eine verbesserte Projektpriorisierung, bessere Planung und fortlaufende Transparenz erreichen.
    Wir demonstrieren Ihnen wichtige Funktionen, mit denen Sie:
    •Priorisieren Sie alle Ideen und Projektanfragen durch eine Bewertungsmatrix
    •Visualisieren Sie den Status und die Gesundheit von Projekten in Ihren Portfolios
    •Sehen Sie sich auf einen Blick den Status einzelner Projekte an und erfahren Sie mehr über bestimmte Projektdetails
    •Bewerten Sie die Ressourcenkapazität und Verfügbarkeit für Ihre Projekte
  • From Disaster to Recovery: Preparing Your IT for the Unexpected
    From Disaster to Recovery: Preparing Your IT for the Unexpected Alfons Michels, Sr. Product Marketing Manager - DataCore Software May 30 2018 5:00 pm UTC 45 mins
    Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?

    The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.

    How would you like to minimize or even eliminate these business interruptions, and more?

    Join us to discover:

    • Useful and simple measures to use that can help you keep the lights on
    • How to quickly recover when the worst-case scenario occurs
    • How to achieve zero downtime and high availability
  • The Rise of Digital Enterprise: Growth Strategies for Healthcare Companies
    The Rise of Digital Enterprise: Growth Strategies for Healthcare Companies Nitin Naik, Slava Akmaev Chief Analytics Officer, BERG, Guillaume Kerboul, Dassault Systemes; Dr. Thorsten Harzer, QIAGEN May 31 2018 3:00 pm UTC 75 mins
    Digital Transformation is powering growth opportunities in Smart R&D, Patient Engagement, and Healthcare eCommerce. The explosion of patient centricity and technological advancement in big data analytics, cloud and artificial intelligence are putting severe pressures on companies to leverage all types of data (clinical, social media, IOT, etc.) in innovative ways. While the industry is decidedly upbeat on this new trajectory, there are heightened concerns about managing data privacy, especially for data flows outside the traditional ecosystem.

    Key Takeaways:
    • Learn about trends and growth opportunities in the Life sciences IT sector
    • Discuss hot topics, including Smart R&D, Digital Manufacturing, Connected patient and IVD eCommerce (B2C models)
    • Hear from industry leaders about company growth strategies and best practices for implementing digital solutions
    • Gain perspectives on M&A’s and the impact of investments from Big Tech companies
  • Scientific Data Explosion: Adapting IT Infrastructure So Research Can Thrive
    Scientific Data Explosion: Adapting IT Infrastructure So Research Can Thrive Adam Kraut, BioTeam - Scott Jeschonek, Avere Systems - Tim Carroll, Microsoft Azure Jun 6 2018 7:00 pm UTC 60 mins
    The advancements in scientific computing and healthcare are coming fast—from next generation sequencing onto precision medicine, “big data” and artificial intelligence. We’re embarking on a massive convergence of clinical analysis and information systems, and many are not prepared. With these advancements in technologies, comes higher demand for both compute and storage to degrees difficult to comprehend. An NCBI published study predicts that up to 40 exabytes of storage capacity will be needed by 2025 just to support the growth of sequenced human genomes.
    Adapting to this exciting shift in science will require changes in the way we think about IT infrastructure. In this webinar, BioTeam’s Adam Kraut will discuss…

    •How science changes faster than IT infrastructure, and what we can do to keep pace.
    •Converged infrastructures and their impact on research productivity.
    •How machine learning and microservices are changing the way we architect Cloud solutions.

    In addition, you’ll hear how companies are already supporting HPC workloads in hybrid cloud environments to increase analytic throughput efficiently. These workloads supply adaptability to changing research needs, integration into existing resources, and scalability to support growing demand for both compute and storage capacity.
  • Digital Transformation: Spending Review and Outlook
    Digital Transformation: Spending Review and Outlook Eileen Smith, Shawn Fitzgerald, Craig Simpson Jun 7 2018 3:00 pm UTC 60 mins
    Love it or hate it, Digital Transformation is at the center of industry leading organizations. Digital Transformation is not simply a list of IT projects, it involves completely rethinking how an organization uses technology to pursuit new revenue streams, products, services and business models. In this webinar we will share with you IDC's concept of building a business case around digital transformation, and the broader strategic priorities of organizations connected to digital transformation working together to deliver business objectives. We will share market insight into the regional and industry use cases driving investment in Digital Transformation, providing an in-depth view of the Digital Transformation spending outlook connected to business use cases.
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy
    Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod) Jun 12 2018 5:00 pm UTC 75 mins
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
  • How to Ensure High-Performing Microsoft .NET Applications
    How to Ensure High-Performing Microsoft .NET Applications John Worthington, Director of Product Marketing, at eG Innovations Jun 12 2018 6:30 pm UTC 60 mins
    In today’s distributed application ecosystems, with various inter-dependencies and dynamic infrastructures, it is extremely challenging to detect and resolve application failures and performance slowdowns. This is especially true in a Microsoft .NET application stack. Developers, IT Operations Staffs and Site Reliability Engineers often get involved in long war room sessions to isolate the root cause of poor customer experience in the digital business service.

    Join this webinar “How to Ensure High-Performing Microsoft .NET Applications”, by John Worthington, Director of Product Marketing at eG Innovations, as he explores the various problems that could affect .NET application performance and discusses industry best practices for effective performance monitoring.

    Learn how a converged application and infrastructure monitoring strategy can help:

    - Detect digital experience issues in real time
    - Analyze critical business transactions and diagnose slowdowns
    - Get .NET method-level visibility to fix application code issues
    - Understand application dependencies with underlying infrastructure (IIS, Hyper-V, SQL, Azure, etc.)
    - Auto-correlate alerts and isolate the root cause of performance problems

    Join the webinar and become a .NET performance guru
  • What’s Your Network Firewall Hiding from You?
    What’s Your Network Firewall Hiding from You? Chris McCormick, Sen Prod Mgr, Sophos; Bruce Beam, Dir, TPO, (ISC)2; Brandon Dunlap, Moderator Jun 14 2018 4:00 pm UTC 75 mins
    Your network firewall isn’t being honest with you. According to a recent survey conducted by Sophos that gathered responses from 2,700 IT managers at mid-sized organization, network firewalls can’t disclose what up to 45% of the bandwidth is being consumed by. Additionally, they are failing to protect the organizations they are deployed in and this inefficiency is costing time and money. Why is this happening? What can be done to correct it? Join Sophos and (ISC)2 on June 14, 2018 at 12:00PM Eastern for a wide ranging discussion about this survey, the results and what can be done to get the best information and performance from your network firewall.
  • Under the Hood with AlienVault Labs: Leveraging Threat Intelligence
    Under the Hood with AlienVault Labs: Leveraging Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault & Chris Doman, Threat Engineer, OTX, AlienVault Jun 14 2018 4:00 pm UTC 60 mins
    Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?

    Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.

    We'll cover:

    - What threat intelligence is, and how it speeds threat detection and incident response
    - Key questions to help you evaluate threat intelligence sources
    - How the AlienVault Labs team analyzes threat data, and turns it into actionable information
    - How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.

    Chris Doman
    Threat Engineer, OTX
    Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
  • Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel
    Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel Jessica Hardy, (ISC)² Director of Customer Experience Jun 19 2018 5:00 pm UTC 75 mins
    (ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join Jessica Hardy, (ISC)²’s Director of Customer Experience, for a virtual Town Hall meeting on June 19, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
  • Connecting Clinical and Non-Clinical Systems Using Anypoint Platform
    Connecting Clinical and Non-Clinical Systems Using Anypoint Platform Matt Serna, Healthcare Marketing Manager; Gregg Prothero, Solution Consulting; Maxim Abrams, Product Management Jun 19 2018 6:00 pm UTC 60 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Attendees will learn:

    - Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
    - How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
    - How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
  • Why Cloud Adoption is Different in Europe?
    Why Cloud Adoption is Different in Europe? Carla Arend and Angela Vacca Jun 20 2018 1:00 pm UTC 45 mins
    The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
    IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
  • How to make digital work in medtech
    How to make digital work in medtech Bryn Davies (Critical Insights), Lars U. Diemer (Agnitio), Markus Ott (Ascensia), Dominic Tyer (pharmaphorum) Jun 21 2018 11:00 am UTC 75 mins
    The rise of mobile devices and apps, not to mention the involvement of non-medical technology players, is creating a wave of irrevocable digital change for medtech.
    It’s transforming how the sector reaches and engages with its stakeholders and customers, and in doing so provides vital opportunities to reshape a company’s commercial model.
    But although the sector can lay claim to some key success stories with digital technology, there remain a number of roadblocks impeding real digital progress for medtech.

    In this webinar we will discuss key digital lessons for medtech from other healthcare sectors, steps to take for a successful digital transformation and how to ensure ROI from digital technology.
    The free webinar will also see our expert panel:
    •Explore the practical impacts of the new medtech business model
    •Re-think the customer experience for payers and HCPs
    •Learn how digital technology enables you to deliver more customer value – while powering commercial success
    •Find out how virtual engagement technologies can make it happen
    •See best practices and use cases from your peers
  • Achieving superior care coordination: The Generic Telemedicine Platform
    Achieving superior care coordination: The Generic Telemedicine Platform Jonas Knudsen, IDC Research Director and Anne Friis Hansen, Team coordinator, The Region of Southern Denmark Jun 21 2018 12:00 pm UTC 45 mins
    With 3rd Platform technologies, hospitals are entering an era when operations, processes, and technology are tightly linked to patients and other providers. Hospital boundaries blur, thereby triggering collaboration between sectors to enable a true integrated and personalized care service delivery model. Hospital managers (CEO, CIO, CMO) are challenged to move their enterprises to the next level — that of digital business transformation — implementing digital solutions, new business models, and innovation initiatives.
    But how is it done in real life? The Region of Southern Denmark has an enterprise wide adopted solution that include hospitals, GPs, Municipalities and regional authorities and they are happy to share their knowledge, experience and good ideas with you! During the webinar, the presenters will discuss and analyses:

    •What are the steps to be taken to effectively design, acquire and implement a digital collaboration and data integration platform in healthcare?
    •What are the challenges you may face in an integrated care and tele medicine project?
    •What are the effect and clinical outcomes when data sharing is a reality and not just a vision?
  • How Exclusion Risk Impacts Healthcare Providers and How to Manage It
    How Exclusion Risk Impacts Healthcare Providers and How to Manage It Scott Steinhardt - Kinney Services, Chris Swift, Lockpath Jun 21 2018 4:00 pm UTC 60 mins
    For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.

    Attendees will learn:

    * A definition of exclusion risk with real-world examples
    * Challenges encountered with managing exclusion risk
    * Strategies for implementing a consistent, repeatable review process
    * Technology's role in streamlining exclusion risk management

    Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
  • Digital Therapeutics: Trends and Growth Opportunities
    Digital Therapeutics: Trends and Growth Opportunities Daniel Ruppar, Global Program Director, Victor Camlek, Principal Analyst, Digital Health, Frost & Sullivan Jun 26 2018 6:00 pm UTC 75 mins
    Digital therapeutics presents a significant opportunity for traditional pharmaceutical therapeutics and information technology (IT) capabilities to influence a new approach to increase positive patient outcomes while reducing the overall cost of healthcare.

    Key Takeaways:
    · Gain expert insight into the accurate definition of digital therapeutics and market participants.
    · Learn about new solutions from mHealth companies that will combine apps, patient education, professional intervention and peer support to increase patient engagement and medication adherence by augmenting or replacing traditional drug therapeutics.
    · Hear opportunities to utilize digital therapeutics to improve medical workflow and patient communications.
    · Learn about some of the critical milestones related to digital therapeutics.
  • Dell EMC OEM Solutions and VMware:  Better Together
    Dell EMC OEM Solutions and VMware: Better Together TBD Jun 28 2018 2:00 pm UTC 45 mins
    Join us for an in-depth conversation on how the blend of your IP, our hardware and VMware software means your solutions have better scalability, availability, security, efficiency and simplified lifecycle management.
    Dell EMC OEM + VMWare combination equates to key advantages for you and your customers:
    •Turn-key combined solution (Dell EMC HW + VMware SW + your IP.)
    •Streamlined operations with single BOM – Dell HW & VMware Software combined into single BOM, including single contract for all VMware products
    •Global license/redistribution rights - Single HW+SW stack with VMware contract approved for global distribution
    •A better support experience for your customer: Complete solution supported through Dell OEM ProSupport globally
    •Lifecycle Extension - More options to extend OEM appliance lifecycle with OS support flexibility