Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MORecorded: Jan 17 201958 mins
Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVaultRecorded: Jan 17 201960 mins
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.
In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.
Join us for this webcast to learn:
- The most common challenges in meeting and maintaining compliance with PCI DSS
- Best practices to help you plan and prepare for an audit
- The core security capabilities you need to demonstrate compliance
- How AlienVault Unified Security Management can simplify the compliance process
VP of Product Marketing at AlienVault
Qualified Security Assessor (QSA) with Terra Verde
Sales Engineer at AlienVault
Clark Bradley, Solutions Engineer at ZaloniRecorded: Jan 16 201950 mins
How does your organization collaborate with data? Aligning data management tasks across any size organization can be a challenge. This can be attributed to a lack of transparent data access, lack of big data skills, or antiquated toolsets that do not enable shared metadata for clear lineage of the data. Regardless of the reason, the results are slow, rigid decision-making processes.
While modernizing your data architecture for more agility can seem overwhelming, with an integrated platform that enhances collaboration, organizations can reap the benefits of quality data that is well understood. The data platform should provide users with the ability to fully understand all aspects of the data with a simple, unified user interface where the business and IT can define, transform and provision the data. All while providing right-sized governance for access, security and auditability.
Join Clark Bradley, Solutions Engineer with Zaloni, as he tackles modernizing your data platform and explains how your organization can expand collaborative practices with the Zaloni Data Platform.
By the end of the presentation, you’ll be able to answer these questions:
- Why is a data catalog important?
- What do I need to know about data quality?
- How does self-service play a role in the data strategy?
Tom Patterson, Chief Trust Officer, UnisysRecorded: Jan 16 201944 mins
Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.
Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.
Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
John Withers, Product Manager Jimil Patel, Product Marketing Manager, and Manan Sangvi, Solution ConsultantRecorded: Jan 15 201950 mins
Well-designed APIs, created along with a holistic integration strategy with Anypoint Platform, create a seamless omnichannel experience that customers want and businesses need. To deliver a reliable and unified experience more quickly, companies must adopt a new approach that involves an omnichannel architecture.
Across industries from healthcare to banking to retail, MuleSoft is powering omnichannel strategies that result in faster time to market, improved customer satisfaction, and increased revenue.
Watch this webinar, including a demo, to learn how to:
- Take an API-led approach to omnichannel that enables companies to deliver a unified experience 5x faster
- Leverage Anypoint Exchange to enable consistency by design through the reuse of integration assets across channels, translating to a consistent experience for your customers
- Prepare for the future (and future channels) with support for different deployment models with a single, unified platform
Kelvin Murray, Sr. Threat Research Analyst, WebrootRecorded: Jan 15 201946 mins
The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.
Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.
Some of the topics that will be covered:
- AI Disruption
- US adoption of similar GDPR legislation
- Cryptojacking will keep rising while ransomware will decline
Chintan Udeshi, Security Product Marketing, Infoblox; Brandon Dunlap, ModeratorRecorded: Jan 10 201954 mins
Most organizations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)2 on January 10, 2019 at 1:00PM Eastern for an examination of how Infoblox and Fortinet have joined together to assist organizations in improving their security operations and reducing time to containment.
Jatin Hansoty, Director of Solutions ArchitectureRecorded: Jan 9 201958 mins
A majority of the data collected by organizations today is wasted. Whether through poor analytics, lack of resources, or because they have too much of it. So how can organizations turn this around and actually start utilizing their data for powerful results?
More and more companies are taking their customer, product, patient, or other data and providing a 360-degree view using a governed and actionable data lake. By breaking down the silos associated with traditional data located in disjointed systems and databases, companies are finding new ways to improve loyalty programs, product development, marketing campaigns, and even find a new source of revenue from their data.
Join Jatin Hansoty, Director of Solutions Architecture at Zaloni, as he dives into real-world use cases from several of the world’s top companies. Learn from their architecture and the results they achieved.
Topics covered include:
- Best practices
- Common pitfalls to avoid
- Real-world use cases
- Future-proof architecture
Kevin McNamee, CISSP, Director, Threat Intelligence, NokiaRecorded: Jan 3 201948 mins
If the new generation of smartphone ransomware is combined with worm-like spreading capability akin to something like Wannacry, the result could be catastrophic. We will look at several examples of smartphone ransomware with demonstrations showing how the phone is infected, how the device is locked, what data is encrypted, how the ransom is paid and what can be done about it. The presentation will conclude with a discussion on the evolution of smartphone ransomware and how the technology could be leveraged to launch a major attack against the mobile network services by disabling a significant number of handsets.
After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?
This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement
What you'll learn
- The main differences between TS2 & G-Cloud
- The Pros & Cons of using TS2 vs G-Cloud
- Top Tips for making a succesful bid through either framework
Join our latest webinar with Tim Lawrence & Andy Skipper as our experts cover topics such as
- What the major strategic priorities are for UK Organisations in 2018
- What the first steps are towards Cloud Adoption
- How UKCloud can help
Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, LockpathRecorded: Dec 13 201859 mins
What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.
As an attendee, you’ll learn:
• The shift to a more integrated risk management
• The growing emphasis on supply chain cybersecurity
• The rise in data privacy and its impact on information security
Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
Roger Grimes, Stephen LawtonRecorded: Dec 12 201833 mins
Passwords have been with us for some 50 years now and still is used for a variety of mission-critical and highly classified projects and devices. That said, there is a case to be made that the password is obsolete and should simply be eliminated.
This webcast looks at how we got here and where we’re headed with passwords – if anywhere at all.
The opiate crisis has reached epidemic proportions, evidenced by more than 17,000 deaths a year and $504 billion in economic costs in the U.S. alone¹. Healthcare providers and laboratories need highly specific tests that accurately detect drugs of abuse in patient-care, employment, athletic and prescription drug monitoring settings.
In this webinar, Dr. Mary Mayo discusses two highly sensitive assays—the Syva® EMIT® II Plus 6-Acetylmorphine (6-AM) and Buprenorphine (BUP)—that expand available options for drugs-of-abuse testing.
After attending this webinar, you will be able to describe the:
• Differences in opioid drugs
• Magnitude of the opioid epidemic
• Reasons to use specific drug tests related to opioids
• Performance characteristics of the Syva EMIT II Plus 6-AM and BUP assays
P.A.C.E. credit is available for your participation.*
Presenter: Mary Mayo, Ph.D.
Dr. Mary Mayo is a medical affairs manager with Beckman Coulter Diagnostics, with more than 25 years’ experience in the clinical laboratory. This includes twelve years as a laboratory director, nine years as director of clinical chemistry at a tertiary-care academic hospital and three years as the laboratory director of a commercial laboratory.
¹ CDC. “Opioid Overdoses Treated in Emergency Departments.” https://www.cdc.gov/vitalsigns/opioid-overdoses/. Accessed 6 Mar 2018.
*Beckman Coulter Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E.® Program. These credits are recognized by the State of California. Most programs also provide State of Florida credits (with valid license number). At this time, we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore SoftwareRecorded: Dec 12 201860 mins
Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?
Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?
Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.
If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
• How to integrate software-defined storage into your environment
• How to migrate data between totally different types of storage
• How to change towards hyperconverged during regular business operations
David Woolger & Luke JeffriesRecorded: Dec 12 201810 mins
So after building the business case for Data Centre Modernisation you've discovered moving away from traditional, inefficient IT can help you reduce costs & reinvest in the services that matter. But will adopting cloud help you improve your security?
Join our webinar hosted by Director of Technology David Woolger & Principal Cloud Support Engineer Luke Jeffries as we guide you through how moving from away from Legacy IT impacts your cyber security
- What the biggest threats are to your organisation
- What to consider when modernising your Data Centre
- How UKCloud can help
Erich Kron, Michael Osterman, David LittmanRecorded: Dec 10 201855 mins
Phishing, spearphishing and Business Email Compromise (BEC) attacks are forecasted to grow exponentially in 2019. But…the end of 2018 poses the perfect storm trifecta of threats: the holidays, start of tax season and a very busy time for end of year transactions. We are bringing together two of the industry’s top thought leaders in the email security space, Michael Osterman, Principal Analyst of Osterman Research and Erich Kron, Security Awareness Advocate of KnowBe4 to update us on what to look out for in 2018 and how to head into 2019 unscathed. In this webcast we cover:
- Things to look out for specifically this time of year w/the holidays, tax season, W2 fraud, end of year, etc.
- Predictions for 2019 phishing/email malware attacks
- Really strange 1-off experiences that we’ve seen that you should be aware of
- How to prepare yourself and build your human firewall and reinforce the weakest link of most organizations
Watch for an information packed session with research and analysis you can’t get anywhere else on this topic!
Ayelet Biger-Levin, CISSP, Senior Consultant, Product Marketing, RSARecorded: Dec 7 201854 mins
When it comes to making access decisions, it’s all about being smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Authentication provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a simple process to gain visibility into the right listening posts, derive actionable insights and then drive action to protect the organization’s most valuable assets from rogue access and drive Identity Assurance.
John MacInnis, Prd Mktg Mgr, IAMS, HID Global; Tariq Shaikh, Sr. Security Adv., IAM, Aetna; Erik Von Geldern, CISO, FXCMRecorded: Dec 6 201861 mins
With the multiple points of access to an organization, both internal and external, as well as physical and electronic, identity and access control is a critical security concern. Practitioners need to constantly monitor and assess the organization’s security posture, access provisioning and even the on boarding of employees, partners and customers. Join HID Global and (ISC)2 at 1:00pm Eastern Thursday, December 6, 2018 for a discussion on why identity has become the center of security and how to better manage identity, access management and authentication in your enterprise.
Roberta Bigliani, Vice President, Avinav Trigunait, Research Director, Holly Muscolino, Vice PresidentRecorded: Dec 6 201859 mins
In this IDC FutureScape presentation, analysts discuss key predictions that will impact CIOs and IT professionals in the future of work over the next one to five years.
About IDC FutureScape
IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
Neil Ward-Dutton and Andrea MinonneJan 22 20192:00 pmUTC45 mins
Digital transformation is a key strategy for every company of size across Europe, as organizations look to remain relevant and competitive in the age of digital business. IDC finds that AI is a key enabler of that transformation, allowing businesses to reimagine processes, services and value propositions to customers. Yet while the focus on customers is as strong as ever but as experience matures, European companies are increasingly looking to AI to drive internal process improvement as well as improve customer experience.
In this IDC Web Conference, Neil Ward-Dutton, VP of AI and DX European Research Practices, and Andrea Minonne, Research Analyst for IDC's Customer Insight & Analysis team, will discuss the transformative power of AI for European companies, drawing on IDC's qualitative and quantitative research and examples to discuss what are the top drivers and barriers, which are the key use cases, technology and industry adoptions trends across Europe.
John Jolliffe, Strategic Engagement, Adobe Document Cloud.Jan 23 20192:00 pmUTC45 mins
When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?
Join our live webinar, to learn:
• Why e-signatures are essential to your company's success now and in the future.
• Which three signature types are legal under eIDAS.
• How to select the right approach for your business.
• Next-gen e-Signatures and The Cloud Signature Consortium.
Scott McGregor, Allergan, Lynda Chang, Complete HealthVizion, David Pearce, Complete HealthVizion, Dominic Tyer, pharmaphorumJan 23 20193:00 pmUTC75 mins
Medical affairs and publications teams are under increasing pressure to demonstrate effectively the success of the medical communications activities they undertake.
Naturally, there are a huge number of metrics that could be used to measure and demonstrate medical communications value. The challenge is to identify, and track, those metrics that really matter, and ensure this information is interpreted effectively.
This pharmaphorum webinar, which will be held in partnership with Complete HealthVizion, will look at how to measure medical communications activities, how to continue with what is successful and how to change what isn’t working.
This means identifying what can be measured, both in terms of reach and engagement as well as behavioural impact, deciding what ‘great’ looks like and how best to define success.
The expert panel will also look at how behavioural science can provide a framework to develop smarter communications and, ultimately, drive better patient outcomes.
This Metrics to Meaning webinar will take place on Wednesday, 23rd January, at 15:00 pm GMT (10:00 EST) and will teach you how to measure the effectiveness of different types of medical communications programmes.
Interacting with the panel will also allow you to learn about a range of practical approaches to implementing metrics, including:
• Innovative ways to measure medical communications value and success
• How to help medical affairs and publications teams demonstrate greater value
• How to optimise tactical outputs year on year
• The importance of demonstrating and measuring behavioural change
In doing so they will also discuss the role of behaviour and the implications of this for measuring success.
John Withers, Product Marketing Manager, MuleSoft and Jimil Patel, Product Marketing Manager, MuleSoftJan 24 20195:30 pmUTC63 mins
Business processes are complicated and often manual due to an underlying technology landscape that is not connected, constantly changing, and increasingly complex. With MuleSoft’s Anypoint Platform™, unlock data from your systems, orchestrate business processes that automate and optimize workflows, and package them as reusable services to transform your organization into a digital platform.
Across industries from healthcare to banking to retail, MuleSoft is powering business automation, and helping companies deliver business processes as reusable services, resulting in faster innovation, improved customer satisfaction, and increased revenue.
Watch this webinar, which includes a demo of the Anypoint Platform, to learn how to:
- Unlock systems 64% faster: Easily connect to core systems of record and unlock data with out-of-the-box connectors and graphical data mapping
- Accelerate process automation: Orchestrate processes using a drag-and-drop development environment supported by a library of pre-built implementation templates
- Reuse business capabilities: Package processes into reusable services and publish them for internal and external use
Roger Grimes, Data-Driven Defense EvangelistJan 24 20196:00 pmUTC60 mins
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Roger will teach you:
•How silent malware launches, remote password hash capture, and how rogue rules work
•Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
•Details behind clickjacking and web beacons
•Actionable steps on how to defend against them all
If all you were worried about were phishing attempts, think again!
Danyi Wen, Shanghai LIDE Biotech, Stefan Jellbauer, Mitra Biotech, Lakshmi Santhosh Maithel, RepositiJan 29 20194:00 pmUTC75 mins
The prevalence of cancer is currently predicted to be higher than ever. Current statistics show 1 in 2 people in the UK and 1 in 2 men/1 in 3 women in the US will experience it at some stage in their lives. And yet the picture for patients is an improving one.
The move towards immunotherapies heralds much promise and this is potentially just the beginning. As cancer is understood increasingly not by type, or even tumour type but specific mutation the era of personalised oncological therapies is visible.
To delve further into this pharmaphorum is pleased to present an exclusive online discussion.
Bringing together experts at the cutting edge of this field it aims to interrogate where we are in terms of this shift towards personalised oncology, what this means in terms of the development pathway and looks at the approaches which could (and will) fully evolve the way that cancer treatments are developed in terms of efficacy, approach and outcome.
this free to attend event will cover a number of topics critical to the future of oncology including:
•The changing face of cancer: how do we define it now?
•Personalised medicine in practice – where are we now in cancer?
•What are the implications from these changes for clinical trials?
•How the shift towards cancer as a phenotype/genotype is being applied in clinical trials and how they are run
•What are co-clinical trials and why could they hold the key to answering unmet need in cancer treatment and beyond into broader drug development?
•Modelling for the future of cancer – can this be done for personalised therapies?
Daniel Kennedy, Research Director, Information Security, 451 Research; Brandon Dunlap (moderator)Jan 29 20196:00 pmUTC60 mins
Security budgets continue to tick upward, but underneath the hood, increasingly hybrid architectures in enterprise IT are driving shifts in where that money is applied. GDPR has driven compliance to the forefront of security project decision making, while other pain points including user behavior and lack of qualified personnel drive specific security product deployments. Security resistance to cloud continues to decrease, while the endpoint security space remains both relevant and increasingly crowded. Join Daniel Kennedy, Research Director for 451 Research on January 29, 2019 at 1:00PM Eastern as he walks through highlights of 451's 2018 surveys and interviews of information security professionals.
Steve Hunsaker, Dir. Systems Engineering- DataCore, Kent Hansen, CIO- ArchNexus, Johnathan Kendrick Tech. Account Exec. - USIJan 29 20197:00 pmUTC60 mins
Join us to hear the story of Architectural Nexus, Inc. and Universal Systems Incorporated (USI). ArchNexus provides customized architectural, landscape and interior design services. As a company with over 100 power user engineers and architects, ArchNexus needed a storage solution to meet the company’s high demand for performance. With the help of USI and DataCore Software, ArchNexus found a smart and affordable storage solution.
In this webcast you will discover:
- A business problem & how it was solved
- The business impact
- The on-time and on-budget solution
- The ROI achieved
- How the customer would change the process or outcome
Are you searching for a smart storage solution that is right for your business? Please join us!
John Withers, Product Marketing Manager, MuleSoft and Jimil Patel, Product Marketing Manager, MuleSoftJan 31 20195:00 pmUTC60 mins
Connecting customer data with users who need it can be a daunting challenge involving disparate systems, multiple data formats, and frequently changing data sources. MuleSoft's Anypoint Platform™ enables multiple teams to unify around a single, fully integrated 360-degree view to understand and anticipate customer needs.
Across industries from healthcare to banking to retail, MuleSoft is powering single view of customer transformation that result in faster time to market, improved customer satisfaction, and increased revenue.
Watch this webinar, including a demo, to learn how to:
- Integrate data 60% faster by rapidly connecting more systems and mapping data elements across sources
- Change data sources with ease: Decouple data extraction from processing and delivery
- Provide a single source of truth: Ensure that everyone has access to and can act on accurate customer information
- Prepare for the future (and future data sources) with support for different deployment models with a single, unified platform
Tarik Saleh, Snr Sec Engnr, DomainTools; John Carnes, Info Sec Arch; Anthem; Aamir Lakhani, Sen Sec Strat & Rsrchr; Dr. ChaosJan 31 20196:00 pmUTC60 mins
Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credentials, financial, healthcare information, and other highly sensitive data at risk. How can an organization defend against the onslaught of such attacks that continue to plague them unabated? Join DomainTools and (ISC)2 on January 31, 2019 at 1:00 PM Eastern for a roundtable discussion on mitigating the prevalence and distribution of malicious documents and their payload.
Aria Naderi; Zbigniew SkurczynskiFeb 6 20199:00 amUTC60 mins
IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
Sammeln und verwalten Sie alle relevanten Informationen zentral.
Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.
In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
Nitin Naik, Unmesh Lal, Khushbu Jain, Fred Mao, Barbara Gilmore, Frost & SullivanFeb 6 20194:00 pmUTC75 mins
The Life Science industry is in a state of flux. While recent years have seen the advent of multiple novel technologies—such as IVF, CRISPR-Cas9, virtual clinical trials, and liquid biopsy—the industry today stands at a crossroads with challenges in scaling up and commercializing such technologies. The industry has now come to terms with new, path-breaking life science technologies that are helping make precision healthcare a reality. Chinese investments into the US biopharma industry jumped to $4.5 billion in 2018. An exclusive fireside chat with our US and China analysts will uncover trends in cross-border investments and growth opportunities in these two markets.
• Establish the leading factors that will influence the size and direction of the global life sciences market in 2019.
• Build clarity on technology developments in the global life sciences market in 2018 that will have an impact during 2019.
• Identify the business models used to commercialize and distribute novel life science solutions.
• Discover the key growth opportunities and strategic imperatives for companies in 2019.
Syed Abdur - Director of Products from BrinqaFeb 6 20197:00 pmUTC32 mins
In this session we will discuss how modern InfoSec organizations tackle the challenge of securing and protecting their software infrastructure. By taking a knowledge-driven and risk-centric approach, these organizations strategically leverage existing investment in security tools (SAST, DAST, Open Source, Penetration Testing, CMDB, Asset Management, Threat Intel, ITSM) to design application security programs that identify, prioritize and remediate vulnerabilities that pose the biggest threats to the organization — in a highly automated and efficient manner.
We’d love to answer all of your questions by email, ask them during the session in the chat window, you can email them to me at firstname.lastname@example.org to be answered by email, or tweet @brinqa with the hashtag of #BrinqaWebinars and we will cover everyone’s questions.
Leighton James, CTO at UKCloud, Jan Mietle, Partner Technology Strategist at MicrosoftFeb 7 201911:00 amUTC60 mins
This webinar will explore the opinion of public sector organisations facing the necessity to modernise their data centres as reported in the 2018 Ingenium Survey.
Over the course of the webinar our CTO Leighton James will take a deep dive into the biggest concerns of public sector organisations surrounding Data Centre Modernisation, the implications on how cloud changes IT operations and the relative security of cloud services.
Joining Leighton will be special guest Jan Mietle, Partner Technology Strategist, Microsoft
Jan joined Microsoft in 2014 where he works with the top service providers in the UK, using technology enablement to help shape their business models and drive cloud-based services to their customers. He has 21 years IT industry experience with an extensive background in designing and delivering value-based services.
•Cloud adoption trends in public sector
•The implications & perception of Data Centre Modernisation on operational costs
•How cloud affects the IT culture & service to end users
•Data loss & security when moving away from in-house IT
This Q&A session will conclude our webinar.
In this IDC web conference, Stephen Minton will review the latest ICT spending data and leading economic indicators for ICT budget trends and new 3rd Platform technologies, alongside updated market sizing and forecasts from the IDC Worldwide Black Book, answering questions such as:
• How did the technology market perform in 2018, and how have forecasts for 2019-2022 changed as a result?
• What impact will the US-China trade war and tariffs have on IT spending over the next 12 months, and and which other economic wild cards are starting to impact IT budgets?
• Which new technologies are experiencing the fastest growth in emerging markets, and which geographies are set to emerge as global leaders beyond 2020?
• How quickly are tech budgets moving from traditional IT deployments to the 3rd Platform of cloud, mobile and new technologies such as IoT and robotics?
• What are the key vertical industry trends which are driving IT spending patterns and vendor revenues?
Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales EngineerFeb 14 20195:00 pmUTC60 mins
Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.
Join this webcast to learn:
- How fileless attacks work and how they evade detection by most traditional antivirus software
- The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
- Why HIDS is an essential security control for threat detection and compliance
- How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response
Group Product Marketing Manager
Sr. Sales Engineer
Shimon Oren, Deep Instinct; Jared Peck, Finan.Svcs; Rob Armstrong; B. Dunlap (Moderator)Feb 14 20196:00 pmUTC60 mins
Cyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and develop new capabilities much faster than ever before. This translates not only to more attacks, but also to a bigger share of attacks which are highly evasive and stealthy, and inevitably more challenging to prevent or detect over-time. How does an organization stay up-to-speed with the varied attacks that are aimed at them? Join Deep Instinct and (ISC)2 on February 14, 2019 at 1:00PM Eastern when we’ll review several common and emerging evasion techniques in today’s threat-landscape and discuss the best avenues to counter them in terms of technology and cost-effectiveness.
Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoftFeb 21 20195:00 pmUTC50 mins
On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.
- Measure application performance across APIs and integrations in production
- How to query and retrieve log data across your network
- End-to-end walkthrough of priority issue identification and resolution
- Exciting new capabilities of Anypoint Monitoring
Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:
•What configuration compliance management encompasses
•Who should care about secure configuration management
•Why organizations are not doing this today and how this impacts the business beyond IT
Discover the future for configuration compliance management by attending this educational webinar. Register now!
Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:
-How your organization can gain efficiency from compliance and policy management
-Strategies for collaborating across departments
-How streamlining processes can boost productivity
-Planning ahead for sustained growth
Discover the future for compliance and policy management by attending this educational webinar. Register now!
Charlie Whelan, Vice President of Consulting, Transformational Health, Americas, Frost & SullivanMay 14 20193:00 pmUTC75 mins
For most cities and states, the healthcare technology and biosciences sector is one of the most attractive industries of the future that can grow their communities. However, that attention attracts significant competition among players seeking to expand in a field that is highly complex. How should your community address this industry, and what is the best path to nurturing start-ups, retaining existing employers, attracting new companies and encouraging workforce development?
• The healthcare technology and biosciences market is large and complex. Learn how the industry is structured and which segments might align best with your community.
• Cities and states across the country are all competing to grow their own biosciences economies. Find out what types of programs and strategies are the most effective.
• Come away with a simple model for assessing your own community’s strength relative to the healthcare technology and biosciences market.