Browse communities
Browse communities
Presenting a webinar?

Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • More than 100,000 information security professionals have invested time, effort and resources to achieve what has long been considered the Gold Standard security certification – The CISSP. Now that the security industry is growing and career trends are shaping the current job market, there is a bigger need to understand where the CISSP fits and what value it brings to any professional undertaking the path to become certified.

    During this panel session you'll hear different perspectives, including that of the hiring manager, recruiter and credential holders themselves around the following questions:

    - How is the CISSP viewed in the market place?
    - Which career paths are worth exploring with a CISSP?
    - What skillset does a CISSP have?
    - Is the CISSP a differentiator for a candidate?
    - How does the CISSP help the professional perform his job?
  • Host-based IDS systems, or HIDS, work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM features a complete integration of OSSEC, one of the most popular and effective open source HIDS tools.

    In this live webinar, we'll show you how USM helps you get more out of OSSEC with:
    Remote agent deployment, configuration and management
    Behavioral monitoring of OSSEC clients
    Logging and reporting for PCI compliance
    Data correlation with IP reputation data, vulnerability scans and more
    We'll finish up by showing a demo of how OSSEC alert correlation can be used to detect brute force attacks with USM
  • Regardless of the colour of the next UK government that emerges as a result of the May election, the £30-£50bn NHS budget chasm is the abyss that all the parties fear in respect of its thereat to quality health service delivery and re-election.

    With political backs to the abyss, no hostages will be taken. It is not unrealistic to expect a well co-ordinated and concerted offence by politicians and patient organisations alike on industry pricing of innovative speciality and rare diseases medicines:

    With this scenario in mind pharmaphorum is once again working with IMS Health to bring you expert insight into what this means for the UK health system and more specifically market access for specialist treatments in the post-election environment.

    Angela McFarlane, Senior principal IMS Health Local Market Access, Anthony Grosso, Principal Pharmacist at the National Hospital for Neurology and Neurosurgery and Sheela Upadhyaya, previously a NHS Senior Manager with over 17 years of experience in the delivery of services and in commissioning of highly specialised services for rare and ultra rare conditions, combine with pharmaphorum's Paul Tunnah to deliver an accurate analysis and frontline insight as to the already complex roadmap for access is about to change again.

    This one hour event will include analysis of informed predictions which include:

    The NICE HTA criteria will get tougher post end to end review (IMMTreV)
    NICE and the NHS England will join forces to streamline access pre/post NICE
    Risk at local level will be shifted to Providers under the new marginal tariff arrangements; which could indeed see a close to the CDF as the PbR excluded drugs list becomes a thing of a glorious past
    Provider baselines will take the strain of innovation - the tough decisions will be softened by a drive to really accelerate uptake of NICE approved medicines

    How can industry prepare for these changes in what is already a tough and complex environment?
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • It's been said that defensive driving is about "driving for the other cars on the road." The same can be said for setting your organization's security strategy and "to think like your enemy". It's a sound practice which focuses on infosecurity practitioners putting themselves in the shoes of their attackers and anticipating where the next threat may be coming from. Using advanced analytics to compile simplified reporting can help to streamline your these efforts, enabling you to more clearly see the threats the attackers may be using and helping you to react faster. Join (ISC)2and NopSec on April 9, 2015 at 1:00PM for a discussion on vulnerability and threat analytics to better secure an organization.
  • Accurate, complete, secure — these are the hallmarks of enterprise data at world-class organizations. In healthcare, the importance of these metrics carries even more importance. That’s why CHRISTUS Health takes a systematic approach to managing its information assets. Operating in more than 60 U.S. cities and half a dozen states in Central and South America, CHRISTUS understands the challenges of building information systems that respect privacy, while enabling the kind of analysis that leads to better patient outcomes.

    During this Health Data Management webcast, learn how CHRISTUS Health assembled a comprehensive data strategy for delivering an advanced analytics infrastructure. You’ll hear how a combination of Data Management tools and Data Governance process addressed core challenges of working with multiple systems across the spectrum of healthcare domains. An in-depth Q&A session will let attendees learn about the best practices that enable operational and clinical efficiencies through this next-generation analytical solution.
  • Osterman Research and (ISC)2 recently conducted a survey of individuals in mid-sized and large organizations on how they choose off-the-shelf applications, how they develop custom applications, and how they select third-party application developers. Join (ISC)², Michael Osterman and a panel of experts for a discussion about the findings from the survey and the state of software development quality on Tuesday, April 7th at 1:00pm Eastern. Attendees will also have the opportunity to download the entire survey report.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • How do ischemia and fixation impact the quality of your assay results and information transfer? Garbage in! Garbage out! Join Geoffrey Baird MD, PhD and David Chafin, PhD at 9 AM Mountain Time, March 31, 2015, who will discuss the impact of ischemia and fixation on assay results, information transfer and some novel approaches to address these important factors. Dr. Baird is an Assistant Professor of Laboratory Medicine and an Adjunct Assistant Professor of Pathology at the University of Washington. Dr. Chafin is a Principle Scientist, Technology and Applied Research at Ventana Medical Systems Inc.
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Abstract:
    There is a great interest in application of human mesenchymal stem cells (hMSCs) in cell therapy and tissue engineering due to their self-renewal, multi-lineage differentiation, immunomodulation, and trophic potential. One of the challenges faced in the clinical application of hMSCs is the need for efficient expansion of these cells in vitro without altering their capacity. Serum-free mammalian cell culture media, in particular, require optimization of the expansion protocols. Even subtle changes in routine handling can have a significant impact on the cells’ potential.

    This seminar will cover the variables that can influence the desired regenerative and differentiation properties including medium selection, vessel surface treatment, impact of the cell source, and seeding density. We will also discuss how users can select the correct conditions for optimized growth and functionality.

    Speaker Biography:
    Brian Posey is a Product Development Manager for cell culture media at Corning Life Sciences. Brian has over 10 years experience in cell biology and industrial scale cGMP manufacturing of both liquid and powder cell culture media. Since joining Corning in 2012, Brian has lead numerous innovative technology projects for the media business ranging from customer technology transfer for production scale-up to developing new serum-free media for industrial and stem cell lines.
  • The NHS Five Year Forward View recognised improvements of outcomes in key areas like cancer and cardiac but also acknowledged preventable illness is still widespread. While new medical equipment technologies are emerging all the time to support improvements in diagnosis and treatment of preventable illness, more financially sustainable solutions are needed to fund them.
    This CPD accredited webinar will feature speakers from Lancashire Teaching Hospitals NHS FT and Plymouth Hospitals NHS Trust along with NHS Supply Chain. They will demonstrate how you can apply strategic asset management to optimise the replacement and management of medical capital equipment to:
    •Make the latest medical equipment technology more affordable for your trust
    •Ensure your patients have access to the best quality care possible
  • Lync 2013 (soon to be Skype for Business) is commonly known as an instant messaging client that includes voice and video capabilities within the enterprise. However, its ability to cross enterprise network boundaries and reach colleagues, partners, and customers across the globe via mobile phones or traditional telephony systems is often overlooked. The natural progression in collaboration may start with a quick instant messaging conversation but often leads to picking up the phone and calling someone to attain resolution.

    Join us on Wednesday, March 25th at 2pm EST to learn about the capabilities of Lync Enterprise Voice, ways to implement it as a cost savings to your business, the impact of the launch of Skype for business and how the progression of enterprise voice collaborative tools are changing the way we run our businesses today.

    Key Takeaways:
    •What is Lync Enterprise Voice
    •How can Lync Enterprise Voice be implemented
    •Is Skype for Business different than Lync Enterprise Voice
  • There are many decisions when choosing a video conferencing solution. Free versus subscription? Cloud solution or not? What type of video system is best suited for your meeting rooms? Join Michael Helmbrecht, VP of Product Marketing, in this webinar where he will breakdown the top five considerations of video conferencing for 2015. Michael will also elaborate on the competitive landscape and which solutions best fit your company’s needs.

    Follow us on Twitter @LifesizeHD and use the hashtag #AskLS to ask questions.
  • Course Description:

    The JUNOS EX Switching webinar is a 2.5 hour presentation offered in fast-paced delivery format. As the 4th webinar within the Jump-Start JUNOS webinar series, we will explore basic through advanced EX switching operations on the EX4200 platform. Specifically, we will detail topics such as trunking, vlans, port security, bridge table, virtual chassis, link-aggregation and others as detailed below.


    Objectives:

    At the conclusion of this webinar students will be equipped with the following:

    •Layer 2 switch interface configuration.
    •Virtual Chassis configuration.
    •VLAN implementation.
    •Port Security.
    •Link-Aggregation.
    •Spanning Tree.
    •Interface monitoring.

    Intended Audience:

    The JUNOS EX Switching webinar is designed as a “how to” webinar for JUNOS Network Engineers, NOC personnel, as well as other support staff who are responsible for JUNOS EX Switch implementation, administration and support.

    Prerequisites:

    Participants should be familiar with the JUNOS CLI and attendance of Jump-Start Fundamentals.
  • Already tasked with protecting companies from a vast domain of ever-changing threats, Chief Information Security Officers (CISOs) and other security leaders must now prepare for more avenues of attack as well as more sophisticated attackers. Research from the IBM Centre for Applied Insights pinpoints what worries today’s security leaders and what they’re doing to address those concerns. We also identify several actions that security leaders can take to help their companies manage the approaching uncertainties in information security.

    Speaker:

    Martin Borrett, Director, IBM Institute of Advanced Security in Europe

    Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, technical and architectural issues associated with security. Martin leads IBM's Security Blueprint work and is co-author of the IBM Redbooks Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security and Understanding SOA Security . He is Chairman of the European IBM Security User Group community and a member of the board of EOS, the European Organisation for Security. He is a Fellow of the British Computer Society, and a Chartered Engineer (CEng) and member of the IET. Martin has a passion for sailing and has represented Great Britain; he is also a keen tennis player.
  • A lack of manpower and a dearth of resources are often major obstacles for organizations striving to achieve and maintain HIPAA and/or PCI compliance. Compliance guidelines are complex and difficult to decipher, even for the most experienced IT professionals. Recent headlines regarding unprecedented security and compliance breaches are causing companies to examine compliance-as-a-service (CaaS) solutions offered by cloud providers. But with the myriad of options available, it’s difficult for companies to discern which CaaS best fits their needs.

    Join Johan Hybinette, HOSTING Chief Information Security Officer (CISO), as he discusses the benefits and risks associated with CaaS. Drawing upon his 20+ years’ of experience in information security and compliance, Johan will also offer tips for selecting the right CaaS for your business. Bring your questions and leave with the information you need to confidently invest in a CaaS solution.
  • Threat and adversarial information has become easily accessible and gone mainstream in the last couple of years. However managing the threat lifecycle, can still be challenging for organizations continuously under pressure for the next attack and low on resources. Prioritizing threats, managing incidents and neutralizing the attackers successfully requires dedicated tools, processes as well as broad adoption by the IT Security staff. Join (ISC)2 and Intel Security at 1:00PM on March 19, 2015 as we discuss leveraging SIEM and effective means for improving your discovery and responses to today's emerging threats.
  • Some of the most critical data required to solve analytical problems in the healthcare and life sciences world lack the type of keys that we rely on so heavily in other domains. This session will focus on solutions to the fundamental data connectivity challenges in this area and how to enable impactful analytics on a few high value but disconnected healthcare data sources.
  • Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Then you won't want to miss our next live demo, where AlienVault's security gurus Mark Allen & Garrett Gross will walk you through the steps of a system compromise, including how AlienVault USM detects these nefarious activities every step of the way.

    You'll learn:
    - How attackers exploit vulnerabilities to take control of systems
    - What they do next to find & exfiltrate valuable data
    - How to catch them before the damage is done with AlienVault USM

    Using a real-world example of a common vulnerability, Mark will show you how USM gives you the evidence you need to stop an attack in its tracks.
  • Key topics:

    - Reach-Impact- Cost analysis for key online and offline channels (owned-paid-earned)
    - “Desired Frequency” analysis for key channels
    - Company appreciation scores by key therapy area (diabetes, pain, women’s health, vaccines)
    - Company appreciation scores for digital vs fieldforce vs medical vs patient support
    - Evolution over time of key parameters
    - New, flexible web-based reporting format
    - Making the data actionable
  • Keeping Compliance in Check & Controlling Access Risk:

    Learn how one of the nation's largest health insurers provides access to users efficiently and effectively while also assuring that private constituent data is protected in compliance with HIPAA, HITECH and other federal and state privacy and security regulations. Join (ISC)2, Courion and Harvard Pilgrim Healthcare on April 28, 2015 at 1:00pm Eastern to learn how the information security team is able to identify and remediate user access risks such as unnecessary privileged access, orphaned and abandoned accounts, and system or non-human accounts that call for administrative oversight.
  • This webinar will introduce the history, theory, basic techniques, and potential pit-falls of mammalian cell culture. It is designed for students and new lab technicians, as well as bench scientists interested in updating their techniques or knowledge in the field.

    Topics to be discussed include:
    • History and practical theories of cell culture and its impact on today’s science
    • The requirements needed to set up a cell culture laboratory
    • Challenges when performing mammalian cell culture and how to overcome them

    About our Presenter:
    Dr. Mark Rothenberg graduated from Emory University with his Ph.D. in Cell and Developmental Biology. Over the past 25 years, Mark has held positions in both academia and industry where he has developed an expertise in the areas of assay development and cell culture. He currently holds the position of Manager Scientific Training and Education with Corning Life Sciences.
  • Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • La malnutrición es un problema general a nivel mundial, ya que las personas no consumen el nivel suficiente de nutrientes esenciales. A su vez, la obesidad se ha convertido en una preocupación creciente porque se consumen demasiados alimentos para el nivel de actividad. A este ritmo, la sociedad actual no podrá cumplir con los objetivos de la Asamblea Mundial de la Salud (WHA) 2025 en materia de nutrición y es esencial que los programas de nutrición se desarrollen aún más para mejorar la situación nutricional. La fortificación de los alimentos es una manera efectiva de producir alimentos altamente nutritivos y combatir la malnutrición y así lograr un mejor desarrollo socioeconómico. La industria de alimentos, bebidas y suplemento dietario cumple una función clave en la promoción de la nutrición de la salud pública al desarrollar opciones nutritivas, saludables y asequibles para los consumidores.

    En este seminario web informativo, el experto independiente Alfonso Valenzuela Bonomo junto con Hector Cori de DSM, director de Nutrition Science & Advocacy LATAM, debatirán sobre la necesidad de la colaboración entre sectores (gobierno, organizaciones civiles y empresas) para combatir la malnutrición.
  • Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.
  • Technology can do amazing and complex things, especially in this day and age. But, sometimes modern technology can be applied to solve simple, relatable everyday challenges with fantastic results. Listen in to learn how today's cutting edge IoT & wearables technology can be deployed to drive significant business results including vast improvements in customer service, patient health care, and more. The opportunity is upon us to revolutionize service ethics across many industries in ways unavailable to us before IoT & wearables converged in these simple ways.

    Hear use cases in:
    • Restaurant/Hospitality
    • Healthcare
    • Retail
  • Even with the imminent end of support for Windows Server 2003 (W2K3), you may still be planning to continue running W2K3 in production. But with a never-ending stream of new exploits, vulnerabilities, and zero-day malware, how can you continue to maintain control and keep those systems safe and secure? (ISC)2 and Bit9 are hosting this webcast which will focus on looking at how to help prevent, detect and respond to advanced threats on endpoints and ensure continued compliance of W2K3 systems.
  • Your users demand access everywhere, any time, via any device. Whether it’s cloud or traditional on-premise applications, it’s critical that organizations provide access to those who need it while mitigating access risk and maintaining compliance. Join (ISC)2, Courion and the American Red Cross on May 14, 2015 at 1:00PM Eastern for an informative session that will show how the American Red Cross is addressing this issue with a strategy around provisioning, governance, federation, and single sign-on via a seamless and integrated IAM solution for managing cloud and enterprise access.
  • While cost is a primary "c" driving the adoption of object-based cloud solutions in the life sciences, compute, capacity, and collaboration may all be bigger incentives. In this webinar, we'll examine how to use an Avere Hybrid Cloud NAS infrastructure to gain big benefits in areas like genomics research, personalized medicine, drug discovery, imaging, and other data analysis applications.

    • Compute - Building production environments in the compute cloud without rewriting existing applications

    • Capacity - Modernizing storage archives and disaster recovery by adding object storage for durability while leveraging existing on-premises NAS

    • Collaboration - Using the cloud t o safely and securely share data globally

    • Cost - Using cloud to lower overall costs to keep pace with fast-growing demands of research initiatives
  • The fun with IDS doesn't stop after installation, in fact, that's really where the fun starts. Join our panel of IDS experts for an educational discussion that will help you make sense of your IDS data, starting from Day 1. We will discuss signature manipulation, event output, and the three "P's" - policy, procedure and process. We won't stop there either! You'll find out the meaning behind the terms all the cool kids are using like "False Positives" and "Baselining". We'll round it out with more information about how IDS interacts with the rest of your IT applications and infrastructure. If you installed an IDS and are wondering what to do next then signup now!Asset Discovery - creating an inventory of running instances
    Vulnerability Assessment - conducting scans to assess exposure to attack, and prioritize risks
    Change Management - detect changes in your AWS environment and insecure network access control configurations
    S3 & ELB Access Log Monitoring - Monitor access logs of hosted content and data directed at your instance
    CloudTrail Monitoring and Alerting - Monitor the CloudTrail service for abnormal behavior
    Windows Event Monitoring - Analyze system level behavior to detect advanced threats
    We'll finish up with a demo of AlienVault USM for AWS, which delivers all of the above capabilities, plus log management & event correlation to help you detect threats quickly and comply with regulatory requirements.
  • In our aging society, Alzheimer’s type dementia is a major concern. The disease can have a devastating impact on quality of life, with patients relying on caregivers for standard daily living activities. Whether it is memory impairment, deterioration, confusion or anger suffered by patients, this highly disruptive neurological disease demands attention.

    Vitamin E is vital for neural function and its deficiency can lead to neurological dysfunction, causing problems with co-ordination, balance and speech. It also has an antioxidant function in the brain – as a free radical scavenger and constituent of neural membranes, preventing the oxidation of lipids and PUFAs.

    Now, recent studies have found that maintaining a high level of vitamin E results in marked improvements for mental health and can be linked individually with a decrease in the onset of Alzheimer’s type dementia.

    Join our webinar and hear our speakers Prof. Maurice Dyksen and DSM’s Dr. Manfred Eggersdorfer and Jacob Bauly present their latest findings on vitamin E and its potential role in curbing the onset of Alzheimer’s disease.
  • The "Systems and Process" work stream of Future Focused Finance (An NHS wide programme to develop the vision for NHS finance for the next five years) has set out to develop what the financial planning, budgeting and forecasting capability should look like for the NHS.
  • In our aging society, Alzheimer’s type dementia is a major concern. The disease can have a devastating impact on quality of life, with patients relying on caregivers for standard daily living activities. Whether it is memory impairment, deterioration, confusion or anger suffered by patients, this highly disruptive neurological disease demands attention.

    Vitamin E is vital for neural function and its deficiency can lead to neurological dysfunction, causing problems with co-ordination, balance and speech. It also has an antioxidant function in the brain – as a free radical scavenger and constituent of neural membranes, preventing the oxidation of lipids and PUFAs.

    Now, recent studies have found that maintaining a high level of vitamin E results in marked improvements for mental health and can be linked individually with a decrease in the onset of Alzheimer’s type dementia.

    Join our webinar and hear our speakers Prof. Maurice Dyksen and DSM’s Dr. Manfred Eggersdorfer and Jacob Bauly present their latest findings on vitamin E and its potential role in curbing the onset of Alzheimer’s disease.
  • Electronic Healthcare Records (EHRs) and the information they contain have become the top target of cybercriminals around the world. Several high profile healthcare-related data breaches have made the headlines in recent months and more are sure to come. What is it about the information contained in EHRs that is so enticing and how can it be better secured? Join (ISC)2 and Sophos on May 21, 2015 at 1:00PM Eastern for a discussion of the security of healthcare data and approaches on how to better protect this type of information.
  • By the third week of May we should all know the composition of the next government. Whichever party or parties assume power, the next government will need urgently to confront a demand resource collision that threatens the continued existence of the welfare state and of the NHS itself.

    It has long been apparent that, as the House of Lords Select Committee on Public Service and Demographic Change made clear in 2013: "England has an inappropriate model of health and social care to deal with the needs of an ageing population ... By 2030 the number of people who are 85+ will have increased by 100%' compared to 2010".

    The argument for greater coherence and integration of health and social care commissioning and provision is driven as much by considerations of coherence and quality as it is by financial necessity. As the Five Year Forward View has already made clear there may be ‘local choice between radical options', but not a choice between the maintenance of the status quo and a radical option. For NHS commissioners and providers (across all specialisms) the challenge is to grasp the opportunity to shape new local forms of integrated commissioning and service development.

    The NHS organisations that survive and thrive in such a rapidly evolving and competitive marketplace will be characterised by proactivity, agility and their eagerness to embrace new forms of strategic partnership.

    This Webinar will consider the specific governance challenges that will confront Boards and Governing Bodies in an evolving cultural context where, as Stevens recently observed, “my institution right or wrong is not going to be what’s required from the service’s new generation of leaders".
  • Key topics:

    - Digital maturity of pharma
    - Hot trends in multichannel marketing
    - Evolution of digital budgets
    - Key barriers
  • As an (ISC)2 member or a practitioner considering certification or membership, wouldn't you like to have the ability to interact with an (ISC)2 Board Member, Director or Manager to ask questions or discover what's being worked on within the organization that will benefit the members or the industry in general? Our new webinar series, Inside (ISC)2 will feature various key personnel within the organization interacting with and answering questions from members and non-members alike in a moderated webcast setting. This is chance to find out, first hand, what's going at (ISC)2 and ask your questions of the key people making decisions at the organization. First up, join us on May 28, 2015 at 1:00PM as David Shearer, Executive Director, stops by to answer your questions.
  • Confidence and resilience affect every aspect of your work; your relationships, your ability to make decisions, your capacity for influencing others, even how you manage your workload. When your confidence is damaged and you feel uncertain, or your resilience is tested and you feel defeated, the psychological experience can be just as profound as if you had suffered a physical injury.
    The good news is that the secret to mastering these two aspects of personal performance lies within all of us and is surprisingly simple.
    In this one hour webinar……
    •you’ll unmask the misunderstanding about where confidence and resilience really come from, and discover how to access
    feelings of confidence and resilience more of the time
    •you’ll learn how to find freedom from the thinking that holds you back from being supremely confident and resilient, no
    matter what happens
    •you’ll discover some simple and practical approaches for boosting confidence and resilience that will have immediate
    implications for you in your work and life
  • “You never get a second chance to make a first impression.”
    - Andrew Grant
    Research suggests that if you were a juror you would make up your mind about the accused within approximately 7 seconds. That’s before you’ve even heard a shred of evidence, and then you’d spend the remainder of the trial looking for evidence to prove you’re right.
    Whilst in the workplace, you’re not on trial, people are continually assessing and evaluating you in the context of their own experience, albeit unconsciously most of the time, and you have to be able to flourish in those conditions.
    Although you can’t change what goes on in other people’s heads, you can choose to behave in ways that have a positive effect on the people around you, and as a consequence you can achieve more of what you want to get done.

    This session will:

    •help you discover how immersing yourself ‘in the moment’ gives you a clear head and allows you to perform at your best more of the time
    •explore how ‘being your authentic self’ is the most effortless route to maximising your impact
    •give you the opportunity to take away some fresh thinking and ideas that will help you to transform the impact that you have on others.