Hi [[ session.user.profile.firstName ]]

Health IT

  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Recorded: Jul 27 2017 41 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • Healthcare Fraud Driving Organized Crime: Examining Sources of Illicit Income
    Healthcare Fraud Driving Organized Crime: Examining Sources of Illicit Income Erin Picton, AHFI, Investigations Manager, and Mark Starinsky, Service Delivery Manager, General Dynamics Health Solutions Recorded: Jul 26 2017 56 mins
    This session will familiarize investigators with the connection between healthcare fraud schemes and financial crimes, and fraud’s increasing importance in organized crime. This webinar will examine case study examples and provide effective techniques for detecting, preventing and responding to healthcare fraud, as well as practical advice for leveraging law enforcement partnerships in support of identification and recovery of misappropriated assets.
  • Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare
    Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare Nathan Rain, Group Manager of MDM, BJC Healthcare; Prash Chandramohan, Informatica; & David Lyle, Informatica Recorded: Jul 26 2017 61 mins
    Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.

    In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.

    If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
  • Beyond Superior Care Quality—How Can APAC Hospitals Become Truly Patient Centric
    Beyond Superior Care Quality—How Can APAC Hospitals Become Truly Patient Centric Frost & Sullivan, Gabe Rjipma,Microsoft, Dr. Timothy Low, Farrer Park Hospital, David Vu, GE Healthcare Asia-Pacific Recorded: Jul 26 2017 61 mins
    Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.
  • 3D Nephrotoxicity applications & Nortis’ microfluidic organ-on-chip technology
    3D Nephrotoxicity applications & Nortis’ microfluidic organ-on-chip technology Dr. Ed Kelly, Dr. Henning Mann Recorded: Jul 25 2017 97 mins
    1. The kidney proximal tubule is the primary site of drug-induced nephrotoxicity. I will describe the development of a 3-dimensional flow-directed proximal tubule microphysiological system (MPS). The kidney MPS recapitulates the synthetic, metabolic and transport activities of kidney proximal tubule cells. This MPS is as an ideal platform for ex vivo modeling of nephrotoxicity. Towards this goal, we have evaluated nephrotoxicity in response to challenge with multiple toxicants, including the heavy metal pollutant cadmium, antisense oligonucleotides, the antibiotic polymyxin B and the Chinese herbal product aristolochic acid. We believe that MPS technologies will have major impacts on predictive toxicity testing and human risk assessment. Animal and in vitro systems do not always faithfully recapitulate drug and xenobiotic responses in the clinic or occupational/environmental exposures, respectively. MPS technologies will refine safety assessment and reduce our need for surrogate animal testing. An ultimate goal is to create integrated human MPS organ systems that could replace animal models.

    2. Nortis has developed a technology that is used to recapitulate functional units of human organs in microfluidic devices (chips). Such organ models include vasculature, kidney, and liver models for toxicology studies, blood-brain barrier models for drug transport studies, and vascularized tumor microenvironment models for drug efficacy studies.
  • Ransomware Hostage Rescue Guide: Part 2 of 2
    Ransomware Hostage Rescue Guide: Part 2 of 2 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Jul 21 2017 62 mins
    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.

    In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.

    Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide, Part 2”. We will look at recent infections, give actionable info that you need to prevent infections, and cover what to do when you are hit with ransomware.
  • Meet the next generation of Dell EMC OEM PowerEdge appliances
    Meet the next generation of Dell EMC OEM PowerEdge appliances David Pennington, VP Global Sales & Jared Wilson, Entrerprise Product Manager Dell EMC OEM Solutions Recorded: Jul 21 2017 59 mins
    Digital transformation is driving a need for OEMs to address key concerns — agility, scalability, flexibility, simplicity and automation. Dell EMC’s next generation of PowerEdge servers meets those concerns head-on with an end-to-end portfolio of scalable, virtualized, software-defined and converged solutions on a common server platform capable of running any application, from traditional to native cloud applications (NCA). With Dell EMC PowerEdge servers, you can build your vision of a digitally transformed infrastructure with secure, worry-free solutions.
  • Multichannel Maturometer 2017 results: Key global trends
    Multichannel Maturometer 2017 results: Key global trends Fonny Schenck (CEO, Across Health) and Dirk Szynka (MD Across Health Germany) Recorded: Jul 20 2017 48 mins
    Join us to find out about the results of the 2017 Multichannel Maturometer. The ninth version of this industry-renowned survey illuminates some of the big changes sweeping through the Pharma industry, as well as highlighting some trends which are still lagging.
    Questions which will be answered include:

    • Is senior leadership still on the fence for digital?
    • Marketing budgets – how are they changing?
    • How satisfactory are those in the industry finding digital offerings?
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Mark Bower, Global Director of Product Management, HPE Security – Data Security Recorded: Jul 19 2017 61 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
  • Modernizing Biopharmaceutical Manufacturing: From Batch to Continuous Production
    Modernizing Biopharmaceutical Manufacturing: From Batch to Continuous Production Dr Robert Dream & Dr Peter Levison Recorded: Jul 19 2017 66 mins
    The importance and value of continuous bioprocessing, both upstream and downstream has economic and sustainability advantages and due to the modular nature of continuous bioprocesses means that industry is able to adapt more rapidly to changing market demands. Continuous biopharmaceutical manufacturing in the context of other industries that have already successfully adopted continuous processing. Factor other than scientific ones, are the barriers to change from batch to continuous production. an excellent example of the manufacturing strategies of the steel industry in the 20th century, when this industrial sector incrementally switched from batch to continuous operations. biopharmaceutical industry has reached a stage that requires a change in the production paradigm. For a certain class of biopharmaceutical products upstream continuous manufacturing has always been applied: for example, unstable proteins that rapidly degrade in the culture broth. In order to obtain a high quality product, the residence time in the reactor must be minimized. This can only be achieved with continuous cultivation and preferably with perfusion reactors. a brief overview on the types of cell retention devices currently used in biopharmaceutical industry.
    Furthermore, this is a universal production platform that can be extended to other classes of products, such as antibodies, which are relatively stable molecules. continuous manufacturing is as productive and with a much smaller footprint of the manufacturing plant, avoiding multiple non-value added unit operations. In essence, the investment for a continuous plant is much smaller compared to a batch-operated one.
  • Stop Malware in its Tracks with Security Orchestration
    Stop Malware in its Tracks with Security Orchestration Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jul 18 2017 60 mins
    Security professionals are locked in a vicious cycle, with malicious actors spinning out new threats daily and security teams racing to keep up. Reducing the time to detect and defend against malware is critical. What if you could identify and block threats earlier? With the security orchestration capabilities in AlienVault USM Anywhere, you can.

    USM Anywhere is a security monitoring platform that unifies security visibility across your cloud and on-premises assets. New AlienApps™ extend the capabilities of USM Anywhere by interacting with other IT security and IT operations products like Cisco Umbrella, Palo Alto Networks and Service Now to centralize the orchestration of incident response activities.

    Join us for this webcast to learn:

    -What security orchestration means, and why it has become essential for fast, efficient incident response
    -How USM Anywhere can automate incident response activities, saving valuable time
    -How AlienApps help you reduce the friction of integrating and orchestrating across your security point solutions

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Roundtable: Contributors to ASHP Controlled Substance Guidelines Share Insights
    Roundtable: Contributors to ASHP Controlled Substance Guidelines Share Insights Kimberly New, Toni Fera, JoAnne Myhre, Kim Dove, Bill Churchill Recorded: Jul 18 2017 61 mins
    We will be hosting a roundtable discussion with multiple thought leaders who have contributed to the ASHP Guidelines on Preventing Diversion of Controlled Substances. The guidelines are aimed at helping healthcare organizations develop a controlled substance diversion prevention program.

    Presented by the following thought leaders:
    • JoAnne Myhre, CPhT, Allina Health
    • Kimberly Dove, PharmD, Pharmacy Consultant, Omnicell
    • Kimberly New, JD, BSN, RN, Principal Consultant, Diversion Specialists
    • Toni Fera, PharmD, Independent Healthcare Consultant
    • William Churchill, MS, FMSHP, Brigham and Women’s Healthcare

    Moderated by Juliana Linsdell, Nurse Consultant, Omnicell

    We look forward to having you join our discussion!
  • Catalyst Accelerator for Healthcare: Digital Transformation through FHIR & APIs
    Catalyst Accelerator for Healthcare: Digital Transformation through FHIR & APIs Matt Serna, Industry Marketing Manager, MuleSoft Recorded: Jul 18 2017 58 mins
    The mandate for digital transformation in healthcare is clear. The question that IT leaders must answer is not "if" but rather "how?"

    In particular, how should healthcare organizations delivering a digital experience for patients? How should they think about balancing existing HL7 point-to-point interfaces with emerging FHIR-based API approaches? How should they think about security? And how should they think about re-use to drive greater agility and increase time to market?

    Drawing on its work with 3 of the top-7 US hospitals, MuleSoft has developed Catalyst Accelerator for Healthcare, a set of API designs and supporting reference implementations, that codify integration best practices.

    Join this webinar to:

    - See a demo of the Catalyst Accelerator solution in action, powering web and mobile channels
    - Understand how an API-led connectivity approach can increase speed and agility by driving re-use of API assets
    - Learn how Anypoint Platform supports the design, development and management of APIs through a single, unified platform
  • Developing Simplified Methods for Quantifying Analytes using  SPME
    Developing Simplified Methods for Quantifying Analytes using SPME Robert E. Shirey, M.S.; Principal R&D Scientist Recorded: Jul 13 2017 75 mins
    Solid phase microexatraction or SPME is a green method for extraction of analytes out of a sample. Since SPME is a non-exhaustive extraction technique, some analysts believe that SPME is not quantifiable. This presentation will provide basic information for developing a method to extract and quantify analytes using SPME. Examples will be given on the extraction and quantification of analytes out of various matrices, and SPME will be compared to other extraction techniques such as QuEChERS and SPE. In this webinar, we will discuss some new SPME technologies such as SPME-OC (over-coated) fibers and BioSPME that help to isolate and quantify analytes from interfering compounds in the matrix. Guidelines will be provided for enhancement of precision using SPME.
  • A New Approach to Medical Device Management to Empower Digital Healthcare
    A New Approach to Medical Device Management to Empower Digital Healthcare Silvia Piai, Senior Research Manager, IDC Health Insights Recorded: Jul 13 2017 56 mins
    Connected medical devices are playing a fundamental role in transforming patient care quality and experience and healthcare providers efficiency.

    But as the number and the variety of devices grow within the organization, medical devices and the broader IoT ecosystem become more complex to manage, impacting patient safety, information security, compliance and financial performance.

    In this webinar IDC Health Insights will share its research findings and provide guidance to health executives that want to start harnessing the real value of medical devices, by implementing a evidence based, consistent, controlled and efficient IoT management approach

    About the speaker: Silvia Piai is Senior Research Manager within IDC Health Insights for Europe Middle East and Africa.

    She is responsible for analyzing key trends related to IT strategies and spending in European healthcare organizations, and global Public Health institutions. She advises healthcare organizations and ICT vendors on planning and implementing effective digital health transformation initiatives to drive business innovation.

    Silvia Piai has a more than 10 year experience in healthcare IT research. She started her career as public sector analyst, for then specializing in healthcare and becoming the lead analyst for the European healthcare market for IDC Health Insights. In her role, she focuses on the impact of digital transformation of healthcare and the role of technology in key industry trends as personalization and integration of care.

    Her analysis offers in-depth coverage of the technologies that provide the most clinical value in terms of quality, cost, time, and agility and are transforming pre-care, point of care (POC), and post-care today. Analyzing the adoption and the investment plans of healthcare organizations, Silvia describes the evolution of healthcare IT and gives key insight on primary factors shaping the industry and the implications for the coming year future.
  • A Head-to-Head Comparison of the Top-rated Products in HCI & SDS
    A Head-to-Head Comparison of the Top-rated Products in HCI & SDS DataCore Software: Alfons Michels - Senior Product Marketing Manager, Sushant Rao - Senior Director, Product Marketing Recorded: Jul 12 2017 54 mins
    When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-converged Infrastructure (HCI) and Software-defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.

    But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.

    Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization called WhatMatrix. In this webinar, we will cover the:
    - Criteria to evaluate these products
    - Pros and cons of different vendors’ products
  • Ransomware Hostage Rescue Guide: Part 1 of 2
    Ransomware Hostage Rescue Guide: Part 1 of 2 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Jul 6 2017 61 mins
    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.

    In this webinar, we will cover the first 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.

    Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware.

    Erich will cover these topics:

    - What new scary ransomware strains are in the wild?
    - Am I infected?
    - I’m infected, now what?
    - Proven methods of protecting your organization
    - How to create a “human firewall”
  • Advanced Cell Culture Technology for Generation of In Vivo-like Tissue Models
    Advanced Cell Culture Technology for Generation of In Vivo-like Tissue Models Stefan Przyborski, PhD - Professor of Cell Technology, Durham University UK Recorded: Jun 30 2017 64 mins
    The benefits of three dimensional (3D) cell culture are widely appreciated. More cell-based technologies are now becoming available that enable researchers to preserve the native 3D structure of cells in vitro. These can be broadly divided into three areas: aggregate-based methods; hydrogels and extra-cellular matrices; and inert scaffold-based technologies. Each has strengths and weaknesses and there is no one technology that satisfies all applications. Tissues in the body are mostly composed of different cell types that are often highly organized in relation to each other. Often cells are arranged in distinct layers that enable signalling and cell-to-cell interactions. Alternatively in tumours, cancer cells form aggregates and tissue masses composed of different cell types. Recreation of these types of architecture will significantly evolve 3D cell culture to a new level where real tissue-like structures can be generated in vitro.

    This webinar will review the alternative approaches available to researchers and provide an overview of their capabilities and example applications. More sophisticated models are developing as 3D cell culture technology becomes established and accepted as a means of creating more physiologically relevant cell-based assays. Methods that are relatively straightforward to use and that recreate the organized structure of real tissues will become valuable research tools for use in discovery, validation studies, and modelling disease.

    Key areas covered:
    • 2D vs 3D cell culture debate
    • Review of alternative approaches and the development of new technologies
    • Challenges facing 3D culture methods, in terms of technologies available and methods used
    • Showcase applications where 3D technology makes a difference
    • Future perspective for 3D cell culture technology and further development
  • 4 Ways Identity Can Improve Your Security Posture
    4 Ways Identity Can Improve Your Security Posture Krystal Wang Sr. Manager, Security Solutions at Okta Recorded: Jun 29 2017 25 mins
    Most organizations understand strong authentication is a necessary part of a good security practice. But because organizations have much less control over the devices, services, and people in their environment today, identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments.

    Join this webinar to learn why identity must not simply be a "first step" but the foundation for the future of security as well as 4 ways to leverage identity to enhance your security posture.
  • Dermatological Coding Complexities and Opportunities for Fraud, Waste and Abuse
    Dermatological Coding Complexities and Opportunities for Fraud, Waste and Abuse Lindsay Surynt, Investigator, and Katherine Bass, Investigator, General Dynamics Health Solutions Recorded: Jun 29 2017 53 mins
    Dermatology is a complex clinical specialty comprising hundreds of procedure codes for surgical services related to lesion removals, biopsies and excisions. This session will familiarize investigators with dermatology’s complex clinical coding issues by reviewing accurate reporting requirements and specific sections of the National Correct Coding Initiative, or NCCI. Our experts will also demonstrate applicable data mining techniques.
  • Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics
    Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics Orion Cassetto, Sr. Product Marketing Manager, Exabeam. Anne Saita (Moderator) Recorded: Jun 29 2017 50 mins
    Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to access multiple servers on the network, and account management, where the attacker escalates privilege or creates new privileged accounts. Detection of advanced threats like these require real time analytics and the ability to find signals within the very noisy security environment. Join Exabeam and (ISC)² on June 29, 2017 at 1:00PM Eastern to learn how user behavior analytics automatically analyzes and scores activity for escalated risk allowing for quick attack detection.
  • Real World Lessons For Modernizing Data Management with Big Data Technologies
    Real World Lessons For Modernizing Data Management with Big Data Technologies Navin Parmar, Enterprise Data Management Industry Consultant & Murthy Mathiprakasam, Product Marketing, Informatica Recorded: Jun 29 2017 55 mins
    How confident are you about successfully using Hadoop for your data management needs? Despite 60-80% of organizations experimenting with new big data technologies, only a few have been able to successfully extract value sustainably.

    In this webinar, Navin Parmar, a highly experienced healthcare data management leader and longtime Informatica PowerCenter customer, will share the best practices he has gathered across multiple projects from modernizing data environments beyond traditional data warehousing and successfully leveraging big data technologies. Learn real world lessons from an experienced industry practitioner who has delivered compelling healthcare analytics outcomes, while ensuring regulatory compliance with completely trusted data.
  • How to maximise the value of digital in medtech
    How to maximise the value of digital in medtech Paul Tunnah, pharmaphorum Recorded: Jun 29 2017 64 mins
    With a wealth of market and regulatory changes impacting the medtech sector, it’s time for digital technology to steer the direction of your future business. This expert webinar will evaluate how to strategically embed digital within your own organisation and explore the challenges and the opportunities for transforming customer relationships, driving commercial outcomes.

    – Respond to the changing regulatory environment: how technology empowers your business
    – Build a business case for digital transformation and gain organisational support
    – Strengthen your customer relationships and improve engagement in a diverse payer landscape
    – Learn from pharma (and other industries) to find opportunities and avoid pitfalls
    – Measure impact and return on investment from digital engagement
  • The CIO's Guide to Digital Transformation Strategy
    The CIO's Guide to Digital Transformation Strategy Davinder Gautam, Managing Director, Accenture; Ross Mason, Founder and VP Product Strategy, MuleSoft Recorded: Jun 29 2017 46 mins
    Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.

    Attendees will learn:

    - What are the obstacles getting in the way of achieving digital transformation?
    - Strategies to end the misalignment of business and IT on digital initiatives
    - A roadmap to closing the IT delivery gap
  • Petya Variant Ransomware: How to Detect the Vulnerability and Exploits
    Petya Variant Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager. Chris Doman, Threat Engineer Recorded: Jun 27 2017 32 mins
    As you've likely heard, a variant of the Petya malware is spreading rapidly and is known to have affected organizations worldwide, regardless of size. This variant of Petya follows a similar attack method to last month's WannaCry ransomware, though it uses the PsExec and WMI services for distribution.

    Once compromised, the ransomware will overwrite the Master Boot Record (MBR), encrypt individual files that match a list of file extensions (including documents, archives, and more), and after a reboot of the system will present the user a message requesting a ransom in Bitcoin to decrypt the system. As with WannaCry, the ETERNALBLUE exploit toolkit (which was released by the Shadow Brokers group in April 2017) is suspected to be a key part of the attack.

    Join us for a 30-minute technical webcast to learn more about this Petya variant, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.

    You'll learn:

    What the AlienVault Labs security research team has uncovered about this threat
    How to scan your environment (cloud and on-premises) for critical vulnerabilities with AlienVault USM
    How AlienVault USM leverages threat intelligence for early detection of threats like this variant of Petya
    How built-in response orchestration capabilities in AlienVault USM can stop the threat from spreading