Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Rich Wegner, Sr. Cybersecurity Engineer - Financial Services & Ryan Terry, Product Marketing Manager - ProofpointRecorded: Sep 12 201952 mins
Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this?
Join us for our case study with one of the largest financial services companies as we examine how they are using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks.
In this session, we'll share:
- The benefits of deploying DMARC email authentication
- How the organization is utilizing Proofpoint's EFD
- How to strengthen your secure email gateway to better protect your end users
Zimma Kluit, Metadata Product Owner, KPN, Thomas Brence, Director, Product Marketing, InformaticaRecorded: Sep 12 201930 mins
Data needs to be a business asset, from the board of directors on down, and the team at KPN took this message to heart. In order to ensure that they could create a valuable experience for their customers, they needed to know what data they had, who was responsible for it, and if it was high quality. Without completing these basic steps they couldn’t consider their data to be valuable. During this informative webinar, the team from KPN will share how they have put data in control in order to:
• Comply with regulations
• Drive faster innovations
• Optimize operations
Together with Informatica’s Intelligent Data Governance products, KPN has been able to design a solution that is purposefully built for their team members, captures the right data and information, and can scale across their enterprise through automation.
Join us to learn how their Intelligent Data Governance solution is:
Adenike Cosgrove, International Cybersecurity StrategistSep 26 20199:00 amUTC60 mins
Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security trams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.
Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.
Join us to gain insights into:
How the email threat landscape has changed with attackers evading legacy approaches;
How leaders like Proofpoint have innovated to keep up;
Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
Nathan Turajski , Data Governance & Privacy, InformaticaRecorded: Sep 11 201926 mins
As home to Silicon Valley high tech and the global media capital in Hollywood, California helps lead innovation as the world’s fifth-largest economy. But the state’s citizens also have personal data at risk as they adopt Internet of Things (IoT) devices and share their personal and household information online. As a result, California has also become an innovator in legislation designed to protect personal information privacy, from the early days of SB 1386 for breach notification to the California Consumer Privacy Act (CCPA) taking effect in just a few short months from now. Are you prepared to do business with California citizens after January 1, 2020?
Join Nathan Turajski, Sr. Director, Data Privacy and Protection, as he reviews the CCPA, where you will learn:
- How privacy regulation is evolving beyond GDPR and prior mandates
- How a Data Privacy Governance Framework can help reduce risk
- How keeping data safe for business helps accelerate next-generation analytics, cloud migration, customer 360 insights, and more
Andy Webb, Head of ProductsRecorded: Sep 11 201924 mins
The G-Cloud framework has been live since 2012 and allows UK Public Sector organisations to search over 25,000 services listings for hosting, software and support services from any one of the 2,800 suppliers. So far, over £6bn has been spent through this framework.
July marks the launch of G-Cloud 11 which has been the busiest iteration of the marketplace yet for UKCloud with a total of 53 services being listed aimed at solving some of your biggest cloud computing challenges.
To guide you through all of this, UKCloud Head of Products Andy Webb delivers a 20-minute webinar packed with invaluable guidance on how UKCloud’s latest updates can help you solve some of your greatest IT hurdles.
Informatica's Michael Anderson, Federal Chief Strategist & Michael Tomechak, Big Data Domain ExpertRecorded: Sep 10 201925 mins
Policy mandates and initiatives such as the Federal Data Strategy are moving agencies to become better stewards of data. But how can you deliver on mission outcomes with data? Building a Federal Data Strategy can never be a “one and done” initiative. Instead, it’s a process that continually evolves as your Agency’s goals and challenges change.
Aaron Landgraf, Senior Product Marketing Manager, MuleSoft & Edgar Ortiz, Senior Solution Engineer, MuleSoftRecorded: Sep 6 201933 mins
Explore Anypoint Security, a suite of capabilities that makes APIs, microservices and integrations running on Anypoint Platform secure and governable by default.
In this webinar, you'll learn how to:
- Protect your APIs and microservices from denial of service and content attacks
- Detect and tokenize sensitive data in-transit across your application network
- Apply automated policies to enable security by default
- Move towards a zero-trust architectural model
Sean Walker, Enterprise Account ExecutiveRecorded: Sep 5 201930 mins
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Markus Bause; Pierre AeschlimannRecorded: Sep 5 201949 mins
In diesem Webinar zeigen wir Ihnen wie Sie die neuesten ITSM Trends nutzen können, damit Ihre Organisation auf die kommenden Entwicklungen vorbereitet ist. Das sind die Diskussionpunkte:
- Die aktuellen Herausforderungen und Trends, die bereits die Zukunft von ITSM prägen.
- Die neuesten ITSM-Fähigkeiten, die Ihnen helfen, effizienter zu sein, eine höhere Benutzerzufriedenheit, eine schnellere Betriebseinführung und niedrigere Gesamtbetriebskosten zu erreichen.
- Wie sieht das ITSM von morgen aus und was sind die Vorteile für Ihr Unternehmen, einschließlich der Zukunft von Self-Service, des Wissensmanagements der nächsten Generation, der no-code Automatisierung und des reibungslosen Betriebs.
Ravi Ginjupalli - Kelly Services, Venkat Gupta - Capgemini, Monica Mullen - InformaticaRecorded: Sep 4 201952 mins
At 70 years, Kelly Services is a global workforce solution company serving 91% of Fortune 100 companies with more than 1 million workers in the talent supply chain. In 2017, Kelly Services began modernizing its data platform with a cloud-first strategy to quickly connect the right talent with the right customers. Critical to the success of Kelly Services is a multidomain strategy for MDM, starting with the customer domain.
During this webinar you will hear how the company began on its MDM journey to a 360-degree view for an end-to-end approach to data estate modernization.
Join us to hear from Ravi Ginjupalli, Sr. Director of BI & Analytics Integrations at Kelly Services and Venkat Gupta, Director of Insights & Data at Capgemini, as they review the technical design and architecture considerations necessary to meet business needs using Informatica iPaaS (Informatica Intelligent Cloud Services, IICS) to connect MDM in a hybrid cloud environment that includes Azure and Salesforce and multiple cloud-based services.
Kirsten Bunch, coach, speaker, and bestselling authorRecorded: Sep 4 201946 mins
Does it seem like you can’t go to a networking event without meeting a professional coach? Your friends rave about their coaches and you are wondering what all the hype is about. Should you get a coach? Is it worth the investment? That depends.
Personal coaching is a $1 billion industry. Fortune 500 companies require coaches for many of their leaders. But what about the solopreneur and small business owner? What is the ROI of hiring your own coach?
In this webinar, Mid-Career Transformation Coach and International Bestselling Author, Kirsten Bunch, will uncover the mystery of coaching and help you discover if it’s time for you to hire a coach.
•What a coach can do for you
•How to decide if coaching is worth the investment (and how to make the case to your boss)
•The brain science behind coaching
Kirsten Bunch is a coach, strategist, speaker and bestselling author. She is a graduate of the The Co-Active Training Institute, the world’s premiere coaching and leadership training program. She also has two graduate degrees from New York University. Kirsten helps mid-career professionals reinvent their careers to align with how they want to show up in the world. Her clients, which range from a neuroscientist to a celebrity stylist, start new careers and businesses that are good for them and good for the world. Before starting her own business in 2016, Kirsten spent 25 years traveling to over 50 countries for game-changing organizations like the Rainforest Alliance and VisionSpring. She helped fundraise over $20 million and designed and managed social change programs in 10 countries. Kirsten lives in New Jersey and works with clients all over the world.
ITIL, as we used to know it, was a great framework for organis ing and rationalising our IT processes. But, as an industry, we built a lot of hard-to-move bureaucracy on top of it. These days, businesses have to change rapidly to stay competitive, can ITIL survive the transition?
Short answer - yes, but only if ITIL evolves at the same pace as digital business revolution. And the good news is this: with V4, ITIL is making the leap out from the IT department into the entire organisational value chain. In this webinar, we'll be looking at some of these differences and how they can apply to your own Digital Transformation initiatives.
Darshan Joshi, SVP , Awez Syed, SVP, Amit Kara, DirectorRecorded: Sep 3 201930 mins
Your data-centric strategies depend on your ability to deliver trusted data quickly – even as you manage more types of data across hundreds of systems and fast-changing technologies. Can your data architecture handle the challenge?
Learn about Informatica's approach to taking a data-first view of data architectures in our complimentary webinar, "AI-Driven Intelligent Data Platform for Next-Gen Data Architecture." Darshan Joshi, Informatica's Senior Vice President of Technology, will discuss how Informatica's intelligent data management platform:
provides intelligent recommendations to guide user behavior
Find out how to implement a new approach to data architecture that will make your business truly data-driven.
Chris Wright, Account Director at UKCloudRecorded: Sep 3 201911 mins
The field of Cyber Security can be incredibly confusing to understand and navigate, Your security landscape is constantly evolving and it can be impossible to understand where your vulnerabilities lie and what tools & technology you should be procuring to deter and mitigate cyber threats.
To remedy this, UKCloud & partner E2E assure have devised a solution - CloudSoc. CloudSoc makes your organisation's Cyber Security simple, by providing an end-to-end cyber security capability that gives you an 'always on' cyber defence solution that enables you to identify threats before they become incidents.
Watch this webinar to learn more.
Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales EngineerRecorded: Sep 3 201924 mins
2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.
While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
Dagmar Hillmeister-Müller - Data Governance Sales Specialist / Thomas Bodenmüller-Dodek - Product Expert Big Data & AnalyticsRecorded: Sep 3 201958 mins
Unternehmen spüren kontinuierlich die Auswirkungen mangelhafter Datenqualität; dennoch ist die Erkenntnis, was genau Datenqualität bedeutet, immer noch nicht genug ausgeprägt.
In diesem Webinar betrachten wir einige der Auswirkungen und wie neue Ansätze zu Datenqualität die Nutzung von Daten innerhalb von Organisationen verändern. Wir sprechen auch darüber, wie neue technische Lösungen Unternehmen bei der Untersuchung und Diagnose von Ursachen mangelhafter Datenqualität unterstützen können und wie sich deren Behebung positiv auf die Leistungsfähigkeit eines Unternehmens auswirkt.
Datenqualität ist ein Grundpfeiler erfolgreicher Data Governance und entscheidender Erfolgsfaktor bei vielen Unternehmensinitiativen – wir zeigen Ihnen, welches Instrumentarium Sie als „Data Quality-Detective“ benötigen.
Smita Sealey and Barry Farimond, ZS Associates, Malcolm Qualie, NHS England, Alain Boulanger, Filippo DragoRecorded: Sep 2 201964 mins
With pricing of drugs at the centre of political and social debate, the market access and pricing environment in Europe has become increasingly challenging over the years. Innovative contracting has since become a common route to overcome these challenges and ensure timely access for patients.
Join us on Monday 2nd September from 15:00-16:00 BST as we discuss the future of innovative contracting with our panel of European payers. Key topics to be covered include:
To what extent and how contracting helps improve patient access?
What prior successes and failures can teach us about designing contracts that deliver true value to the health systems?
Can we avoid contracting and what would be the alternative?
In the past decade, we have moved from simple discounting and traditional volume-based agreements to more complex value-based models involving measurement of health outcomes, risk-sharing and cost containment guarantees. The feasibility of these contracts tends to vary by EU market, dependent mainly on the available healthcare system infrastructure to collect and process data as well as other regulatory and philosophical differences.
Ultimately, the question remains as to whether these agreements are a move towards better healthcare provision and more connected healthcare infrastructures, or are they slowing down access and creating administrative burden due to their complexity?
Dave Wells, Director, Eckerson, Vamshi Sriperumbudur, Portfolio Marketing, InformaticaRecorded: Aug 29 201932 mins
Are your data warehouses ready for advanced analytics and AI projects? Legacy data warehouses are ill-equipped to handle unstructured data complexities or today’s multi-cloud environments. But that doesn’t mean data warehousing is going away. Instead, your peers and competitors are modernizing their data warehouses, which, together with data lakes, form the basis of modern data architectures.
Join experts from Eckerson Group and Informatica for an in-depth discussion of data warehouse modernization. You’ll learn about 10 must-haves for modernization and discover why modernizing your data warehouses is a natural next step in the evolution of data management.
Make sure you’re prepared for tomorrow’s analytics.
Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance StrategyRecorded: Aug 28 201941 mins
In the webinar, “The 5 Foundational Elements of a Successful Enterprise Data Governance Program”, the Informatica Data Governance team will share how organizations can start their enterprise data governance journey.
Balraj Dhillon, Director, Engagement of Key Accounts Simeio Solutions, Stephen Payne, Principle Solutions Architect-ForgeRockRecorded: Aug 28 201955 mins
Healthcare providers are using digital technology to access, secure, and share patient information in order to efficiently deliver care. Does your healthcare organization need assistance in securing and maintaining a single patient identity? Do you have an effective privacy and consent control model across your ecosystem? Without a comprehensive framework for patient data, many healthcare providers have incomplete data on patients that cannot be transferred or shared between and within differing organizations. This results in security, privacy, and data management challenges.
In this joint ForgeRock and Simeio webinar, you will learn key strategies for modernizing your healthcare organization including:
· Top challenges your peers face when managing data for authenticating patients, consent, and governing permissions for external physicians and partners
· How to enable a secure, cost-effective privacy and consent model and data governance framework to unlock innovation
· How to quickly deploy the right IAM solution for your organization, whether that is on-premise, multi-cloud, or in a hybrid model environment
Join Balraj Dhillon, Director, Engagement, Key Accounts of Simeio Solutions, and Stephen Payne, Principle Solution Architect of ForgeRock, to learn how to modernize your healthcare organization.
Ryan Kalember, EVP of Cybersecurity Strategy for ProofpointRecorded: Aug 28 201961 mins
It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.
As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:
- How the email threat landscape has changed with attackers evading legacy approaches
- How leaders like Proofpoint have innovated to keep up
- How we have helped customers migrate from legacy products to Proofpoint
Richard de Boer, Pink ElephantRecorded: Aug 28 201946 mins
On 28 August at 11 a.m. (CET) Pink Elephant trainer Richard de Boer will be talking about Service Automation, looking at customer services in particular and how this can increase user satisfaction and the quality of services.
The webinar will include a discussion on the theoretical framework (Service Automation Framework) and the various steps you need to shape, roll out and make Service Automation a success.
Learn how Cherwell, a leading provider of Enterprise Service Management, can make this Service Automation process possible. With Cherwell, workflows, facility management and HR processes can easily be created within IT, as can a self-service portal which end users can initiate and work through.
Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry PracticeRecorded: Aug 27 201959 mins
Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.
In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.
Join us to learn:
- What we mean by a “patient-centric” cybersecurity mindset
- How to overcome common training obstacles and deliver the most effective cybersecurity education program
- How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
Kelvin Murray, Sr. Threat Research Analyst, WebrootSep 17 201910:00 amUTC60 mins
** This is an EMEA focused webinar **
This webinar will recap some of the major cybersecurity highlights of the past quarter.
From high-profile attacks making a media splash, to emerging threat trends being tracked by our researchers, a Webroot threat analyst will take attendees through the highlights and lowlights of another busy quarter for cybercrime.
Nick Mayhew, Director of Partners at UKCloudSep 17 20191:00 pmUTC32 mins
UKCloud proudly hosted a team of experts to discuss the merits of a SaaS based operating model.
The end result? A short, 30-minute video jam-packed with hints and tips from people who have been there, done that. Must-watch viewing for anyone who’s unsure whether they should migrate their applications to the cloud.
•Nick Mayhew, Director of Partners, UKCloud
•Chris Farthing, Founder & CEO, Advice Cloud
•Dave Blackburn, Technical Director, Geoff Smith Associates
•Andrew Wilson, CEO, Mylife Digital
Scott R. Burger, MD, Principal of Advanced Cell & Gene Therapy, LLC and Heidi Hagen, Co-founder and CSO for Vineti IncSep 17 20192:00 pmUTC90 mins
The quest to retrieve, analyze, and leverage that data has become the new gold rush in life sciences. This presentation will discuss the role of big data in cell therapy process development, real time analytics and commercial scale manufacturing.
Mark Jules, Global VP, Hitachi Vantara | Sameer Sharma, Global GM, IntelSep 17 20194:00 pmUTC60 mins
Video data has long supported safety and security efforts. But thanks to improvements in vision technology, machine learning (ML) and artificial intelligence (AI), and the ability to run analysis at the edge, there are innovative new uses for video data that improve safety, operations and customer experience.
Join us in this live webinar where we’ll discuss:
•The evolution of video technology and how it drives insights that improve the way we do business.
•How video data and vision technology are used across various industries to drive ROI.
•The technologies that drive these innovations and outcomes.
About our speakers
Mark Jules: Global Vice President, Smart Spaces and Lumada Video Insights, Hitachi Vantara
Mark Jules leads Hitachi Vantara’s Smart Spaces business which provides solutions incorporating video technologies, internet of things (IoT) sensors and analytics to help organizations create smarter spaces that operate more efficiently. Mark served as CEO of Avrio RMS Group for more than a decade and was also the President and Founder of Protean Solutions, a provider of mobile platforms for battlefield and emergency communications.
Sameer Sharma: Global GM (New Markets/Smart Cities), Intel
Sameer Sharma is the Global GM (New Markets/Smart Cities) for IoT Solutions at Intel and a thought-leader in the IoT/mobile ecosystem, having driven multiple strategic initiatives over the past 19 years. He leads a global team that incubates and scales new growth categories and business models in IoT and Smart Cities. These solutions include intelligent transportation, AI and video, air quality monitoring and smart lighting in cities.
Sameer has an MBA from The Wharton School at UPenn, and a Master’s in Computer Engineering from Rutgers University. He holds 11 patents in the areas of IoT and Mobile.
In this webinar, Alessandro Chiarini will explain why authentication based on biometric factors--facial, fingerprint, and voice—is the new minimum standard. With compound biometrics, it offers the level of protection necessary to secure healthcare organizations in today’s threat environment. Two-factor authentication? Multi-factor? Through this webinar, there will be a finer understanding of the dangers companies face and the tools available to confront them. Anyone responsible for securing access to controlled data or areas will benefit by this brief and pithy webinar.
CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
Roman Tobe, Product Marketing ManagerSep 18 20199:00 amUTC48 mins
Web domain fraud is a growing risk for businesses, employees, and their customers. Every year, threat actors register millions of domains to impersonate brands and defraud those who trust them. How can you protect your employees and customers from these fake sites?
Join Proofpoint as our security expert discusses the latest research findings of the 2019 Domain Fraud Report, the latest trends shaping the domain landscape, and the tactics and activities of threat actors.
In this session, we'll share:
• Tactics threat actors take to trick employees and customers
• Connection between fraudulent domain registrations and highly-targeted email attacks
• How to protect your corporate domains
Michelle Tillis Lederman, CSP, PCCSep 18 20193:00 pmUTC60 mins
In this webinar, Michelle Tillis Lederman joins us to discuss executive essentials.
Michelle is known for her energetic, engaging, and authentic presentations. An expert on workplace communications and relationships, Michelle's mission is to help people work better together and advance their individual impact. She is an accomplished speaker, trainer, coach, and author of four books including the #1 new release The Connectors Advantage and the internationally recognized, The 11 Laws of Likability.
Cindi Howson, Chief Data Strategy Officer, Thoughtspot & Alan Brumley, OEM | Embedded & Edge CTOSep 19 20193:00 pmUTC60 mins
In the age of digital transformation, customer experience is critical to maintain a competitive edge no matter what industry you are in. Differentiation requires innovative solutions that can process and provide immediate access to data and its contextual information.
Today’s personalization and 360-customer demands require next-generation designs that support memory-centric architectures as well as offload technologies.
Join Alan Brumley of Dell Technologies, and special guest Cindi Howson of ThoughtSpot, as they discuss industry trends and creative solutions to provide the best customer experiences for the evolving landscapes of today and tomorrow.
Danielle Russell,Group Product Marketing Manager and Caryn Seippel, Manager of Risk and ComplianceSep 19 20194:00 pmUTC58 mins
Industry data indicates that PCI DSS Requirement 11, "Regularly test security systems and processes," is the most commonly failed requirement. In this webcast, we’ll take a close look at PCI DSS vulnerability scanning requirements and discuss how to prepare for your PCI DSS audit with regular internal and external vulnerability scanning practices. AT&T Cybersecurity Compliance analyst, Caryn Seippel, will share a practitioner's perspective on addressing this challenging requirement as well as common mistakes and pitfalls to avoid.
Attend this webcast to learn:
- Which PCI DSS requirements map to vulnerability scanning and how
- Best practices and tips from a compliance practitioner
- How AT&T Cybersecurity solutions can help address PCI DSS vulnerability scanning
- A live demo of USM Anywhere
Ash Valeski, Director, Product Marketing & Tanner Luxner, Product Marketing Manager of ProofpointSep 19 20195:00 pmUTC45 mins
Email spoofing attacks are on the rise and email authentication is a proven solution that can block these threats before they reach your employees, customers, and business partners. The challenge is deploying authentication is time-consuming, requires expertise, and brings the risk of blocking legitimate email. So how can you overcome this challenge?
Join us for a live product demonstration and learn how Proofpoint’s Email Fraud Defense (EFD) is helping organizations deploy email authentication quickly and confidently.
In this session, we'll share:
- Our 360-degree visibility of the email coming into and being sent from the organization
- EFD’s proven authentication deployment program
- How Proofpoint strengthens your secure email gateway to better protect your employees
Matthew Gardiner, Dir. Enterprise Sec. Campaigns, Mimecast; Bruce Beam, CIO, (ISC)²; Brandon Dunlap, ModeratorSep 19 20195:00 pmUTC60 mins
Organizations of all sizes are accelerating their move to the cloud and are shifting critical applications such as email to Office 365 as a first step. The security and resilience of such a critical application is paramount for an organization’s communications, data availability, and governance strategies. Organizations experience a significant productively hit when their email or email-based data becomes unavailable. And of course, there are no shortage of phishing attacks which leverage email and target Office 365. How can you ensure the security and availability of Office 365’s email and better defend against those threats that can bring it down? Join Mimecast and (ISC)2 on Thursday, September 19, 2019 at 1PM Eastern for a discussion on the topic of security and availability, as well as strategies for moving such applications to the cloud more easily and securely.
Ian Main, Technical Marketing Principal - TeradiciSep 19 20195:00 pmUTC30 mins
What’s PCoIP Ultra? This webinar introduces Cloud Access Software with its latest enhancements designed for our most demanding users in VFX/media, engineering, medical and other verticals. Learn about how we support 4K HFR content, efficient scaling across multicore CPUs, and third-party codecs like H.264. See how the AVX2 instruction set boosts PCoIP Ultra performance metrics that illustrate our latest PCoIP advancements.
Juan Tello, CDO Deloitte LLP and Juan Riojas, CDO InformaticaSep 19 20196:00 pmUTC46 mins
Data is no longer an advantage; everyone has it. But how you harness data to power your business can give your organization a competitive edge. The CDO is a critical enabler among the leadership team, providing the executive ownership needed to enhance decision making, improve operational efficiency, and empower innovation.
Sue Gilkes, CompTIA Faculty, CompTIASep 23 20192:00 pmUTC60 mins
** This is an EMEA focused webinar **
Tried and true best practices established for building profitable managed IT service businesses certainly exist. This session explains those best practices and provides in-depth advice on six key actions for their implementation.
From understanding the opportunity to developing a marketing plan to support a sales team, attendees will gain valuable insight into best practices for building their business.
Winn Schwartau, Chief Visionary Officer, The Security Awareness Co; Chuck Easttom, Professor, Capitol Technology UnivSep 24 20195:00 pmUTC60 mins
(ISC)² will hold its 2019 Security Congress in Orlando, Fl Oct 28th – 30th. This conference will bring together a global community of cybersecurity professionals and more than 180 educational sessions. One of the 18 tracks at the conference will focus on Security Automation and the role that Machine Learning and Artificial Intelligence is playing in securing organizations of all sizes. On September 24, 2019 at 1 p.m. Eastern, join (ISC)² and several speakers who’ll be presenting in the Security Automation track on the Impact of Machine Learning on Cyber Security and Ethical Bias in AI-Based Security Systems as they preview their sessions and discuss why security automation is a leading concern for cyber security practitioners to understand.
Informatica's Bryan Weinman, Business Development Executive and Jennifer McGinn, Director Product MarketingSep 24 20196:00 pmUTC31 mins
Marketers need a customer intelligence system that will help them:
•Drive customer engagement, customer loyalty, and advocacy
•Differentiate from the competition on the ability to understand the customer better
Informatica Customer 360 Insights enables marketers to connect fragmented customer data and create a contextual 360 view to power digital and marketing transformation initiatives.
Paul Hampton, Thales and Rob Dobson, Device AuthoritySep 25 20193:00 pmUTC60 mins
The Internet of Things (IoT) holds huge potential for your organization, but if you’re like most, you still have concerns about security. How can you be sure that the IoT solutions you deploy will enable you to guarantee the security of your organization and your customers?
IoT will be a game changer due to the scope of data and devices, but it also promises to change the security paradigm. The future of IoT will rely on the ability to create a foundation of security, trust, and data integrity, whilst being able to seamlessly manage countless numbers of devices.
Today there is no single vendor responsible for securing IoT. It takes an entire ecosystem of solutions providers working together and playing their part to ensure end-to-end security across the device, network and application.
In this webinar, experts from Thales and Device Authority will share their industry expertise, looking at security risks of IoT devices and infrastructures across many industries including medical devices, industrial manufacturing and automotive - exploring what learnings can be implemented today. You can explore how you can take the first steps to keeping your IoT devices and data secure, and your organization and customers safe.
The agenda will include a discussion around:
• Risks and Challenges of IoT
• Why use PKI for IoT?
• How to automate security operations and management
• Bring Your Own Key (BYOK)
• Examples / Use Cases – Medical, Industrial, Automotive etc.
• Thales & Device Authority Solution
Roman Tobe, Product Marketing ManagerSep 25 20195:00 pmUTC52 mins
Security is more critical than ever for healthcare organizations. At the same time, the sector has become one of the most easily targeted. Hospitals, for example, are falling victim to cyber-attacks such as ransomware and business email compromise (BEC). However, healthcare organizations attack surface extends beyond email.
Cyber criminals create fake social media accounts and register fraudulent domains to attack their supply chain, defraud their customers and gain access to sensitive data. Join this webinar and learn how Proofpoint can help protect healthcare organizations from these targeted attacks.
Join us to learn:
- The state of cyber risks in healthcare
- The latest trends in cyber threats targeting healthcare organizations
- How Proofpoint can help protect your organization
Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance StrategySep 25 20196:00 pmUTC41 mins
This is the second webinar in the three-part Data Governance series. At the heart of a successful Enterprise Data Governance program are people. Some are technical. Some are not. Some are located in the lines of business while others work in IT. Some have a particular view on data policies. Others are likely to disagree. No enterprise data governance program is perfect but in order to scale and be truly enterprise-wide, silos need to be broken.
This is a great webinar for anyone dealing with silos that are holding back an enterprise data governance program. In this webinar, we will showcase how others have overcome these challenges and will share some best practices.
The prognosis of patients with glioblastoma (GBM) remains dismal with a median survival of approximately 15 months. Current preclinical GBM models are limited by the lack of a “normal” human microenvironment and the inability of many tumor cell lines to accurately reproduce GBM biology. To address these limitations, our guest presenter and her team have established a unique model system whereby they can retro-engineer patient-specific GBMs using patient-derived glioma stem cells (GSCs) and human embryonic stem cell (hESC)-derived cerebral organoids. Their cerebral organoid glioma (GLICO) model shows that GSCs home toward the human cerebral organoid, and deeply invade and proliferate within the host tissue forming tumors that closely phenocopy patient GBMs. Furthermore, cerebral organoid tumors form rapidly and are supported by an interconnected network of tumor microtubes that aids in the invasion of normal host tissue. This GLICO model provides a new system for modeling primary human GBM ex vivo and for high throughput drug screening.
Guest Presenter Bio:
Dr. Amanda Linkous previously served as the Director of the Starr Foundation Cerebral Organoid Translational Core at Weill Cornell Medicine (New York, NY). She completed her postdoctoral training in the Neuro-Oncology Branch at the National Cancer Institute (Bethesda, MD). Dr. Linkous is currently the Scientific Center Manager for the NCI's Center for Systems Biology of Small Cell Lung Cancer (SCLC) at Vanderbilt University, where she is developing similar 3D model systems to study the biology and refractory nature of SCLC (Nashville, TN)