Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.

Webinars and videos

  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?

    Join Juniper security experts, Pete McMullen & Ben Griffin for a 60 minute Junos WebApp Secure (JWAS) and Spotlight Secure overview and LIVE DEMO to learn how Juniper can protect your web assets from the largest Internet security threats known!
  • Today’s Health IT leaders face a difficult task in handling mobile device security and policy compliance, particularly given the mobile transformation happening in healthcare today. Driven in part by the adoption of new care models like remote patient monitoring and telemedicine, and the Bring Your Own Device, or BYOD trend, the consumerization of IT is driving end-user demand for ubiquitous access – to networks, to clouds, to applications, to everything – from any device, anywhere at any time.

    In this webinar, we will highlight the challenges of mobile device security, management and policy today. We will consider the issues faced by Health IT teams when managing different operating systems across a myriad of devices, some of which are user-owned. Finally we’ll look at how Juniper Networks solutions address a broad spectrum of security and end-user experience issues, as we walk through a day in the life of a mobile clinician. Register now to attend!
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • SharePoint 2013 features a new app model that allows you create easy-to-use, lightweight web applications that integrate popular web standards and technologies to extend the capabilities of a SharePoint website. Join our live webcast for an overview of Microsoft’s new SharePoint app model and learn:

    • How to configure app development for SharePoint on-premises
    • How developers can kick-start app development using SharePoint Online
    • What the differences are between provider-hosted and autohosted apps for SharePoint
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • Join this unique roundtable chat with three InfoSec Professionals who have recently climbed the BYOD mountain and come back down to share their stories. We’ll discuss the industry and regulatory differences, managing user expectations of privacy, legal implications and technical pitfalls in this 60 minute Security Leadership Series webinar, brought to you on April 10, 2014 at 1PM Eastern in partnership with Capella University.
  • Virtual Desktop Infrastructure (VDI) is now a mature technology that is being adopted by organizations with increasing popularity. However, the user community who needs high-end graphics capabilities in their work (such as 3D modelling and simulations) were somewhat skeptical about the capabilities and performance of VDI with applications using 3D graphics, compared to the performance they can expect from a physical PC or workstation with a dedicated GPU. Recent advances in VDI help make this performance gap narrower by providing the capabilities for either a pool of virtual desktops (shared GPU) or, to a specific virtual desktop (GPU pass through), depending on the user requirements.

    Join Teradici for a deep dive on Graphics Processing Unit (GPU) deployment options for VMware Horizon View and walk away with the GPU knowledge to increase productivity and accelerate your application performance in your virtual environment. In this webinar, we will discuss GPU technology related to Virtual Shared Graphics Acceleration (vSGA),Virtual Dedicated Graphics Acceleration (vDGA) and Teradici PCoIP Hardware Accelerator deployment options available today. We will also explore how using PCoIP Hardware Accelerator in combination with a GPU allows you to expand and enhance your VDI deployment to provide a rich and interactive graphical experience across a broad set of use cases and ensure application performance.

    Key Takeaways
    • Understand the graphics acceleration options for VMware Horizon View
    • Learn how PCoIP Hardware Accelerator complements GPU implementations to improve 3D application performance
  • Join experts from Juniper Networks and Rand Corporation for a fascinating overview of new research about the economics of the cyber crime market. In this research, key economic indicators show cybercrime is rapidly maturing, leading to a more diverse and challenging threat landscape for businesses, governments and people operating in the digital world. In fact, the ability to attack is outpacing the ability for many to defend themselves.

    RAND researchers will discuss:
    • Current and historical trends in cyber crime methods and tools
    • How the black and grey market for vulnerabilities shapes the criminal landscape
    • Key indicators of cyber crime market maturation

    Juniper experts will outline:
    • How organizations can use these findings to help inform a better and more active defense strategy
    • Breaking the cyber crime economic model with advanced intrusion deception technologies
  • SLC transporter-mediated drug–drug interactions (DDI) can significantly impact the pharmacokinetics and safety profiles of drugs. The regulatory agencies (FDA/EMA) recent guidance documents recommend testing six SLC transporters for potential DDI: OATP1B1, OATP1B3, OAT1, OAT3, OCT1 and OCT2. The 2013 drug transporter white paper published by the International Transporter Consortium (ITC) identified additional drug transporters relevant to drug development, including the Multidrug and Toxin Extrusion SLC transporters: MATE1 and MATE2-K. The webinar will introduce a novel cell-based SLC transporter model system - the recently launched “Corning™ TransportoCells™” - for studying regulatory agency recommended SLC transporters. The new system provides a convenient “thaw and go”, high performing mammalian cell model which supports regulatory agency recommendations for evaluating transporter mediated drug-drug interactions in vitro. In this webinar, we will provide an overview of the product validation and applications for the TransportoCells™ transporter model system. Validation data will also be presented for the newly available MATE1 and MATE2-K Corning™ TransportoCells™.
  • Open to all staff in the South West and South Central regions

    This FREE webinar will cover the recently announced changes to the VAT rules within the NHS including the shift to general government department guidance and the amendments to specific COS codes.

    Sign up to listen in on what promises to be a very informative session!
  • With Mule Studio, a single graphical design environment for the Anypoint platform, any developer can build hybrid integrations. In this webinar, Steven Camina, Sr. Product Manager, will build a complete integration scenario and deploy it both to a local machine on-premises and to the MuleSoft’s iPaaS solution, CloudHub. Once deployed, he’ll go through the runtime management and monitoring capabilities available on the Anypoint Platform.

    In this all-demo, no-slides webinar, you’ll learn how to:
    - Automatically generate data mappings to Salesforce with Anypoint DataSense
    - Track and debug message flows with Visual Flow Debugger
    - Leverage common testing tools like JUnit, Jenkins, and Maven
    - Deploy an application on-premises or to the cloud with one click
    - Manage clusters servers, flows, and endpoints with Mule Enterprise Management
  • By profiling criminal activity, the Verizon Data Breach Investigations Report has been able to identify three distinct threat actors including espionage, organized crime, and activists. Organizations can take proactive steps to mitigate potential risks by understanding each threat actor’s methods and targets. In this three part series, (ISC)2 and Oracle will examine these three threat actors, the industries they target, and how to protect sensitive customer and organizational data. We begin with countering espionage threats and their preference for using stolen credentials.
  • Recap of "Who Needs to Be Compliant" and "SOX Compliance Fundamentals" with live Q&A session.

    In this live webcast, Guy Wakefield and Ashley Peacock will provide an overview of key takeaways and host a live Q&A session to address questions related to videos 1&2 in the series:

    Life Sciences: Who Needs to Be Compliant?
    SOX Compliance Fundamentals
  • With Mule Studio, a single graphical design environment for the Anypoint platform, any developer can build hybrid integrations. In this webinar, Steven Camina, Sr. Product Manager, will build a complete integration scenario and deploy it both to a local machine on-premises and to the MuleSoft’s iPaaS solution, CloudHub. Once deployed, he’ll go through the runtime management and monitoring capabilities available on the Anypoint Platform.
  • With Mule Studio, a single graphical design environment for the Anypoint platform, any developer can build hybrid integrations. In this webinar, Steven Camina, Sr. Product Manager, will build a complete integration scenario and deploy it both to a local machine on-premises and to the MuleSoft’s iPaaS solution, CloudHub. Once deployed, he’ll go through the runtime management and monitoring capabilities available on the Anypoint Platform.
  • Take an in-depth look at VMware vSphere with Operations Management through this webinar. Viewers will discover the benefits of the world’s best virtualization platform with operational insight into a virtual environment for monitoring and performance. Providing features such as insight into workload capacity and health though capacity planning, optimizing efficiency, and improved performance, and end-to-end visibility into virtual infrastructure health, Vincent Riccio will cover these and other features in detail.

    Learn how vSOM addresses challenges such as:
    •Overprovisioning of capacity
    •Underutilization of hardware
    •Difficulty isolating performance problems
  • New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled.

    Attend this webinar to learn:

    • Why the level of preparedness is being held back by lack of understanding about threats
    • How an emphasis on reputation is driving formalization of plans and processes
    • The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats
  • One year after the Health and Social Care Act became law what has been the impact of the new competition framework – and how can NHS organisations comply with the law while also pursuing their aim of providing high quality care in a way which is both affordable and sustainable?

    This free webinar, in association with specialist healthcare law firm Hempsons, will look at the key issues for NHS and foundation trusts, and how they can comply with the law while still achieving their aims of creating sustainable and financially sound organisations.

    It will look at options trusts could consider such as provider collaborations, hospital chains and mergers, as well as the need to comply with competition law and the provider licence competition conditions.

    It will consider the role of commissioners in service and organisational change, and how organisations can best engage with Monitor and the Competition and Markets Authority, which will replace the OFT and Competition Commission on April 1. Viewers will get the chance to pose questions to our expert panel.

    Register now to ensure you are up to date on this crucial topic for acute, community and mental health trusts.

    Where: online
    When: 26th March 2014
    Duration: 45 minutes
    Cost: FREE

    On the panel

    Chair Dame Gill Morgan, chair of the Foundation Trust Network

    Ralph Coulbeck, director of strategy at the NHS Trust Development Authority

    Anita Charlesworth, chief economist at the Nuffield Trust

    Christian Dingwall, partner and head of corporate commercial at Hempsons

    This webinar will be essential viewing for chief executives and senior managers: make sure you register now.

    We look forward to welcoming you to HSJ TV.

    Can’t make it at this time? Don’t worry, you can catch up on demand after the event by registering with HSJ TV.
  • The final versions of better care fund plans are due on 4 April, but the need to make the plans real will begin immediately.
    There will be questions on who hosts and facilitates the pooled money. CCGs and local authorities will need to liaise on governance and negotiate the section 75 arrangements.

    This webinar aims to help practitioners get a clearer understanding of how to plan for these issues and give them an opportunity to reflect on how far they have got in this process. For example, what does an ideal situation look like and how does your position compare?
    An NHS England representative will lead the webinar, looking at these issues and drawing on examples of local integration initiatives that are helping to put organisations in a strong position to implement the BCF.

    Presented by Ivan Ellul, Director of Partnerships - NHS England.

    Accompanied by Krishna Taylor, System Policy and Alignment Manager at NHS England.
    and Ben Fletcher, Senior Finance Lead, Financial Strategy and Allocations at NHS England
  • In this on-demand video, Ashley Peacock, Director of Regulatory Compliance with Business & Decision, presents an overview of the Sarbanes-Oxley Act and discusses how SOX impacts IT organizations and how companies that are subject to other regulations can implement SOX compliance as part of a multi-regulation quality system.
  • La Dr.ssa Daniela Cangelosi, presenta la sua esperienza clinica e risultati su epilazione viso e corpo con sistema laser a diodi LightSheer.
    PB-1005024 Rev A