Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
3D culture is gaining pivotal importance for attaining in vivo-like conditions in a dish to study developmental cues as well as therapeutic possibilities. Organoid development promises to be one of the most important research tools in the near future. This presentation will cover:
• Methodologies used in organoid culture
• Matrices for growing organoids
• Recovery of organoids for downstream applications
Dr. Nitin Kulkarni is a member of the Scientific Support team at Corning Life Sciences. He has a Ph.D. in Biology and has worked on engineering transgenic mouse models for autoimmune diseases during his post-doctoral research at the Beth Israel Deaconess Medical Center in Boston, MA.
In his current role, he supports researchers with applications related to cell culture including advanced surfaces and extracellular matrices, genomics, drug discovery and bioprocesses.
By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.
AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
How AlienVault USM detects communications with the command and control server
How the behavior is correlated with other signs of trouble to alert you of the threat
Immediate steps you need to take to stop the threat and limit the damage
Three-dimensional cell cultures, and multicellular tumor spheroids in (MCTS) in particular, have recently become a widely used tool for preclinical anticancer drug testing in high-throughput screening (HTS) setup. However, even though MCTS have been applied for HTS, their use has been limited to simple assays, such as assessing cell viability or inhibition of growth.
This webinar will cover new approaches to MCTS-based HTS. It will present a new, robust viability assay, well-suited for HTS and based on green fluorescent protein (GFP) used as a surrogate marker of spheroid viability. It will also review a first-ever approach to obtain information-rich transcriptomic data from drug-treated MCTS on a large scale. In addition, the presenter will demonstrate how this novel platform resulted in the identification of previously unrecognized, context-dependent drug responses of cancer cells and in findings with potential clinical relevance.
In summary, this webinar will demonstrate new ways of how MCTS-based HTS can be used to provide unique insights into context-dependent biology and cellular drug responses.
About the Presenter:
Wojciech Senkowski will soon complete his Ph.D. in Medical Sciences at Uppsala University, Sweden. In his work, he looks for applications of various tumor spheroid models in high throughput drug screening. For his work, Wojciech has received the AACR Scholar-in-Training Award. He was also a presenter and expert panelist at the Genetic Engineering & Biotechnology News webinar on 3D cell cultures, sponsored by Corning in February of 2016.
Over the past decade, the adoption of digital solutions has increased significantly throughout the healthcare industry. This exceptionally strong growth trajectory is expected to continue into the foreseeable future as U.S. healthcare organizations transform to meet the demand for more efficient, clinically integrated and decentralized care systems that serve empowered, technologically-savvy consumers who strongly value convenience and personalization.
The AlienVault® Open Threat Exchange™ is an open platform for security research that provides a mechanism for updating your OSSIM instance with the latest threat intelligence from AlienVault Labs or other security researchers. By connecting your OSSIM instance to OTX, you will continuously receive updates from the researchers you trust to help detect relevant Indicators of Compromise (IoC's) in your environment. Or, you can use OTX for your own security research and to share your results with the community.
Join us for this OSSIM training session covering how to:
Set up an OTX account and link it to your OSSIM instance
View OTX Pulses to get context on threats
See how the OSSIM platform alerts you of IoCs from OTX in your environment
Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor Analysis of Information Risk (FAIR) framework and (ISC)2 to learn more about FAIR. Jack will highlight both the quantitative use-cases as well as the ways in which FAIR can be leveraged to improve qualitative risk analysis. This will be followed by a demonstration on how to quantify cyber risk with the RiskLens Cyber Risk Quantification software platform.
The healthcare industry is undergoing rapid transformation. By 2025, the healthcare ecosystem is expected to look drastically different from today. In 2025, global trends of aging populations, rising chronic disease prevalence and urbanization are bound to further strain healthcare systems already grappling with issues of healthcare access, quality, and cost. In response, new business models are expected to emerge to address the needs of the future. In order to make the most gains, stakeholders must successfully leverage this transformation.
CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.
Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:
· What top 3 cyber security trends will have the largest impact in 2017
· Why cyber attacks are on the rise and multiplying quickly
· How to combat the increasing number of breaches
· What to consider in building a security plan that is right for your organization
You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
Server virtualization was supposed to consolidate and simplify IT infrastructure in data centers. But, that only “sort of happened”. Companies do have fewer servers but they never hit the consolidation ratios they expected. Why? In one word, performance.
Surveys show that 61% of companies have experienced slow applications after server virtualization with 77% pointing to I/O problems as the culprit.
Now, with hyperconverged, companies have another opportunity to fulfill their vision of consolidating and reduce the complexity of their infrastructure. But, this will only happen if their applications get the I/O performance they need.
Join us for this webinar where we will show you how to get industry leading I/O response times and the best price/performance so you can reduce and simplify your infrastructure.
Join us Wednesday, January 18, at 10 a.m. CST as we tell the story of the IT pro who found, fought and defeated Shadow IT across his company.
We'll dive into the planning process and step-by-step techniques you can start using tomorrow to combat Shadow IT ops within your organization.
Josh Duncan, Senior Director of Product Management, and Mitch Holt, Manager of Demand Generation, will engage in a Q&A-style conversation, telling the story of an IT manager who strategically eliminated Shadow IT where needed and leveraged it in other areas.
We’ll have you in and out in less than an hour…we promise.
Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.
Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
·The changing landscape of regulations and consumer behavior
·Technology transformations and new innovations that will influence the way you prepare for 2017
In this webinar, Dr. Michael Samoszuk will discuss the correlation between images of urine sediment particles captured on the iRICELL3000 and images viewed manually under the microscope using actual patient samples. Attendees will learn how these images compare and how automated microscopy helps to reduce user subjectivity in microscopy by standardizing the process.
In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.
This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.
About the presenters:
John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy
Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
Follow him on Twitter: @ChrisMatthieu
Insiders. Targeted attacks. Bad actors. Malware. Organized crime. Ransomware. The threats to your IT infrastructure and organization are many and come from multiple vectors. Detecting, assessing and managing these threats are paramount to the well being of the organization. If the worse does happen and there is an incident, quick and efficient response is critical. Join Intel Security and (ISC)2 on December 20, 2016 at 1:00PM Eastern for our final ThinkTank roundtable of the year where we will discuss threats, threat management and incident response.
It's said that teamwork makes the dream work. And the dream is a secure organization. While you and the rest of your team works towards that, it takes everyone to achieve comprehensive and effective security. But achieving this degree of security thinking within in an organization is fraught with challenges - ensuring the consistent application of controls across the enterprise and across, to outside partners and vendors, the changing skill set and diversity of the workforce & security staff and the hiring of talent to maintain security. Join Trend Micro and (ISC)2 on December 15, 2016 at 1:00PM Eastern for a roundtable discussion as we examine this topic and how best to manage these issues.
Building and maintaining an effective pre-payment claims review program can be challenging without leveraging prior inappropriate billing patterns or checks against fraud trends that were previously identified during post-payment claims reviews. In this session, participants will learn the importance of gathering and leveraging information from post-payment reviews to significantly strengthen pre-payment review programs, as well as the use of ICD-10 codes and outliers that can help generate new leads based on current billing trends and better address claims system vulnerabilities.
Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.
See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.
This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.
In this webinar, Dr. Guido Vranken and product manager Lobke Tremmerie discuss how to implement Bulls XB algorithm, which uses RBC indices to create a weighted moving average of patient sample results, to statistically monitor hematology results. This unique algorithm, offered on Beckman Coulter hematology instruments, allows users to monitor result quality with no additional reagents, software licenses or costs. Laboratories worldwide can implement this simple, powerful tool to enhance results and improve compliance. P.A.C.E. credit is available for your participation.*
Dr. Guido Vranken has been working with customers for over 30 years across different disciplines, including protein chemistry, immunoassay and hematology. He specializes in conducting internal and external validation studies. Dr. Vranken spent three years as a lecturer on statistics at the University of Ghent.
Lobke Tremmerie earned her environmental engineering degree from the University of Ghent in 2002. She first became an electrophoresis and nephelometry sales engineer at Analis, Beckman Coulter’s exclusive Belgian distributor. Following her true passion, she transferred into the hematology division in 2004. Ms. Tremmerie currently serves as Analis’ cellular biology product marketing manager.
As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.
Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.
Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.
Attendees will learn:
- What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
- How to build and manage APIs in a way that improves health data security and increases IT agility.
- How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.
But, is HCI right for you? What use cases make sense for HCI?
Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:
- Use cases suitable for HCI
- Criteria to evaluate HCI products
- Pros and cons of different vendors’ HCI
- Avoiding the missteps of early adopters
There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.
That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.
Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:
*What is the Two-Year Trap and how to avoid it
*How to manage the long-term vs. short-term security view
*What do about trendy security attacks
Join us to learn how CISOs can extend their life expectancy with a long-term view.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
The in vitro diagnostics industry is shifting because of integration of the multi-disciplinary capabilities in biology, chemistry and computational power that companies can leverage to develop new solutions to diagnose, treat and manage chronic disease conditions such as cancer, cardiovascular disease and diabetes. There is immense pressure on companies to improve product development, manufacturing and distribution of new technology platforms such as Point-of-care Molecular Diagnostics to capture new growth opportunities in the precision medicine market. This will transform clinical practice and treatment outcomes.
Cloud applications have garnered widespread adoption from enterprises in part due to their advantages such as ease of deployment, lower TCO, and high scalability. These applications are also popular because end-users can rely on these applications to work and collaborate from anywhere and on any device. But should the enterprise trust cloud app providers to protect their data from malware and ransomware? Currently, there are only a handful of enterprise cloud applications that provide native malware protection which, in almost all the cases, does not include zero-day protection. Join Bitglass and (ISC)2 for the first part of our next Security Briefings series on March 9, 2017 at 1:00PM Eastern when we will discuss malware protection solutions offered by various cloud application providers, how malware can penetrate into cloud applications and how Cloud Access Security Brokers (CASB) can protect enterprise cloud applications from malware.
2017 is once again a year of significant change for pharma market access in Europe, with affordability on the agenda for almost every country in the region. There is a move toward greater collaboration in health technology assessment and more transparency between countries for pricing, therapeutic protocols and and details of negotiations with drug manufacturers. We also see member states working to understand the process of enabling cost-effective patient access to personalised and high-cost treatments, such as new oncology combination therapies, antibiotics and stem cell therapies, which offer the promise of efficacy in key disease areas.
With market access being referred to as the “fourth hurdle” in drug development (beyond efficacy, safety and quality), it is vital that the requirements for both approval and access are addressed early in the process. Parallel scientific advice from HTA bodies and regulators is increasing to deliver tangible and successful strategies, but is the process smooth enough to overcome the challenges from both sides?
pharmaphorum in partnership with DIA will be hosting an expert panel debating the best way forward for life sciences companies, payers and providers in this emerging European market access paradigm.
Join our webinar to hear from experts in industry and healthcare discussing the challenges and solutions of access in the changing European market.
Topics up for discussion include:
•Integrating HTA and regulatory strategy – the best way forward
•Regional variation and implication – how to efficiently and effectively navigate EU market access
•Proving value – how to leverage real world evidence to meet increasing demands for observational data
•Future proofing market access – how to improve upon evidence generation and use technology effectively and competitively
The promise of the cloud in healthcare is clear; delivering on that promise, less so. Security and HIPAA compliance challenges, combined with the technical difficulty of configuring on-premise EHR systems to co-exist with modern cloud platforms, have delayed cloud adoption in the industry.
This webinar will share how Anypoint Platform’s unique combination of data integration and API lifecycle management can help power the rapid, secure adoption of Salesforce and other modern healthcare cloud applications. It will also showcase how PwC has leveraged the MuleSoft platform to develop innovative solutions for its healthcare clients, and feature a demo of PwC's Smart Agent.
Attendees will learn:
- Common pitfalls healthcare organizations face in migrating to the cloud, and how they can be addressed with a hybrid integration model
- How APIs can be used to increase the security and governance of health data
- How PwC leverages MuleSoft’s platform to drive business outcomes in healthcare
Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.
AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.
Join this live demo to see how USM Anywhere makes it easy to accomplish these key tasks:
Discover all assets across your AWS, Azure and on-premises environments
Scan for vulnerabilities across cloud-based and physical assets
Detect emerging threats with real-time, integrated threat intelligence
Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
Respond quickly to incidents & conduct thorough investigations
The use of calibrators in an analytical method is important to ensure measurement accuracy and traceability and instrument reliability. The major challenges with testosterone testing by LC-MS/MS typically involve achieving consistency in performance and accuracy of results at low levels found in women and children across different laboratories. This lecture presents the new CE marked testosterone serum calibrator kit for in-vitro diagnostic (IVD) from Merck KGAa Darmstadt, Germany . It is for use in LC-MS/MS testosterone testing methods. Mr. Johnson will highlight the unique features and benefits of this regulatory cleared Certified Reference Material as a calibrant for standardization of laboratory LC-MS/MS testosterone methods.
In this webinar, Elena Lazarova, M.D., esteemed clinical biology specialist, researcher and speaker, will discuss the value of precise cell volume measurement in differentiating for blood disorders and its importance in effective patient care. Gaining information about cell volume at different stages in the maturation process provides important insight into a patient’s underlying pathology and may have added value in the diagnosis of blood disorders. Beckman Coulter offers precise cell volume measurement* through the advanced technology and sophisticated algorithms of its uniquely designed DxH 800 hematology systems.
After the webinar, you will be able to:
• Cite the challenges laboratories face in differentiating for rare types of anemia
• Outline the benefits of flow cytometric reticulocyte analysis, available on the DxH 800 platform
• Understand the value of precise cellular volume measurement* to aid in the differential diagnosis of anemia
*For research use only and not cleared by the FDA for clinical diagnosis
**P.A.C.E. credit is available for your participation.
Dr. Elena Lazarova earned her M.D. degree from the Medical University of Varna, Bulgaria, in 2002. With over 10 years of experience in clinical and laboratory hematology, immunohematology and transfusion medicine, Dr. Lazarova is a highly sought-after teacher and lecturer. She has authored/co-authored seven medical journal articles and has served as primary author on 17 poster and oral presentations at congresses throughout the world. Dr. Lazarova continues her work in laboratory medicine, focusing on hemoglobinopathies and red blood cell pathologies (hereditary spherocytosis and autoimmune hemolytic anemia) in laboratories at Hôpital Erasme in Brussels.
CRISPR Cas9 nucleases have revolutionized the field of gene editing and high-throughput lentiviral screens continue to hold ever-increasing promise for both basic research and development of future therapies to benefit human health. Even with such powerful technologies at hand, researchers new to the field may find the screening of multiple targets to be challenging and time-consuming. This webinar discusses the Evotec partnership with Life Science Business of Merck KGaA, Darmstadt, Germany and the screening services for drug discovery.
While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.
Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.
Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.
Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
Q&A will follow at the end of the session.
Comparability exercises are commonly required at certain milestones during drug development as well as after product registration when changes are implemented into the manufacturing process. The goal is to evaluate if the product remains highly similar (not necessarily identical) before and after the change in terms of quality and stability and have no adverse impact on safety and efficacy predicted for the patients. This assessment requires product-specific knowledge gathered through drug development, taking a totality-of-evidence approach. The different levels of information are obtained from analytical studies for characterization of the molecule, animal studies for toxicity, pharmacokinetics and pharmacodynamics for pharmacological activities, and clinical studies for safety/tolerability, immunogenicity and efficacy. This Webinar discusses strategies and considerations for analytical characterization of protein structure and function which forms the foundation of the comparability demonstration.
Pharmacists are highly trained healthcare professionals who have a deep understanding of medicines and daily contact with patients and consumers. This puts them in a unique position in terms of being able to maximise the benefits that patients get from their medicines – however, healthcare systems and pharmaceutical companies frequently overlook this potential.
Pharmacists are especially well placed to help patients with multiple long-term conditions manage their health and medications, and pharmacist-led interventions have been shown to have a very significant impact on compliance and disease management in the community.
We present a webinar debate in which our expert panel will discuss how pharmaceutical companies can work in collaboration with pharmacists in Europe to help patients make the most of their medicines, help generate data to prove the value of these interventions, and above all get the right medicine to the right patients and consumers.
Join us and the PHOENIX group as we look at the practical steps needed to make this a reality. Key topics to be discussed include:
•The challenges of identifying the right patient population across European markets
•Understanding how pharmacists can play a greater role in patient care, e.g. improved adherence and outcomes
•How optimum use of pharmacy level information can contribute to providing ‘real world’ evidence of treatments
The use of calibrators in an analytical method is important to ensure measurement accuracy and traceability and instrument reliability. The major challenges with testosterone testing by LC-MS/MS typically involve achieving consistency in performance and accuracy of results at low levels found in women and children across different laboratories. This lecture presents the new CE marked testosterone serum calibrator kit for in-vitro diagnostic (IVD) from Merck KGaA, Darmstadt, Germany . It is for use in LC-MS/MS testosterone testing methods. Dr. Hardt will highlight the unique features and benefits of this regulatory cleared Certified Reference Material as a calibrant for standardization of laboratory LC-MS/MS testosterone methods.
Next-generation sequencing (NGS) technology has brought an influx of large-scale data and ever-growing demands for compute, resulting in a challenge for those in science informatics. To overcome these issues, laboratories need to be able to support researchers while managing data and the infrastructure needed to deliver mission-critical results and ultimately, positive patient outcomes.
At the NGS Data Analysis and Informatics Conference in February, attendees spoke about these challenges at length. This webinar, built from content shared at the event, will review potential approaches to cost-effective data growth using cloud compute and storage. Moving genomics workloads to the cloud can provide scale and affordability, while optimizing investments in existing resources. Adding that ability to allow researchers to easily collaborate while reducing latencies to these resources is pertinent to usability.
In this webinar, you’ll learn how to:
- Increase computation potential
- Optimize your physical infrastructure
- Diagram common use cases to meet specific research goals
- Increase flexibility by limiting data gravity
The importance and value of continuous bioprocessing, both upstream and downstream has economic and sustainability advantages and due to the modular nature of continuous bioprocesses means that industry is able to adapt more rapidly to changing market demands. Continuous biopharmaceutical manufacturing in the context of other industries that have already successfully adopted continuous processing. Factor other than scientific ones, are the barriers to change from batch to continuous production. an excellent example of the manufacturing strategies of the steel industry in the 20th century, when this industrial sector incrementally switched from batch to continuous operations. biopharmaceutical industry has reached a stage that requires a change in the production paradigm. For a certain class of biopharmaceutical products upstream continuous manufacturing has always been applied: for example, unstable proteins that rapidly degrade in the culture broth. In order to obtain a high quality product, the residence time in the reactor must be minimized. This can only be achieved with continuous cultivation and preferably with perfusion reactors. a brief overview on the types of cell retention devices currently used in biopharmaceutical industry.
Furthermore, this is a universal production platform that can be extended to other classes of products, such as antibodies, which are relatively stable molecules. continuous manufacturing is as productive and with a much smaller footprint of the manufacturing plant, avoiding multiple non-value added unit operations. In essence, the investment for a continuous plant is much smaller compared to a batch-operated one.