Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.
Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:
· What top 3 cyber security trends will have the largest impact in 2017
· Why cyber attacks are on the rise and multiplying quickly
· How to combat the increasing number of breaches
· What to consider in building a security plan that is right for your organization
You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
Server virtualization was supposed to consolidate and simplify IT infrastructure in data centers. But, that only “sort of happened”. Companies do have fewer servers but they never hit the consolidation ratios they expected. Why? In one word, performance.
Surveys show that 61% of companies have experienced slow applications after server virtualization with 77% pointing to I/O problems as the culprit.
Now, with hyperconverged, companies have another opportunity to fulfill their vision of consolidating and reduce the complexity of their infrastructure. But, this will only happen if their applications get the I/O performance they need.
Join us for this webinar where we will show you how to get industry leading I/O response times and the best price/performance so you can reduce and simplify your infrastructure.
Join us Wednesday, January 18, at 10 a.m. CST as we tell the story of the IT pro who found, fought and defeated Shadow IT across his company.
We'll dive into the planning process and step-by-step techniques you can start using tomorrow to combat Shadow IT ops within your organization.
Josh Duncan, Senior Director of Product Management, and Mitch Holt, Manager of Demand Generation, will engage in a Q&A-style conversation, telling the story of an IT manager who strategically eliminated Shadow IT where needed and leveraged it in other areas.
We’ll have you in and out in less than an hour…we promise.
Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.
Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
·The changing landscape of regulations and consumer behavior
·Technology transformations and new innovations that will influence the way you prepare for 2017
In this webinar, Dr. Michael Samoszuk will discuss the correlation between images of urine sediment particles captured on the iRICELL3000 and images viewed manually under the microscope using actual patient samples. Attendees will learn how these images compare and how automated microscopy helps to reduce user subjectivity in microscopy by standardizing the process.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.
This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.
About the presenters:
John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy
Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
Follow him on Twitter: @ChrisMatthieu
Insiders. Targeted attacks. Bad actors. Malware. Organized crime. Ransomware. The threats to your IT infrastructure and organization are many and come from multiple vectors. Detecting, assessing and managing these threats are paramount to the well being of the organization. If the worse does happen and there is an incident, quick and efficient response is critical. Join Intel Security and (ISC)2 on December 20, 2016 at 1:00PM Eastern for our final ThinkTank roundtable of the year where we will discuss threats, threat management and incident response.
It's said that teamwork makes the dream work. And the dream is a secure organization. While you and the rest of your team works towards that, it takes everyone to achieve comprehensive and effective security. But achieving this degree of security thinking within in an organization is fraught with challenges - ensuring the consistent application of controls across the enterprise and across, to outside partners and vendors, the changing skill set and diversity of the workforce & security staff and the hiring of talent to maintain security. Join Trend Micro and (ISC)2 on December 15, 2016 at 1:00PM Eastern for a roundtable discussion as we examine this topic and how best to manage these issues.
Building and maintaining an effective pre-payment claims review program can be challenging without leveraging prior inappropriate billing patterns or checks against fraud trends that were previously identified during post-payment claims reviews. In this session, participants will learn the importance of gathering and leveraging information from post-payment reviews to significantly strengthen pre-payment review programs, as well as the use of ICD-10 codes and outliers that can help generate new leads based on current billing trends and better address claims system vulnerabilities.
Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.
See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.
This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.
In this webinar, Dr. Guido Vranken and product manager Lobke Tremmerie discuss how to implement Bulls XB algorithm, which uses RBC indices to create a weighted moving average of patient sample results, to statistically monitor hematology results. This unique algorithm, offered on Beckman Coulter hematology instruments, allows users to monitor result quality with no additional reagents, software licenses or costs. Laboratories worldwide can implement this simple, powerful tool to enhance results and improve compliance. P.A.C.E. credit is available for your participation.*
Dr. Guido Vranken has been working with customers for over 30 years across different disciplines, including protein chemistry, immunoassay and hematology. He specializes in conducting internal and external validation studies. Dr. Vranken spent three years as a lecturer on statistics at the University of Ghent.
Lobke Tremmerie earned her environmental engineering degree from the University of Ghent in 2002. She first became an electrophoresis and nephelometry sales engineer at Analis, Beckman Coulter’s exclusive Belgian distributor. Following her true passion, she transferred into the hematology division in 2004. Ms. Tremmerie currently serves as Analis’ cellular biology product marketing manager.
It is critical for organizations to onboard new technologies and improve processes to remain competitive. Yet, safely navigating a migration or consolidation project can be challenging.
The ExtraHop platform takes the guesswork out of application and data center migration by providing complete visibility and performance metrics that make clear the risks, but also support the success, of projects at any scale. By knowing before going, you can avoid unnecessary downtime and be sure that your user experiences remain consistent.
In this webinar, ExtraHop' Nick Brackney explains how the ExtraHop platform helps to ensure successful migrations and consolidations.
The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like Mirai, have turned our own Internet of Things (IoT) devices into weapons against us. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.
In this demo, we'll cover:
Common types of malware (viruses, worms, Trojans/RATs, rootkits, and more)
How new variants propagate while evading preventative security measures
Signature versus anomaly detection (and why both are important)
What to do when you detect malware activity on your network
How USM can help identify malware infections so you can take action quickly
With rising healthcare costs, more informed and engaged patients, and advancing technology, health wearables have seen a significant uptake in recent years. However, the full potential of health wearables has yet to be recognised and there are still challenges to be resolved. What needs to be done on the regulatory, technical and healthcare side to take health wearables to the next level?
In this webinar, experts from the life sciences and technology industries discuss their views on the current state and future developments of health wearables, including:
– The user perspective: perception, adoption and expectations today and tomorrow
– The technology perspective: biggest successes and most room for improvements
– The societal and regulatory perspective: cost and risks versus benefits and opportunities
Hear first hand from one of the nation’s leading healthcare providers, Intermountain Healthcare, on what is actually being accomplished with big data and machine learning (cognitive computing, artificial intelligence, deep learning, etc.) by leading healthcare providers.
Intermountain has evaluated between 300 and 400 big data and analytic solutions and actively collaborates with the other leading healthcare providers in the United States to implement the solutions that are delivering improved healthcare outcomes and cost reductions.
In this webinar, Dr. Michael Samoszuk discusses the correlative relationships between urine chemistry analytes and the particles noted under the microscope. Attendees will learn how using the knowledge of these correlations can optimize parameter setting for improved laboratory workflow.
Join us and PHOENIX group as we delve into the concept of current launch excellence and the role of patient insights in overcoming the multiple challenges the industry currently faces.
Key topics to be discussed include:
– The challenges of launching a product in Europe
– How pharma can improve its understanding of the process through the use of business intelligence
– How insights from new data can be applied to the process of launch excellence
– The role of real-world data in launch strategy
– The downstream effect of applying real-world data to product launch on patient outcomes.
Whether they are ready for it or not, IT Operations teams have the Internet of Things (IoT), including BYOD devices such as smart watches, added to their growing list of responsibilities.
With employees bringing in potentially compromised devices holding malicious malware, it's time for enterprise IT to understand the environment and not just tick the security compliance box.
On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence and enterprise architecture. A new network monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents!
This webinar is ideal for any networking, architecture or security professional looking to improve visibility across their network, to reduce threats and vulnerabilities and especially those with a focus on the Internet of Things (IoT).
Three-dimensional cell cultures, and multicellular tumor spheroids in (MCTS) in particular, have recently become a widely used tool for preclinical anticancer drug testing in high-throughput screening (HTS) setup. However, even though MCTS have been applied for HTS, their use has been limited to simple assays, such as assessing cell viability or inhibition of growth.
This webinar will cover new approaches to MCTS-based HTS. It will present a new, robust viability assay, well-suited for HTS and based on green fluorescent protein (GFP) used as a surrogate marker of spheroid viability. It will also review a first-ever approach to obtain information-rich transcriptomic data from drug-treated MCTS on a large scale. In addition, the presenter will demonstrate how this novel platform resulted in the identification of previously unrecognized, context-dependent drug responses of cancer cells and in findings with potential clinical relevance.
In summary, this webinar will demonstrate new ways of how MCTS-based HTS can be used to provide unique insights into context-dependent biology and cellular drug responses.
About the Presenter:
Wojciech Senkowski will soon complete his Ph.D. in Medical Sciences at Uppsala University, Sweden. In his work, he looks for applications of various tumor spheroid models in high throughput drug screening. For his work, Wojciech has received the AACR Scholar-in-Training Award. He was also a presenter and expert panelist at the Genetic Engineering & Biotechnology News webinar on 3D cell cultures, sponsored by Corning in February of 2016.
The healthcare industry is undergoing rapid transformation. By 2025, the healthcare ecosystem is expected to look drastically different from today. In 2025, global trends of aging populations, rising chronic disease prevalence and urbanization are bound to further strain healthcare systems already grappling with issues of healthcare access, quality, and cost. In response, new business models are expected to emerge to address the needs of the future. In order to make the most gains, stakeholders must successfully leverage this transformation.
Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
Over the past decade, the adoption of digital solutions has increased significantly throughout the healthcare industry. This exceptionally strong growth trajectory is expected to continue into the foreseeable future as U.S. healthcare organizations transform to meet the demand for more efficient, clinically integrated and decentralized care systems that serve empowered, technologically-savvy consumers who strongly value convenience and personalization.
Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On February 9, 2017, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.
In our webinar, Identifying Men with Significant Prostate Cancer—The Role of phi and Other Biomarkers, Dr. E. David Crawford will discuss key issues that challenge a physician's ability to make informed decisions regarding whom to biopsy for prostate cancer. After the webinar, you will be able to:
• Understand the historical perspective and controversy regarding prostate-specific antigen (PSA) screening
• Improve your interpretation of a PSA result
• Use biomarkers, such as Prostate Health Index (phi), to reduce negative biopsies and have more confidence in the decision to biopsy
• Understand how the phi score, combined with family and patient history, can determine patient management decisions
Dr. Crawford is an internationally renowned urologist and distinguished endowed professor of surgery, urology and radiation oncology. He also serves as the head of the section of urologic oncology at the University of Colorado Anschutz Medical Campus in Aurora, Colorado. Dr. Crawford received his medical degree from the University of Cincinnati. His postgraduate training included an internship and residency in urology at the Good Samaritan Hospital in Cincinnati. He subsequently completed a genitourinary cancer fellowship at the University of California Medical Center in Los Angeles.
3D culture is gaining pivotal importance for attaining in vivo like conditions in a dish to study developmental cues as well as therapeutic possibilities. Organoid development promises to be one of the most important research tools in the near future. This presentation will cover
•methodologies used in organoid culture
•matrices for growing organoids and
•recovery of organoids for downstream applications
Dr. Nitin Kulkarni is a member of the Scientific Support team at Corning Life Sciences. He has a Ph.D. in Biology and has worked on engineering transgenic mouse models for autoimmune diseases during his post-doctoral research at the Beth Israel Deaconess Medical Center in Boston, MA.
In his current role, he supports researchers with applications related to cell culture including advanced surfaces and extracellular matrices, genomics, drug discovery and bioprocesses.
Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities. Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.
Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.
Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
Q&A will follow at the end of the session.
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
Comparability exercises are commonly required at certain milestones during drug development as well as after product registration when changes are implemented into the manufacturing process. The goal is to evaluate if the product remains highly similar (not necessarily identical) before and after the change in terms of quality and stability and have no adverse impact on safety and efficacy predicted for the patients. This assessment requires product-specific knowledge gathered through drug development, taking a totality-of-evidence approach. The different levels of information are obtained from analytical studies for characterization of the molecule, animal studies for toxicity, pharmacokinetics and pharmacodynamics for pharmacological activities, and clinical studies for safety/tolerability, immunogenicity and efficacy. This Webinar discusses strategies and considerations for analytical characterization of protein structure and function which forms the foundation of the comparability demonstration.