Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Service-enabling legacy assets and effectively managing and orchestrating services is the first step toward realizing the promise of the New Enterprise. In this webinar, Steven Camina, Sr. Product Manager at MuleSoft, will present strategies and demo solutions for getting the most out of your legacy assets and outline the steps you can take to build a solid foundation for APIs down the road.
You will learn how to:
•Identify legacy assets within your organization
•Move data in and out of legacy systems without downtime [DEMO]
•Wrap legacy applications with APIs to capitalize on existing investments [DEMO]
•Build future-proof integrations that deliver continued value [DEMO]
While hyperconvergence aims to make the datacenter more efficient, hyperconvergence can also be confusing at times, due to the numerous forms of HCI, the different approaches, and the varying levels of efficiency that can be gained.
In this exclusive educational event, we’ll cover what hyperconvergence really is, how it works from install to administration, and how it can help your company. We’ll take questions from you, our audience, on this registration form and answer those questions during the live event.
Join hyperconvergence expert Steve Hunt and moderator and vExpert, David Davis to get all your HCI questions answered on this live event!
Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.
* The role of business continuity management on operations
* How to identify risks that could potentially lead to disruptions
* Strategies for modeling the business impact of various disasters
* Importance of mapping plans to risk, controls, processes, and vendors
Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
After your organization has identified an event, how do they identify and record the actual playbook response? In this session, you will see an incident response program intended to reflect the defined example playbooks for common information security based incidents, as well as related or dependent processes that support other GRC processes.
Recently, participants from TU Automotive and Aeris sat down for an in-depth webinar on the challenges and solutions encountered by the evolving automotive technology segment as it converges with consumer electronics, mobile, and IoT to re-define connectivity, mobility, and autonomous use cases.
Evan Whitelock, Product Marketing Manager, Aeris, shares how your peers are dealing with – and tackling – complexity across the fleet industry. Topics addressed will include:
• How do businesses increase usage without raising the cost of connectivity?
• How do you manage multiple deployments on a single platform and still keep costs in check?
• And, if a single, multi-tier platform can standardize processes involving multiple distribution channels and levels, how will that positively impact performance, control, and costs?
Your organization has decided to empower its growth through an Internet of Things (IoT) solution. What defines success in launching your first solution? You need a reliable partner who will allow to easily pilot and scale your connected devices, manage your resources anywhere – all from one platform.
This webinar explains the three essential factors that have to be present on the platform of your choice and that will significantly influence your success:
• Global Coverage and Connectivity
• Cost Effectiveness and Manageability
• Comprehensive Support and Troubleshooting
Join us for an Aeris webinar where we introduce and address three common challenges for expanding a company’s capacity to deploy, maintain, and manage IoT devices and services throughout the entire lifecycle.
From subject matter experts, we learn how to:
• Reduce operational costs associated with increased global IoT deployments;
• Manage cellular costs associated with increased usage while buttressing the reliability of their solutions; and
• Use innovative IoT platforms to standardize processes involving distributed supply chains.
Whether your company is on the cusp of expanding IoT solutions globally, engaged in IoT technology transitions, or seeking to reduce the inefficiencies associated with the absence of mature IoT management processes, this webinar will provide clarity and a framework for identifying emergent solutions.
Roambee faced multiple challenges on its cold chain IoT deployment. This webinar describes how they overcame global scaling; visibility across eight geographical regions; updated its technology; and used a single provider for all connectivity concerns.
The Roambee Cold Chain webinar will outline the ways your company can benefit from deploying an IoT-based cellular management infrastructure, including:
•Dedicated End-to-End Connections
•Old and New Technologies
•Reduce Fuel Consumption and Fleet Operating Costs
Visit and listen to our webinar to see how all that was accomplished.
Lack of control over privileged access to systems and data presents a significant risk to almost every organization. What is required to protect privileged accounts? Are you in control? Do you have an effective Privileged Access Management (PAM) program? This session discussed how to assess the current state of your PAM program, develop a road map to meet your desired target state, and select the right PAM solution to help you gain better control over privileged access.
If you were to pose this question to your storage vendor or VMware support today, you would be likely to receive the answer: “No. vSphere does not support this.”
Nevertheless, with the VMware certified, universal vSphere APIs for Storage Awareness (VASA) provider from DataCore you can easily achieve that with full VMware support and without VVol certified hardware today. Use of local discs alone or in combination with other storage arrays as part of the Virtual Volumes datastore would even be sufficient.
Join our brief webinar and Q&A to learn how to make this happen.
Discover in our expanded live demo:
O How to setup such a solution in real life
O How to implement auto-tiering across different arrays
Join us for an in-depth conversation on how the blend of your IP, our Dell EMC hardware powered by Intel®, and VMware software means your solutions have better scalability, availability, security, efficiency and simplified lifecycle management.
Dell EMC OEM + VMWare combination equates to key advantages for you and your customers:
•Turn-key combined solution (Dell EMC HW + VMware SW + your IP.)
•Streamlined operations with single BOM – Dell HW & VMware Software combined into single BOM, including single contract for all VMware products
•Global license/redistribution rights - Single HW+SW stack with VMware contract approved for global distribution
•A better support experience for your customer: Complete solution supported through Dell OEM ProSupport globally
•Lifecycle Extension - More options to extend OEM appliance lifecycle with OS support flexibility
Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution.
The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:
- 12 ways hackers get around two-factor authentication
- How to defend your two-factor authentication solution
- The role humans play in a blended-defense strategy
Digital therapeutics presents a significant opportunity for traditional pharmaceutical therapeutics and information technology (IT) capabilities to influence a new approach to increase positive patient outcomes while reducing the overall cost of healthcare.
· Gain expert insight into the accurate definition of digital therapeutics and market participants.
· Learn about new solutions from mHealth companies that will combine apps, patient education, professional intervention and peer support to increase patient engagement and medication adherence by augmenting or replacing traditional drug therapeutics.
· Hear opportunities to utilize digital therapeutics to improve medical workflow and patient communications.
· Learn about some of the critical milestones related to digital therapeutics.
The role of third party vendors in the operations of organizations is expanding and the industry stresses that data protections and privacy is paramount. This session discussed current threats and how your organization and third-party vendors should address those risks while meeting or surpassing compliance and regulatory expectations, technological challenges, due diligence prior to your business relationships with vendors, and understanding the potential risks services providers present as well as the steps to minimize your data risk.
In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.
Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
Wael Elrifai shares his experience working in the IoT and AI space; covering complexities, pitfalls, and opportunities to explain why innovation isn’t just good for business—it’s a societal imperative.
(ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.
AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.
Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:
- What the shared responsibility model means for the security of your cloud assets
- Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
- How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
- Benefits of an all-in-one security solution for threat detection, incident response and compliance management
Group Product Marketing Manager
Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.
Sr. Technical Manager, Sales Enablement for North America
Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
Human error. Unintentional security incident. It’s going to happen at every organization. Sooner or later, someone will click on a rogue link or open an attachment they shouldn’t, exposing your organization to malware, phishing and ransomware. Old-school training, testing and policies can only go so far. Actions need to replace rhetoric. Join KnowBe4 and (ISC)2 on July 19, 2018 at 1:00PM Eastern for a discussion on how to build a security-centric culture than can benefit any size organization. We’ll examine how to establish a solid foundation, making sure everyone is on the same page and leveraging leadership to help with accountability.
(ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”.
But it doesn’t have to be that way!
Join Roger A. Grimes, a 30-year computer security consultant and author of 10 books, for this on-demand webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way. Roger will teach you what most organizations are doing wrong, why, and how to fix it. You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses.
Roger will teach you:
- What most companies are doing wrong, why, and how to fix it
- An action plan to improve the effectiveness of your computer security defenses
- How to create your “human firewall”
Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).
• Challenges and pitfalls with ISO 27001 certification
• Tips on establishing and maturing an ISMS
• Strategies for preparing and passing ISO audits
• Technology's role in earning and maintaining certification
Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.
With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.
Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:
- Why Managed Security
- Types of Managed Security Services
- Benefits of Outsourcing Security
- How to Select the right MSSP
VP of Global Channels
Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
Roger Thornton, Chief Technology Officer of AlienVault, discusses why it is so important to start with cyber security basics and master that before adding all the latest shiny objects available in the InfoSec industry.
- Detection and response of a breach is key to effectively mitigate risk for organizations of all sizes.
- Democratizing data sharing through Open Threat Exchange to find the bad actors more quickly.
- There are different strategic imperatives based on company size, industry and skilled resources.
- The AlienVault approach: unified, simplified, democratized.
To learn more about AlienVault, go to http://ow.ly/LMKB30kVijd. To join the AlienVault Open Threat Exchange, go to http://ow.ly/MuLJ30kVinb.
Chief Technical Officer, AlienVault
Roger Thornton is the Chief Technical Officer for AlienVault. Roger’s career has been dedicated to the development of technology and new business ventures based on technical innovation. Over 25 years in the Silicon Valley and abroad, he has driven the formation and growth of dozens of new companies and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investor/advisor.
General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security compliance.
As a webinar attendee, you'll learn GCI's secret to:
* Finding and training IT and security professionals
* Developing new or streamlining existing processes
* Scaling Keylight to address security compliance requirements.
Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security compliance program. Register for this educational webinar today.
They say “Packets don’t lie”. Instead of waiting to respond to incidents and anomalies, SecOps teams are using the network to enable proactive measures such as threat hunting, auditing encryption and other suspicious and out-of-policy behaviors existing in the dark alleys of the traffic corridor. Real time network traffic analytics (NTA) tools can help an organization shift from defensive to offensive and cut investigation time, enabling analysts to quickly correlate activities and test hypotheses. Join ExtraHop and (ISC)2 on August 2, 2018 at 1:00PM Eastern as we discuss proactive measures that can work for an organization, what activities to look for and how machine learning can help speed up these efforts.
Medical imaging has become a leader for the application of artificial intelligence technologies in the healthcare space, especially recently with deep learning techniques. This is evident from the fact that over 90 companies have set out to develop and commercialize AI-based solutions for the medical imaging industry. The number continues to grow as new start-ups emerge, as incumbents develop native AI solutions, and as tech companies move into the field, creating a highly dynamic ecosystem. With various countries edging past the innovator adoption phase and into the early adopter one, the time is now for stakeholders to refine and test their value proposition, partnership approach, and go-to-market strategies.
• How far we have reached over the past five years and the current lay of the land
• Where we are headed over the next five years and the direction of industry progress
• Deep-dive into the opportunity for automation, acceleration and augmentation of medical image analysis
• Anticipate the advent of intelligent medical imaging machines with embedded AI
Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
- Current threats and how they are evolving
- Comprehensive threat protection for the cloud
- Unified security for detecting threats and responding to incidents
The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was first simply to secure major SaaS platforms like Office 365, the new reality is a “cloud and mobile-first world” where employees often use new applications that aren’t approved and put corporate data at risk. Join Bitglass and (ISC)2 on August 9, 2018 at 1PM Eastern for the final part of this Security Briefings series where we’ll discuss how leading organizations are evolving their security to solve these challenges, what organizations are prioritizing when evaluating a solution and how zero-day technologies built for a cloud-first world are able to identify, categorize, and secure unknown apps.
Audits provide a vital checks and balances function in an organization. But what if audit's role as the third line of defense was more efficient and strategic? Doing so would enhance the role of the internal auditor. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter audits, including:
• Critical capabilities required for the audit process
• Importance of customizing messaging to stakeholder audiences
• The pros and cons of current audit management strategies
• Strategic, effective audits that can scale with future growth
More strategic and effective audits won't come from current processes. Discover the road to smarter audits by attending this educational webinar. Register now!
Security automation technologies can help drive improvements in managing security policies, including their implementation in firewalls and other network devices. However, whether you’re struggling with continuous compliance, auditing and reporting or managing firewall changes, deciding what to automate can be challenging. Join Skybox Security and (ISC)2 on August 16, 2018 at 1:00PM Eastern for a discussion where we’ll examine which automated processes in security policy management deliver the biggest rewards while introducing the least risk to your organization. Areas to be examined include why automation, visibility and context should be the indivisible, foundational components of any security policy management solution, which processes in security policy management are ripe for automation and where human intervention is still valuable. We’ll also explore how to educate security stakeholders in your organization on what’s needed to make automation initiatives a success.
SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.
AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
- Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
- Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
- Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
- The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is widely recognized as an effective roadmap for improving threat detection and compliance. However, many smaller IT security teams with limited resources have trouble implementing and maintaining the recommended security controls and processes. That's where AlienVault can help.
In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault approached implementation of NIST CSF and accelerated the process using their own Unified Security Management (USM) platform.
Join this webcast for:
- An overview of security controls recommended by NIST CSF
- Best practices for approaching adoption of NIST CSF
- How a unified security toolset can greatly simplify this process
- A demo of the AlienVault Unified Security Management (USM) platform