Hi [[ session.user.profile.firstName ]]

Health IT

  • Employing Users as Your Quality Control
    Employing Users as Your Quality Control
    Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MO Recorded: Jan 17 2019 58 mins
    Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security
    Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Recorded: Jan 17 2019 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • The Top 3 Considerations for Modernizing Your Data Platform
    The Top 3 Considerations for Modernizing Your Data Platform
    Clark Bradley, Solutions Engineer at Zaloni Recorded: Jan 16 2019 50 mins
    How does your organization collaborate with data? Aligning data management tasks across any size organization can be a challenge. This can be attributed to a lack of transparent data access, lack of big data skills, or antiquated toolsets that do not enable shared metadata for clear lineage of the data. Regardless of the reason, the results are slow, rigid decision-making processes.

    While modernizing your data architecture for more agility can seem overwhelming, with an integrated platform that enhances collaboration, organizations can reap the benefits of quality data that is well understood. The data platform should provide users with the ability to fully understand all aspects of the data with a simple, unified user interface where the business and IT can define, transform and provision the data. All while providing right-sized governance for access, security and auditability.

    Join Clark Bradley, Solutions Engineer with Zaloni, as he tackles modernizing your data platform and explains how your organization can expand collaborative practices with the Zaloni Data Platform.

    By the end of the presentation, you’ll be able to answer these questions:
    - Why is a data catalog important?
    - What do I need to know about data quality?
    - How does self-service play a role in the data strategy?
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Tom Patterson, Chief Trust Officer, Unisys Recorded: Jan 16 2019 44 mins
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • Using APIs to Build your Omni-Channel Architecture
    Using APIs to Build your Omni-Channel Architecture
    John Withers, Product Manager Jimil Patel, Product Marketing Manager, and Manan Sangvi, Solution Consultant Recorded: Jan 15 2019 50 mins
    Well-designed APIs, created along with a holistic integration strategy with Anypoint Platform, create a seamless omnichannel experience that customers want and businesses need. To deliver a reliable and unified experience more quickly, companies must adopt a new approach that involves an omnichannel architecture.

    Across industries from healthcare to banking to retail, MuleSoft is powering omnichannel strategies that result in faster time to market, improved customer satisfaction, and increased revenue.

    Watch this webinar, including a demo, to learn how to:

    - Take an API-led approach to omnichannel that enables companies to deliver a unified experience 5x faster
    - Leverage Anypoint Exchange to enable consistency by design through the reuse of integration assets across channels, translating to a consistent experience for your customers
    - Prepare for the future (and future channels) with support for different deployment models with a single, unified platform
  • GDPR Compliance
    GDPR Compliance
    Lockpath Recorded: Jan 15 2019 2 mins
    GDPR compliance is a big challenge for organizations doing business with, or in the EU. See how the Keylight Platform is the solution you need for GDPR compliance.
  • Webroot 2019 Threat predictions
    Webroot 2019 Threat predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Jan 15 2019 46 mins
    The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.

    Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.

    Some of the topics that will be covered:
    - AI Disruption
    - US adoption of similar GDPR legislation
    - Cryptojacking will keep rising while ransomware will decline


    Register today!
  • Infoblox #1: Remediating Threats by Bridging Islands of Security
    Infoblox #1: Remediating Threats by Bridging Islands of Security
    Chintan Udeshi, Security Product Marketing, Infoblox; Brandon Dunlap, Moderator Recorded: Jan 10 2019 54 mins
    Most organizations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)2 on January 10, 2019 at 1:00PM Eastern for an examination of how Infoblox and Fortinet have joined together to assist organizations in improving their security operations and reducing time to containment.
  • How to Achieve a 360° View of your Data
    How to Achieve a 360° View of your Data
    Jatin Hansoty, Director of Solutions Architecture Recorded: Jan 9 2019 58 mins
    A majority of the data collected by organizations today is wasted. Whether through poor analytics, lack of resources, or because they have too much of it. So how can organizations turn this around and actually start utilizing their data for powerful results?

    More and more companies are taking their customer, product, patient, or other data and providing a 360-degree view using a governed and actionable data lake. By breaking down the silos associated with traditional data located in disjointed systems and databases, companies are finding new ways to improve loyalty programs, product development, marketing campaigns, and even find a new source of revenue from their data.

    Join Jatin Hansoty, Director of Solutions Architecture at Zaloni, as he dives into real-world use cases from several of the world’s top companies. Learn from their architecture and the results they achieved.

    Topics covered include:

    - Best practices
    - Common pitfalls to avoid
    - Real-world use cases
    - Future-proof architecture
  • Exploring Smartphone Ransomware
    Exploring Smartphone Ransomware
    Kevin McNamee, CISSP, Director, Threat Intelligence, Nokia Recorded: Jan 3 2019 48 mins
    If the new generation of smartphone ransomware is combined with worm-like spreading capability akin to something like Wannacry, the result could be catastrophic. We will look at several examples of smartphone ransomware with demonstrations showing how the phone is infected, how the device is locked, what data is encrypted, how the ransom is paid and what can be done about it. The presentation will conclude with a discussion on the evolution of smartphone ransomware and how the technology could be leveraged to launch a major attack against the mobile network services by disabling a significant number of handsets.
  • The 7 Step Guide to Third-Party Risk Management
    The 7 Step Guide to Third-Party Risk Management
    Lockpath Recorded: Dec 27 2018 1 min
    A brief overview of what our guide to Third-Party Risk Management
  • GRC Buyer's Guide
    GRC Buyer's Guide
    Lockpath Recorded: Dec 27 2018 1 min
    Brief ad highlighting the benefits of the guide.
  • 3Dスフェロイド培養のアプリケーションとミニチュアライズ
    3Dスフェロイド培養のアプリケーションとミニチュアライズ
    コーニングインターナショナル株式会社 ライフサイエンス事業部 江藤 哉子 Recorded: Dec 20 2018 54 mins
    弊社独自の超低接着表面・形状のプレートを用いた三次元がんスフェロイドや、免疫細胞の作用モデルなどのハイスループットスクリーニング、オルガノイド作製の実例を交えて概説いたします。

    今回は、3Dスフェロイドを使用したアプリケーションをご検討中のみなさまに向けて、基礎から実際のアプリケーションまでをお話しいたします。
  • Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Nicky Stewart Recorded: Dec 18 2018 13 mins
    After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?

    This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement

    What you'll learn
    - The main differences between TS2 & G-Cloud
    - The Pros & Cons of using TS2 vs G-Cloud
    - Top Tips for making a succesful bid through either framework

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Ask the Multi-Cloud Expert: Why Cloud needs a new data centre strategy
    Ask the Multi-Cloud Expert: Why Cloud needs a new data centre strategy
    Tim Lawrence Recorded: Dec 16 2018 14 mins
    Join our latest webinar with Tim Lawrence & Andy Skipper as our experts cover topics such as

    - What the major strategic priorities are for UK Organisations in 2018
    - What the first steps are towards Cloud Adoption
    - How UKCloud can help

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • 2019 Risk Trends and Predictions
    2019 Risk Trends and Predictions
    Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, Lockpath Recorded: Dec 13 2018 59 mins
    What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.

    As an attendee, you’ll learn:

    • The shift to a more integrated risk management
    • The growing emphasis on supply chain cybersecurity
    • The rise in data privacy and its impact on information security

    Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
  • The Future of Passwords... Perhaps
    The Future of Passwords... Perhaps
    Roger Grimes, Stephen Lawton Recorded: Dec 12 2018 33 mins
    Passwords have been with us for some 50 years now and still is used for a variety of mission-critical and highly classified projects and devices. That said, there is a case to be made that the password is obsolete and should simply be eliminated.

    This webcast looks at how we got here and where we’re headed with passwords – if anywhere at all.
  • 6-AM and BUP:  New Useful Assays in the Opiate Crisis
    6-AM and BUP: New Useful Assays in the Opiate Crisis
    Dr. Mary Mayo Recorded: Dec 12 2018 44 mins
    The opiate crisis has reached epidemic proportions, evidenced by more than 17,000 deaths a year and $504 billion in economic costs in the U.S. alone¹. Healthcare providers and laboratories need highly specific tests that accurately detect drugs of abuse in patient-care, employment, athletic and prescription drug monitoring settings.

    In this webinar, Dr. Mary Mayo discusses two highly sensitive assays—the Syva® EMIT® II Plus 6-Acetylmorphine (6-AM) and Buprenorphine (BUP)—that expand available options for drugs-of-abuse testing.

    After attending this webinar, you will be able to describe the:
    • Differences in opioid drugs
    • Magnitude of the opioid epidemic
    • Reasons to use specific drug tests related to opioids
    • Performance characteristics of the Syva EMIT II Plus 6-AM and BUP assays

    P.A.C.E. credit is available for your participation.*

    Presenter: Mary Mayo, Ph.D.

    Dr. Mary Mayo is a medical affairs manager with Beckman Coulter Diagnostics, with more than 25 years’ experience in the clinical laboratory. This includes twelve years as a laboratory director, nine years as director of clinical chemistry at a tertiary-care academic hospital and three years as the laboratory director of a commercial laboratory.

    References:

    ¹ CDC. “Opioid Overdoses Treated in Emergency Departments.” https://www.cdc.gov/vitalsigns/opioid-overdoses/. Accessed 6 Mar 2018.

    *Beckman Coulter Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E.® Program. These credits are recognized by the State of California. Most programs also provide State of Florida credits (with valid license number). At this time, we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
  • How to Easily Migrate Data Without Downtime
    How to Easily Migrate Data Without Downtime
    Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore Software Recorded: Dec 12 2018 60 mins
    Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?

    Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?

    Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.

    If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
    • How to integrate software-defined storage into your environment
    • How to migrate data between totally different types of storage
    • How to change towards hyperconverged during regular business operations
  • Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    David Woolger & Luke Jeffries Recorded: Dec 12 2018 10 mins
    So after building the business case for Data Centre Modernisation you've discovered moving away from traditional, inefficient IT can help you reduce costs & reinvest in the services that matter. But will adopting cloud help you improve your security?

    Join our webinar hosted by Director of Technology David Woolger & Principal Cloud Support Engineer Luke Jeffries as we guide you through how moving from away from Legacy IT impacts your cyber security

    You'll learn
    - What the biggest threats are to your organisation
    - What to consider when modernising your Data Centre
    - How UKCloud can help

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • The Rise of Targeted Ransomware
    The Rise of Targeted Ransomware
    Michelle Drolet, CEO, Towerwall Inc. Recorded: Dec 11 2018 32 mins
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • End of Year - The Perfect Storm for Phishing Attacks
    End of Year - The Perfect Storm for Phishing Attacks
    Erich Kron, Michael Osterman, David Littman Recorded: Dec 10 2018 55 mins
    Phishing, spearphishing and Business Email Compromise (BEC) attacks are forecasted to grow exponentially in 2019. But…the end of 2018 poses the perfect storm trifecta of threats: the holidays, start of tax season and a very busy time for end of year transactions. We are bringing together two of the industry’s top thought leaders in the email security space, Michael Osterman, Principal Analyst of Osterman Research and Erich Kron, Security Awareness Advocate of KnowBe4 to update us on what to look out for in 2018 and how to head into 2019 unscathed. In this webcast we cover:

    - Things to look out for specifically this time of year w/the holidays, tax season, W2 fraud, end of year, etc.
    - Predictions for 2019 phishing/email malware attacks
    - Really strange 1-off experiences that we’ve seen that you should be aware of
    - How to prepare yourself and build your human firewall and reinforce the weakest link of most organizations

    Watch for an information packed session with research and analysis you can’t get anywhere else on this topic!
  • RSA #3 - Transforming Secure Access to be Intelligent
    RSA #3 - Transforming Secure Access to be Intelligent
    Ayelet Biger-Levin, CISSP, Senior Consultant, Product Marketing, RSA Recorded: Dec 7 2018 54 mins
    When it comes to making access decisions, it’s all about being smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Authentication provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a simple process to gain visibility into the right listening posts, derive actionable insights and then drive action to protect the organization’s most valuable assets from rogue access and drive Identity Assurance.
  • Halt! Who Goes There? Improving the Intersection of Identity & Security
    Halt! Who Goes There? Improving the Intersection of Identity & Security
    John MacInnis, Prd Mktg Mgr, IAMS, HID Global; Tariq Shaikh, Sr. Security Adv., IAM, Aetna; Erik Von Geldern, CISO, FXCM Recorded: Dec 6 2018 61 mins
    With the multiple points of access to an organization, both internal and external, as well as physical and electronic, identity and access control is a critical security concern. Practitioners need to constantly monitor and assess the organization’s security posture, access provisioning and even the on boarding of employees, partners and customers. Join HID Global and (ISC)2 at 1:00pm Eastern Thursday, December 6, 2018 for a discussion on why identity has become the center of security and how to better manage identity, access management and authentication in your enterprise.
  • IDC FutureScape: Worldwide Future of Work 2019 Predictions
    IDC FutureScape: Worldwide Future of Work 2019 Predictions
    Roberta Bigliani, Vice President, Avinav Trigunait, Research Director, Holly Muscolino, Vice President Recorded: Dec 6 2018 59 mins
    In this IDC FutureScape presentation, analysts discuss key predictions that will impact CIOs and IT professionals in the future of work over the next one to five years.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • Building the Intelligent Enterprise: Digital Transformation through AI
    Building the Intelligent Enterprise: Digital Transformation through AI
    Neil Ward-Dutton and Andrea Minonne Jan 22 2019 2:00 pm UTC 45 mins
    Digital transformation is a key strategy for every company of size across Europe, as organizations look to remain relevant and competitive in the age of digital business. IDC finds that AI is a key enabler of that transformation, allowing businesses to reimagine processes, services and value propositions to customers. Yet while the focus on customers is as strong as ever but as experience matures, European companies are increasingly looking to AI to drive internal process improvement as well as improve customer experience.

    In this IDC Web Conference, Neil Ward-Dutton, VP of AI and DX European Research Practices, and Andrea Minonne, Research Analyst for IDC's Customer Insight & Analysis team, will discuss the transformative power of AI for European companies, drawing on IDC's qualitative and quantitative research and examples to discuss what are the top drivers and barriers, which are the key use cases, technology and industry adoptions trends across Europe.
  • EU e-Signature Laws – eIDAS and What You Need to Know
    EU e-Signature Laws – eIDAS and What You Need to Know
    John Jolliffe, Strategic Engagement, Adobe Document Cloud. Jan 23 2019 2:00 pm UTC 45 mins
    When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?

    Join our live webinar, to learn:

    • Why e-signatures are essential to your company's success now and in the future.
    • Which three signature types are legal under eIDAS.
    • How to select the right approach for your business.
    • Next-gen e-Signatures and The Cloud Signature Consortium.
  • Metrics to meaning: demonstrating the value of medical communications
    Metrics to meaning: demonstrating the value of medical communications
    Scott McGregor, Allergan, Lynda Chang, Complete HealthVizion, David Pearce, Complete HealthVizion, Dominic Tyer, pharmaphorum Jan 23 2019 3:00 pm UTC 75 mins
    Medical affairs and publications teams are under increasing pressure to demonstrate effectively the success of the medical communications activities they undertake.

    Naturally, there are a huge number of metrics that could be used to measure and demonstrate medical communications value. The challenge is to identify, and track, those metrics that really matter, and ensure this information is interpreted effectively.

    This pharmaphorum webinar, which will be held in partnership with Complete HealthVizion, will look at how to measure medical communications activities, how to continue with what is successful and how to change what isn’t working.

    This means identifying what can be measured, both in terms of reach and engagement as well as behavioural impact, deciding what ‘great’ looks like and how best to define success.

    The expert panel will also look at how behavioural science can provide a framework to develop smarter communications and, ultimately, drive better patient outcomes.

    This Metrics to Meaning webinar will take place on Wednesday, 23rd January, at 15:00 pm GMT (10:00 EST) and will teach you how to measure the effectiveness of different types of medical communications programmes.

    Interacting with the panel will also allow you to learn about a range of practical approaches to implementing metrics, including:

    • Innovative ways to measure medical communications value and success
    • How to help medical affairs and publications teams demonstrate greater value
    • How to optimise tactical outputs year on year
    • The importance of demonstrating and measuring behavioural change

    In doing so they will also discuss the role of behaviour and the implications of this for measuring success.
  • Stay competitive with next generation OEM solutions
    Stay competitive with next generation OEM solutions
    Dell EMC OEM CTO, Alan Brumley & Dr. Mahesh Saptharishi, CTO of Avigilon - a Motorola Solutions Company Jan 24 2019 4:00 pm UTC 60 mins
    As industries evolve through digital transformation, solution builders and their customers require a new generation of solutions to support their applications.

    Dell EMC CTO Alan Brumley and special guest Dr. Mahesh Saptharishi, CTO of Avigilon – a Motorola Solutions Company, will share their perspectives.

    Topics of discussion will include:

    - What's behind today's evolving landscape
    - The technologies that will help you maintain your competitive edge while creating better customer experiences
    - And more!
  • Accelerate business automation with MuleSoft
    Accelerate business automation with MuleSoft
    John Withers, Product Marketing Manager, MuleSoft and Jimil Patel, Product Marketing Manager, MuleSoft Jan 24 2019 5:30 pm UTC 63 mins
    Business processes are complicated and often manual due to an underlying technology landscape that is not connected, constantly changing, and increasingly complex. With MuleSoft’s Anypoint Platform™, unlock data from your systems, orchestrate business processes that automate and optimize workflows, and package them as reusable services to transform your organization into a digital platform.

    Across industries from healthcare to banking to retail, MuleSoft is powering business automation, and helping companies deliver business processes as reusable services, resulting in faster innovation, improved customer satisfaction, and increased revenue.

    Watch this webinar, which includes a demo of the Anypoint Platform, to learn how to:

    - Unlock systems 64% faster: Easily connect to core systems of record and unlock data with out-of-the-box connectors and graphical data mapping
    - Accelerate process automation: Orchestrate processes using a drag-and-drop development environment supported by a library of pre-built implementation templates
    - Reuse business capabilities: Package processes into reusable services and publish them for internal and external use
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
    10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
    Roger Grimes, Data-Driven Defense Evangelist Jan 24 2019 6:00 pm UTC 60 mins
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Cancer, genomics and personalised medicine: Modelling the future of oncology
    Cancer, genomics and personalised medicine: Modelling the future of oncology
    Danyi Wen, Shanghai LIDE Biotech, Stefan Jellbauer, Mitra Biotech, Lakshmi Santhosh Maithel, Repositi Jan 29 2019 4:00 pm UTC 75 mins
    The prevalence of cancer is currently predicted to be higher than ever. Current statistics show 1 in 2 people in the UK and 1 in 2 men/1 in 3 women in the US will experience it at some stage in their lives. And yet the picture for patients is an improving one.

    The move towards immunotherapies heralds much promise and this is potentially just the beginning. As cancer is understood increasingly not by type, or even tumour type but specific mutation the era of personalised oncological therapies is visible.
    To delve further into this pharmaphorum is pleased to present an exclusive online discussion.

    Bringing together experts at the cutting edge of this field it aims to interrogate where we are in terms of this shift towards personalised oncology, what this means in terms of the development pathway and looks at the approaches which could (and will) fully evolve the way that cancer treatments are developed in terms of efficacy, approach and outcome.

    this free to attend event will cover a number of topics critical to the future of oncology including:
    •The changing face of cancer: how do we define it now?
    •Personalised medicine in practice – where are we now in cancer?
    •What are the implications from these changes for clinical trials?
    •How the shift towards cancer as a phenotype/genotype is being applied in clinical trials and how they are run
    •What are co-clinical trials and why could they hold the key to answering unmet need in cancer treatment and beyond into broader drug development?
    •Modelling for the future of cancer – can this be done for personalised therapies?
  • Psychographics of the CISO – New Infosecurity Survey Results from 451 Research
    Psychographics of the CISO – New Infosecurity Survey Results from 451 Research
    Daniel Kennedy, Research Director, Information Security, 451 Research; Brandon Dunlap (moderator) Jan 29 2019 6:00 pm UTC 60 mins
    Security budgets continue to tick upward, but underneath the hood, increasingly hybrid architectures in enterprise IT are driving shifts in where that money is applied. GDPR has driven compliance to the forefront of security project decision making, while other pain points including user behavior and lack of qualified personnel drive specific security product deployments. Security resistance to cloud continues to decrease, while the endpoint security space remains both relevant and increasingly crowded. Join Daniel Kennedy, Research Director for 451 Research on January 29, 2019 at 1:00PM Eastern as he walks through highlights of 451's 2018 surveys and interviews of information security professionals.
  • Architectural Nexus Achieves Fast Application Performance On-Time & On-Budget!
    Architectural Nexus Achieves Fast Application Performance On-Time & On-Budget!
    Steve Hunsaker, Dir. Systems Engineering- DataCore, Kent Hansen, CIO- ArchNexus, Johnathan Kendrick Tech. Account Exec. - USI Jan 29 2019 7:00 pm UTC 60 mins
    Join us to hear the story of Architectural Nexus, Inc. and Universal Systems Incorporated (USI). ArchNexus provides customized architectural, landscape and interior design services. As a company with over 100 power user engineers and architects, ArchNexus needed a storage solution to meet the company’s high demand for performance. With the help of USI and DataCore Software, ArchNexus found a smart and affordable storage solution.

    In this webcast you will discover:
    - A business problem & how it was solved
    - The business impact
    - The on-time and on-budget solution
    - The ROI achieved
    - How the customer would change the process or outcome

    Are you searching for a smart storage solution that is right for your business? Please join us!
  • Using APIs to build a single view of customer
    Using APIs to build a single view of customer
    John Withers, Product Marketing Manager, MuleSoft and Jimil Patel, Product Marketing Manager, MuleSoft Jan 31 2019 5:00 pm UTC 60 mins
    Connecting customer data with users who need it can be a daunting challenge involving disparate systems, multiple data formats, and frequently changing data sources. MuleSoft's Anypoint Platform™ enables multiple teams to unify around a single, fully integrated 360-degree view to understand and anticipate customer needs.

    Across industries from healthcare to banking to retail, MuleSoft is powering single view of customer transformation that result in faster time to market, improved customer satisfaction, and increased revenue.

    Watch this webinar, including a demo, to learn how to:

    - Integrate data 60% faster by rapidly connecting more systems and mapping data elements across sources
    - Change data sources with ease: Decouple data extraction from processing and delivery
    - Provide a single source of truth: Ensure that everyone has access to and can act on accurate customer information
    - Prepare for the future (and future data sources) with support for different deployment models with a single, unified platform
  • Dangerous Documents – Attachments That Compromise Organizations
    Dangerous Documents – Attachments That Compromise Organizations
    Tarik Saleh, Snr Sec Engnr, DomainTools; John Carnes, Info Sec Arch; Anthem; Aamir Lakhani, Sen Sec Strat & Rsrchr; Dr. Chaos Jan 31 2019 6:00 pm UTC 60 mins
    Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credentials, financial, healthcare information, and other highly sensitive data at risk. How can an organization defend against the onslaught of such attacks that continue to plague them unabated? Join DomainTools and (ISC)2 on January 31, 2019 at 1:00 PM Eastern for a roundtable discussion on mitigating the prevalence and distribution of malicious documents and their payload.
  • Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Aria Naderi; Zbigniew Skurczynski Feb 6 2019 9:00 am UTC 60 mins
    IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
    Sammeln und verwalten Sie alle relevanten Informationen zentral.
    Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
    Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
    Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.

    In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
  • 2019 Life Science Predictions: Decoding 5 Incredible Growth Opportunities
    2019 Life Science Predictions: Decoding 5 Incredible Growth Opportunities
    Nitin Naik, Unmesh Lal, Khushbu Jain, Fred Mao, Barbara Gilmore, Frost & Sullivan Feb 6 2019 4:00 pm UTC 75 mins
    The Life Science industry is in a state of flux. While recent years have seen the advent of multiple novel technologies—such as IVF, CRISPR-Cas9, virtual clinical trials, and liquid biopsy—the industry today stands at a crossroads with challenges in scaling up and commercializing such technologies. The industry has now come to terms with new, path-breaking life science technologies that are helping make precision healthcare a reality. Chinese investments into the US biopharma industry jumped to $4.5 billion in 2018. An exclusive fireside chat with our US and China analysts will uncover trends in cross-border investments and growth opportunities in these two markets.

    Key Takeaways:

    • Establish the leading factors that will influence the size and direction of the global life sciences market in 2019.
    • Build clarity on technology developments in the global life sciences market in 2018 that will have an impact during 2019.
    • Identify the business models used to commercialize and distribute novel life science solutions.
    • Discover the key growth opportunities and strategic imperatives for companies in 2019.
  • Understanding Application Risk Management
    Understanding Application Risk Management
    Syed Abdur - Director of Products from Brinqa Feb 6 2019 7:00 pm UTC 32 mins
    In this session we will discuss how modern InfoSec organizations tackle the challenge of securing and protecting their software infrastructure. By taking a knowledge-driven and risk-centric approach, these organizations strategically leverage existing investment in security tools (SAST, DAST, Open Source, Penetration Testing, CMDB, Asset Management, Threat Intel, ITSM) to design application security programs that identify, prioritize and remediate vulnerabilities that pose the biggest threats to the organization — in a highly automated and efficient manner.

    We’d love to answer all of your questions by email, ask them during the session in the chat window, you can email them to me at troy.vera@brinqa.com to be answered by email, or tweet @brinqa with the hashtag of #BrinqaWebinars and we will cover everyone’s questions.
  • The challenges and opportunities for data centre modernisation in public sector.
    The challenges and opportunities for data centre modernisation in public sector.
    Leighton James, CTO at UKCloud, Jan Mietle, Partner Technology Strategist at Microsoft Feb 7 2019 11:00 am UTC 60 mins
    This webinar will explore the opinion of public sector organisations facing the necessity to modernise their data centres as reported in the 2018 Ingenium Survey.

    Over the course of the webinar our CTO Leighton James will take a deep dive into the biggest concerns of public sector organisations surrounding Data Centre Modernisation, the implications on how cloud changes IT operations and the relative security of cloud services.

    Joining Leighton will be special guest Jan Mietle, Partner Technology Strategist, Microsoft

    Jan joined Microsoft in 2014 where he works with the top service providers in the UK, using technology enablement to help shape their business models and drive cloud-based services to their customers. He has 21 years IT industry experience with an extensive background in designing and delivering value-based services.

    Agenda:
    •Cloud adoption trends in public sector
    •The implications & perception of Data Centre Modernisation on operational costs
    •How cloud affects the IT culture & service to end users
    •Data loss & security when moving away from in-house IT
    •Q&A Session:

    This Q&A session will conclude our webinar.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • State of the Market: Global IT Spending Review and Outlook
    State of the Market: Global IT Spending Review and Outlook
    Stephen Minton Feb 13 2019 4:00 pm UTC 60 mins
    In this IDC web conference, Stephen Minton will review the latest ICT spending data and leading economic indicators for ICT budget trends and new 3rd Platform technologies, alongside updated market sizing and forecasts from the IDC Worldwide Black Book, answering questions such as:

    • How did the technology market perform in 2018, and how have forecasts for 2019-2022 changed as a result?
    • What impact will the US-China trade war and tariffs have on IT spending over the next 12 months, and and which other economic wild cards are starting to impact IT budgets?
    • Which new technologies are experiencing the fastest growth in emerging markets, and which geographies are set to emerge as global leaders beyond 2020?
    • How quickly are tech budgets moving from traditional IT deployments to the 3rd Platform of cloud, mobile and new technologies such as IoT and robotics?
    • What are the key vertical industry trends which are driving IT spending patterns and vendor revenues?
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer Feb 14 2019 5:00 pm UTC 60 mins
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Speakers:
    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • Detecting & Preventing Threat Evasions Techniques – 2019 And Beyond
    Detecting & Preventing Threat Evasions Techniques – 2019 And Beyond
    Shimon Oren, Deep Instinct; Jared Peck, Finan.Svcs; Rob Armstrong; B. Dunlap (Moderator) Feb 14 2019 6:00 pm UTC 60 mins
    Cyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and develop new capabilities much faster than ever before. This translates not only to more attacks, but also to a bigger share of attacks which are highly evasive and stealthy, and inevitably more challenging to prevent or detect over-time. How does an organization stay up-to-speed with the varied attacks that are aimed at them? Join Deep Instinct and (ISC)2 on February 14, 2019 at 1:00PM Eastern when we’ll review several common and emerging evasion techniques in today’s threat-landscape and discuss the best avenues to counter them in terms of technology and cost-effectiveness.
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Feb 21 2019 5:00 pm UTC 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Mar 21 2019 4:00 pm UTC 60 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Compliance and Policy Management for 2020 and Beyond
    Compliance and Policy Management for 2020 and Beyond
    Sam Abadir, Lockpath Apr 18 2019 4:00 pm UTC 60 mins
    Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:

    -How your organization can gain efficiency from compliance and policy management

    -Strategies for collaborating across departments

    -How streamlining processes can boost productivity

    -Planning ahead for sustained growth

    Discover the future for compliance and policy management by attending this educational webinar. Register now!
  • Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Charlie Whelan, Vice President of Consulting, Transformational Health, Americas, Frost & Sullivan May 14 2019 3:00 pm UTC 75 mins
    For most cities and states, the healthcare technology and biosciences sector is one of the most attractive industries of the future that can grow their communities. However, that attention attracts significant competition among players seeking to expand in a field that is highly complex. How should your community address this industry, and what is the best path to nurturing start-ups, retaining existing employers, attracting new companies and encouraging workforce development?

    Key Takeaways:

    • The healthcare technology and biosciences market is large and complex. Learn how the industry is structured and which segments might align best with your community.
    • Cities and states across the country are all competing to grow their own biosciences economies. Find out what types of programs and strategies are the most effective.
    • Come away with a simple model for assessing your own community’s strength relative to the healthcare technology and biosciences market.