Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.

Webinars and videos

  • SharePoint 2013 features a new app model that allows you create easy-to-use, lightweight web applications that integrate popular web standards and technologies to extend the capabilities of a SharePoint website. Join our live webcast for an overview of Microsoft’s new SharePoint app model and learn:

    • How to configure app development for SharePoint on-premises
    • How developers can kick-start app development using SharePoint Online
    • What the differences are between provider-hosted and autohosted apps for SharePoint
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • Join this unique roundtable chat with three InfoSec Professionals who have recently climbed the BYOD mountain and come back down to share their stories. We’ll discuss the industry and regulatory differences, managing user expectations of privacy, legal implications and technical pitfalls in this 60 minute Security Leadership Series webinar, brought to you on April 10, 2014 at 1PM Eastern in partnership with Capella University.
  • Virtual Desktop Infrastructure (VDI) is now a mature technology that is being adopted by organizations with increasing popularity. However, the user community who needs high-end graphics capabilities in their work (such as 3D modelling and simulations) were somewhat skeptical about the capabilities and performance of VDI with applications using 3D graphics, compared to the performance they can expect from a physical PC or workstation with a dedicated GPU. Recent advances in VDI help make this performance gap narrower by providing the capabilities for either a pool of virtual desktops (shared GPU) or, to a specific virtual desktop (GPU pass through), depending on the user requirements.

    Join Teradici for a deep dive on Graphics Processing Unit (GPU) deployment options for VMware Horizon View and walk away with the GPU knowledge to increase productivity and accelerate your application performance in your virtual environment. In this webinar, we will discuss GPU technology related to Virtual Shared Graphics Acceleration (vSGA),Virtual Dedicated Graphics Acceleration (vDGA) and Teradici PCoIP Hardware Accelerator deployment options available today. We will also explore how using PCoIP Hardware Accelerator in combination with a GPU allows you to expand and enhance your VDI deployment to provide a rich and interactive graphical experience across a broad set of use cases and ensure application performance.

    Key Takeaways
    • Understand the graphics acceleration options for VMware Horizon View
    • Learn how PCoIP Hardware Accelerator complements GPU implementations to improve 3D application performance
  • SLC transporter-mediated drug–drug interactions (DDI) can significantly impact the pharmacokinetics and safety profiles of drugs. The regulatory agencies (FDA/EMA) recent guidance documents recommend testing six SLC transporters for potential DDI: OATP1B1, OATP1B3, OAT1, OAT3, OCT1 and OCT2. The 2013 drug transporter white paper published by the International Transporter Consortium (ITC) identified additional drug transporters relevant to drug development, including the Multidrug and Toxin Extrusion SLC transporters: MATE1 and MATE2-K. The webinar will introduce a novel cell-based SLC transporter model system - the recently launched “Corning™ TransportoCells™” - for studying regulatory agency recommended SLC transporters. The new system provides a convenient “thaw and go”, high performing mammalian cell model which supports regulatory agency recommendations for evaluating transporter mediated drug-drug interactions in vitro. In this webinar, we will provide an overview of the product validation and applications for the TransportoCells™ transporter model system. Validation data will also be presented for the newly available MATE1 and MATE2-K Corning™ TransportoCells™.
  • Open to all staff in the South West and South Central regions

    This FREE webinar will cover the recently announced changes to the VAT rules within the NHS including the shift to general government department guidance and the amendments to specific COS codes.

    Sign up to listen in on what promises to be a very informative session!
  • With Mule Studio, a single graphical design environment for the Anypoint platform, any developer can build hybrid integrations. In this webinar, Steven Camina, Sr. Product Manager, will build a complete integration scenario and deploy it both to a local machine on-premises and to the MuleSoft’s iPaaS solution, CloudHub. Once deployed, he’ll go through the runtime management and monitoring capabilities available on the Anypoint Platform.

    In this all-demo, no-slides webinar, you’ll learn how to:
    - Automatically generate data mappings to Salesforce with Anypoint DataSense
    - Track and debug message flows with Visual Flow Debugger
    - Leverage common testing tools like JUnit, Jenkins, and Maven
    - Deploy an application on-premises or to the cloud with one click
    - Manage clusters servers, flows, and endpoints with Mule Enterprise Management
  • By profiling criminal activity, the Verizon Data Breach Investigations Report has been able to identify three distinct threat actors including espionage, organized crime, and activists. Organizations can take proactive steps to mitigate potential risks by understanding each threat actor’s methods and targets. In this three part series, (ISC)2 and Oracle will examine these three threat actors, the industries they target, and how to protect sensitive customer and organizational data. We begin with countering espionage threats and their preference for using stolen credentials.
  • Recap of "Who Needs to Be Compliant" and "SOX Compliance Fundamentals" with live Q&A session.

    In this live webcast, Guy Wakefield and Ashley Peacock will provide an overview of key takeaways and host a live Q&A session to address questions related to videos 1&2 in the series:

    Life Sciences: Who Needs to Be Compliant?
    SOX Compliance Fundamentals
  • With Mule Studio, a single graphical design environment for the Anypoint platform, any developer can build hybrid integrations. In this webinar, Steven Camina, Sr. Product Manager, will build a complete integration scenario and deploy it both to a local machine on-premises and to the MuleSoft’s iPaaS solution, CloudHub. Once deployed, he’ll go through the runtime management and monitoring capabilities available on the Anypoint Platform.
  • With Mule Studio, a single graphical design environment for the Anypoint platform, any developer can build hybrid integrations. In this webinar, Steven Camina, Sr. Product Manager, will build a complete integration scenario and deploy it both to a local machine on-premises and to the MuleSoft’s iPaaS solution, CloudHub. Once deployed, he’ll go through the runtime management and monitoring capabilities available on the Anypoint Platform.
  • New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled.

    Attend this webinar to learn:

    • Why the level of preparedness is being held back by lack of understanding about threats
    • How an emphasis on reputation is driving formalization of plans and processes
    • The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats
  • One year after the Health and Social Care Act became law what has been the impact of the new competition framework – and how can NHS organisations comply with the law while also pursuing their aim of providing high quality care in a way which is both affordable and sustainable?

    This free webinar, in association with specialist healthcare law firm Hempsons, will look at the key issues for NHS and foundation trusts, and how they can comply with the law while still achieving their aims of creating sustainable and financially sound organisations.

    It will look at options trusts could consider such as provider collaborations, hospital chains and mergers, as well as the need to comply with competition law and the provider licence competition conditions.

    It will consider the role of commissioners in service and organisational change, and how organisations can best engage with Monitor and the Competition and Markets Authority, which will replace the OFT and Competition Commission on April 1. Viewers will get the chance to pose questions to our expert panel.

    Register now to ensure you are up to date on this crucial topic for acute, community and mental health trusts.

    Where: online
    When: 26th March 2014
    Duration: 45 minutes
    Cost: FREE

    On the panel

    Chair Dame Gill Morgan, chair of the Foundation Trust Network

    Ralph Coulbeck, director of strategy at the NHS Trust Development Authority

    Anita Charlesworth, chief economist at the Nuffield Trust

    Christian Dingwall, partner and head of corporate commercial at Hempsons

    This webinar will be essential viewing for chief executives and senior managers: make sure you register now.

    We look forward to welcoming you to HSJ TV.

    Can’t make it at this time? Don’t worry, you can catch up on demand after the event by registering with HSJ TV.
  • The final versions of better care fund plans are due on 4 April, but the need to make the plans real will begin immediately.
    There will be questions on who hosts and facilitates the pooled money. CCGs and local authorities will need to liaise on governance and negotiate the section 75 arrangements.

    This webinar aims to help practitioners get a clearer understanding of how to plan for these issues and give them an opportunity to reflect on how far they have got in this process. For example, what does an ideal situation look like and how does your position compare?
    An NHS England representative will lead the webinar, looking at these issues and drawing on examples of local integration initiatives that are helping to put organisations in a strong position to implement the BCF.

    Presented by Ivan Ellul, Director of Partnerships - NHS England.

    Accompanied by Krishna Taylor, System Policy and Alignment Manager at NHS England.
    and Ben Fletcher, Senior Finance Lead, Financial Strategy and Allocations at NHS England
  • In this on-demand video, Ashley Peacock, Director of Regulatory Compliance with Business & Decision, presents an overview of the Sarbanes-Oxley Act and discusses how SOX impacts IT organizations and how companies that are subject to other regulations can implement SOX compliance as part of a multi-regulation quality system.
  • La Dr.ssa Daniela Cangelosi, presenta la sua esperienza clinica e risultati su epilazione viso e corpo con sistema laser a diodi LightSheer.
    PB-1005024 Rev A
  • Want to find out about the new free capabilities you are going to get in Informatica PowerCenter v9.6? This is your chance! Whether you are doing your first few projects where the amount of data you need to support and infrastructure complexity is relatively low, to launching an enterprise-wide initiative where you need to handle large volumes of data and handle significant complexity, while ensuring data integration agility. The new PowerCenter family now offers even more capabilities to enhance agility and increase operational confidence. Find out how PowerCenter v9.6 can help you process large volumes of data, provide self-service data integration, improve data governance, and support agile development.
  • Digital marketing success requires the right technology. In this live webcast presented by Jim Marzola, B&D's VP of CRM, Marketing and Strategic Alliances, learn how Adobe Marketing Cloud enables marketers to:

    • Send the right offer to the right person in the right way at the right time
    • Identify customers and prospects across all your channels including Facebook and Twitter
    • Make sure emails get to your customers no matter the device
    • Present a unified message across all inbound and outbound channels
  • Despite our dependence on cultured cells as models, issues surrounding cell identity, choice of appropriate cell lines, conditions of their growth and storage, microbial contamination and over-passaging are often overlooked or misunderstood. Mistakes can have devastating impacts on the legitimacy and reproducibility of science but potentially also, on careers, reputations and funding streams.

    Topics covered:

    Solutions and options for managing cell culture processes
    The Impact of misidentification
    The international consensus on cell identity and qualification
  • Maintaining, verifying, and demonstrating compliance with the PCI DSS standard is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements. Join us for this webinar to learn how to simplify PCI DSS compliance.
    In this session, we'll review:
    Common PCI DSS compliance failures
    A pre-audit checklist to help you plan and prepare
    Core capabilities needed to demonstrate compliance
    How to simplify compliance with a unified approach to security
  • Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
  • Join us for a free, live webinar to explore how our customized market intelligence reports keep you abreast of developments in dermatology and provide extensive coverage of high impact conference abstracts.
  • Attend this webinar to discover:

    •Changes to healthcare delivery: hospitals of the future, aging in place, cost of care innovations
    •Role of the patient and consumer influence
    •Role of emerging regions as a consumer and competitor
    •Novel industry business models
    •Key disruptive technologies
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Join us to learn how Office 365 archiving can help you to meet all of your archiving and eDiscovery needs.

    During this live webcast, Chris Day, Director of Cloud & Mobility at Business & Decision will answer the following questions:

    •What are Exchange Online archives?
    •What are the limitations of Exchange Online archives?
    •How does eDiscovery work with Exchange Online archives?
    •What do I need to consider before migrating from a traditional archive to Exchange Online archives?
  • Expansion of stem cells and some primary cells requires either animal-origin components in culture media or coating of the culture vessels with human or animal-derived extracellular matrix (ECM) protein. Growing concerns about introducing human and animal-derived pathogens into the culture necessitate the need for animal- free (xeno-free and human-origin components-free) culture environment. Herein, we present defined and synthetic surfaces for cell culture. Corning® PureCoat™ ECM Mimetic cultureware collagen I peptide and fibronectin peptide support culture of cell types requiring collagen I or fibronectin protein -coated surfaces. Corning Synthemax® surface consists of a vitronectin peptide and supports undifferentiated expansion of human pluripotent stem cells (hPSC) and neural progenitor cells (NPCs). ECM Mimetic and Synthemax cultureware are pre-coated, synthetic, animal-free, and room temperature stable. Synthemax-SC is available for self-coating.

    We demonstrate expansion and functionality of several clinically relevant cell types including hPSCs, mesenchymal stem cells (MSCs), human keratinocytes (HKN), endothelial colony forming cells (ECFCs), NPCs and cell lines for biomanufacturing (CHO and Vero) on these surfaces. Corning Synthemax and ECM Mimetic cultureware are versatile surfaces compatible with multiple media for culture of various cell types providing a ready to use alternative to ECM protein coating where animal-free and defined conditions are desirable.
  • Hailing from Eastern Europe and North America, organized criminals have a penchant for using brute-force hacking and multiple strands of malware to target financial and retail organizations for monetary gain, according to the Verizon DBIR. It is common for these cybercriminals to directly access databases and extract payment cards, credentials, and bank account information. Join (ISC)2 and Oracle as we discuss tactics employed by these cybercriminals and how organizations should implement a defense in depth database security strategy to help mitigate the threat.
  • As additional details on the Target breach - and other retail attacks - leak out, we see that Point of Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. In this webinar, Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT) will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.

    Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including ecommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.

    Attend this webinar to learn about:

    • The various types of POS malware threats and the implications of experiencing an attack

    • The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks

    • Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Reza Shafii, Sr. Director of Product Management at MuleSoft and Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Reza Shafii, Sr. Director of Product Management at MuleSoft and Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • Telecom companies are increasingly seeking new revenue streams by exploring vertical markets like healthcare. While the industry presents promising opportunities, few telecommunication service providers have been able to establish successful business models in this space.

    Frost & Sullivan will present insights on critical factors that companies overlook while developing their healthcare strategies.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Reza Shafii, Sr. Director of Product Management at MuleSoft and Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • Organisations of all sorts are being hit by turbulent times like never before, and there is a lot the NHS can learn from the private sector about how to respond.
    This HFMA webinar presented by Belden Menkus, discusses what Boards should do when faced with rapidly changing, unstable, or contentious opportunities and threats.
    It also addresses how to respond to disruptive change - faster, more productively, and with lower risk.
    Belden Menkus, founder and Managing Director of MenKus & Associates, specialists in helping businesses respond quickly, effectively and with lower risk to disruptive shifts in competition, regulation, technology, and customer demand. Giving him a great breadth of expertise with the theme’s in this HFMA webinar. He discusses;
    -Why there is so much change right now?
    -When it is going to stop (or at least slow down)?
    -What is the role of the board, in building a winning organisation and strategy? - Even in these unsettled times
    Heather Strawbridge, HFMA’s chair of NED and Lay Member Faculty will be running an interactive question and answer session in the webinar. This is a great chance to put any unanswered questions or concerns you have from one of the leading professionals in the field.
  • The combination of several known evasion methods into new attack strategies, Advanced Evasion Technique (AET) attacks can provide attackers with unseen and undetectable access inside your network. AETs are exploiting weak detection points in firewalls and IDS, all the way down to the packet level. Even worse, AET’s are known to mutate, sometimes rapidly, as attackers drive innovation in their methods. Join (ISC)2 and McAfee for a discussion on the AET threat and how defend against it on May 8, 2014 at 1:00pm Eastern for our next roundtable webinar.​
  • Analytics 3.0 breaks through constraints that companies have faced around enabling any analytics, on any data, at any time. For many companies, the scope of data analysis has expanded from gathering operational business intelligence to performing product offering analysis using embedded data intelligence.

    Join our live webcast on April 3, 2014 at 12 PM EST and learn how analytics has evolved from business intelligence to the new era of data-enriched offerings, and how you can apply Analytics 3.0 to produce measurable business benefits and optimize internal decision processes for your organization.
  • oin us for a live Webinar to explore how our customized market intelligence reports keep you abreast of oncology developments and provide extensive coverage of high impact conferences such as ASCO.
  • Activists break into organizational web applications and databases to find personal and organizational data in order to expose this private information. The Verizon Data Breach investigations report says “Hacktivists generally act out of ideological motivations, but sometimes just for the fun and epic lutz.” In this third webcast of a three part series, (ISC)2 and Oracle will examine their number one tool of choice: SQL injection attacks. SQL injection attacks are both simple to perform and difficult to detect. We’ll discuss detecting and blocking SQL injection attacks in order to protect your most sensitive customer and organizational data from “epic lutz”.​
  • Learn how Product Information Management (PIM) can be used to deliver the consistent Omnichannel experience that your customers are demanding.