Hi [[ session.user.profile.firstName ]]

Health IT

  • Ransomware Hostage Rescue Guide: Part 2 of 2
    Ransomware Hostage Rescue Guide: Part 2 of 2 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Jul 21 2017 62 mins
    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.

    In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.

    Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide, Part 2”. We will look at recent infections, give actionable info that you need to prevent infections, and cover what to do when you are hit with ransomware.
  • Meet the next generation of Dell EMC OEM PowerEdge appliances
    Meet the next generation of Dell EMC OEM PowerEdge appliances David Pennington, VP Global Sales & Jared Wilson, Entrerprise Product Manager Dell EMC OEM Solutions Recorded: Jul 21 2017 59 mins
    Digital transformation is driving a need for OEMs to address key concerns — agility, scalability, flexibility, simplicity and automation. Dell EMC’s next generation of PowerEdge servers meets those concerns head-on with an end-to-end portfolio of scalable, virtualized, software-defined and converged solutions on a common server platform capable of running any application, from traditional to native cloud applications (NCA). With Dell EMC PowerEdge servers, you can build your vision of a digitally transformed infrastructure with secure, worry-free solutions.
  • Multichannel Maturometer 2017 results: Key global trends
    Multichannel Maturometer 2017 results: Key global trends Fonny Schenck (CEO, Across Health) and Dirk Szynka (MD Across Health Germany) Recorded: Jul 20 2017 48 mins
    Join us to find out about the results of the 2017 Multichannel Maturometer. The ninth version of this industry-renowned survey illuminates some of the big changes sweeping through the Pharma industry, as well as highlighting some trends which are still lagging.
    Questions which will be answered include:

    • Is senior leadership still on the fence for digital?
    • Marketing budgets – how are they changing?
    • How satisfactory are those in the industry finding digital offerings?
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Mark Bower, Global Director of Product Management, HPE Security – Data Security Recorded: Jul 19 2017 61 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
  • Modernizing Biopharmaceutical Manufacturing: From Batch to Continuous Production
    Modernizing Biopharmaceutical Manufacturing: From Batch to Continuous Production Dr Robert Dream & Dr Peter Levison Recorded: Jul 19 2017 66 mins
    The importance and value of continuous bioprocessing, both upstream and downstream has economic and sustainability advantages and due to the modular nature of continuous bioprocesses means that industry is able to adapt more rapidly to changing market demands. Continuous biopharmaceutical manufacturing in the context of other industries that have already successfully adopted continuous processing. Factor other than scientific ones, are the barriers to change from batch to continuous production. an excellent example of the manufacturing strategies of the steel industry in the 20th century, when this industrial sector incrementally switched from batch to continuous operations. biopharmaceutical industry has reached a stage that requires a change in the production paradigm. For a certain class of biopharmaceutical products upstream continuous manufacturing has always been applied: for example, unstable proteins that rapidly degrade in the culture broth. In order to obtain a high quality product, the residence time in the reactor must be minimized. This can only be achieved with continuous cultivation and preferably with perfusion reactors. a brief overview on the types of cell retention devices currently used in biopharmaceutical industry.
    Furthermore, this is a universal production platform that can be extended to other classes of products, such as antibodies, which are relatively stable molecules. continuous manufacturing is as productive and with a much smaller footprint of the manufacturing plant, avoiding multiple non-value added unit operations. In essence, the investment for a continuous plant is much smaller compared to a batch-operated one.
  • Stop Malware in its Tracks with Security Orchestration
    Stop Malware in its Tracks with Security Orchestration Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jul 18 2017 60 mins
    Security professionals are locked in a vicious cycle, with malicious actors spinning out new threats daily and security teams racing to keep up. Reducing the time to detect and defend against malware is critical. What if you could identify and block threats earlier? With the security orchestration capabilities in AlienVault USM Anywhere, you can.

    USM Anywhere is a security monitoring platform that unifies security visibility across your cloud and on-premises assets. New AlienApps™ extend the capabilities of USM Anywhere by interacting with other IT security and IT operations products like Cisco Umbrella, Palo Alto Networks and Service Now to centralize the orchestration of incident response activities.

    Join us for this webcast to learn:

    -What security orchestration means, and why it has become essential for fast, efficient incident response
    -How USM Anywhere can automate incident response activities, saving valuable time
    -How AlienApps help you reduce the friction of integrating and orchestrating across your security point solutions

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Roundtable: Contributors to ASHP Controlled Substance Guidelines Share Insights
    Roundtable: Contributors to ASHP Controlled Substance Guidelines Share Insights Kimberly New, Toni Fera, JoAnne Myhre, Kim Dove, Bill Churchill Recorded: Jul 18 2017 61 mins
    We will be hosting a roundtable discussion with multiple thought leaders who have contributed to the ASHP Guidelines on Preventing Diversion of Controlled Substances. The guidelines are aimed at helping healthcare organizations develop a controlled substance diversion prevention program.

    Presented by the following thought leaders:
    • JoAnne Myhre, CPhT, Allina Health
    • Kimberly Dove, PharmD, Pharmacy Consultant, Omnicell
    • Kimberly New, JD, BSN, RN, Principal Consultant, Diversion Specialists
    • Toni Fera, PharmD, Independent Healthcare Consultant
    • William Churchill, MS, FMSHP, Brigham and Women’s Healthcare

    Moderated by Juliana Linsdell, Nurse Consultant, Omnicell

    We look forward to having you join our discussion!
  • Catalyst Accelerator for Healthcare: Digital Transformation through FHIR & APIs
    Catalyst Accelerator for Healthcare: Digital Transformation through FHIR & APIs Matt Serna, Industry Marketing Manager, MuleSoft Recorded: Jul 18 2017 58 mins
    The mandate for digital transformation in healthcare is clear. The question that IT leaders must answer is not "if" but rather "how?"

    In particular, how should healthcare organizations delivering a digital experience for patients? How should they think about balancing existing HL7 point-to-point interfaces with emerging FHIR-based API approaches? How should they think about security? And how should they think about re-use to drive greater agility and increase time to market?

    Drawing on its work with 3 of the top-7 US hospitals, MuleSoft has developed Catalyst Accelerator for Healthcare, a set of API designs and supporting reference implementations, that codify integration best practices.

    Join this webinar to:

    - See a demo of the Catalyst Accelerator solution in action, powering web and mobile channels
    - Understand how an API-led connectivity approach can increase speed and agility by driving re-use of API assets
    - Learn how Anypoint Platform supports the design, development and management of APIs through a single, unified platform
  • Developing Simplified Methods for Quantifying Analytes using  SPME
    Developing Simplified Methods for Quantifying Analytes using SPME Robert E. Shirey, M.S.; Principal R&D Scientist Recorded: Jul 13 2017 75 mins
    Solid phase microexatraction or SPME is a green method for extraction of analytes out of a sample. Since SPME is a non-exhaustive extraction technique, some analysts believe that SPME is not quantifiable. This presentation will provide basic information for developing a method to extract and quantify analytes using SPME. Examples will be given on the extraction and quantification of analytes out of various matrices, and SPME will be compared to other extraction techniques such as QuEChERS and SPE. In this webinar, we will discuss some new SPME technologies such as SPME-OC (over-coated) fibers and BioSPME that help to isolate and quantify analytes from interfering compounds in the matrix. Guidelines will be provided for enhancement of precision using SPME.
  • A New Approach to Medical Device Management to Empower Digital Healthcare
    A New Approach to Medical Device Management to Empower Digital Healthcare Silvia Piai, Senior Research Manager, IDC Health Insights Recorded: Jul 13 2017 56 mins
    Connected medical devices are playing a fundamental role in transforming patient care quality and experience and healthcare providers efficiency.

    But as the number and the variety of devices grow within the organization, medical devices and the broader IoT ecosystem become more complex to manage, impacting patient safety, information security, compliance and financial performance.

    In this webinar IDC Health Insights will share its research findings and provide guidance to health executives that want to start harnessing the real value of medical devices, by implementing a evidence based, consistent, controlled and efficient IoT management approach

    About the speaker: Silvia Piai is Senior Research Manager within IDC Health Insights for Europe Middle East and Africa.

    She is responsible for analyzing key trends related to IT strategies and spending in European healthcare organizations, and global Public Health institutions. She advises healthcare organizations and ICT vendors on planning and implementing effective digital health transformation initiatives to drive business innovation.

    Silvia Piai has a more than 10 year experience in healthcare IT research. She started her career as public sector analyst, for then specializing in healthcare and becoming the lead analyst for the European healthcare market for IDC Health Insights. In her role, she focuses on the impact of digital transformation of healthcare and the role of technology in key industry trends as personalization and integration of care.

    Her analysis offers in-depth coverage of the technologies that provide the most clinical value in terms of quality, cost, time, and agility and are transforming pre-care, point of care (POC), and post-care today. Analyzing the adoption and the investment plans of healthcare organizations, Silvia describes the evolution of healthcare IT and gives key insight on primary factors shaping the industry and the implications for the coming year future.
  • A Head-to-Head Comparison of the Top-rated Products in HCI & SDS
    A Head-to-Head Comparison of the Top-rated Products in HCI & SDS DataCore Software: Alfons Michels - Senior Product Marketing Manager, Sushant Rao - Senior Director, Product Marketing Recorded: Jul 12 2017 54 mins
    When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-converged Infrastructure (HCI) and Software-defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.

    But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.

    Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization called WhatMatrix. In this webinar, we will cover the:
    - Criteria to evaluate these products
    - Pros and cons of different vendors’ products
  • Ransomware Hostage Rescue Guide: Part 1 of 2
    Ransomware Hostage Rescue Guide: Part 1 of 2 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Jul 6 2017 61 mins
    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.

    In this webinar, we will cover the first 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.

    Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware.

    Erich will cover these topics:

    - What new scary ransomware strains are in the wild?
    - Am I infected?
    - I’m infected, now what?
    - Proven methods of protecting your organization
    - How to create a “human firewall”
  • Advanced Cell Culture Technology for Generation of In Vivo-like Tissue Models
    Advanced Cell Culture Technology for Generation of In Vivo-like Tissue Models Stefan Przyborski, PhD - Professor of Cell Technology, Durham University UK Recorded: Jun 30 2017 64 mins
    The benefits of three dimensional (3D) cell culture are widely appreciated. More cell-based technologies are now becoming available that enable researchers to preserve the native 3D structure of cells in vitro. These can be broadly divided into three areas: aggregate-based methods; hydrogels and extra-cellular matrices; and inert scaffold-based technologies. Each has strengths and weaknesses and there is no one technology that satisfies all applications. Tissues in the body are mostly composed of different cell types that are often highly organized in relation to each other. Often cells are arranged in distinct layers that enable signalling and cell-to-cell interactions. Alternatively in tumours, cancer cells form aggregates and tissue masses composed of different cell types. Recreation of these types of architecture will significantly evolve 3D cell culture to a new level where real tissue-like structures can be generated in vitro.

    This webinar will review the alternative approaches available to researchers and provide an overview of their capabilities and example applications. More sophisticated models are developing as 3D cell culture technology becomes established and accepted as a means of creating more physiologically relevant cell-based assays. Methods that are relatively straightforward to use and that recreate the organized structure of real tissues will become valuable research tools for use in discovery, validation studies, and modelling disease.

    Key areas covered:
    • 2D vs 3D cell culture debate
    • Review of alternative approaches and the development of new technologies
    • Challenges facing 3D culture methods, in terms of technologies available and methods used
    • Showcase applications where 3D technology makes a difference
    • Future perspective for 3D cell culture technology and further development
  • 4 Ways Identity Can Improve Your Security Posture
    4 Ways Identity Can Improve Your Security Posture Krystal Wang Sr. Manager, Security Solutions at Okta Recorded: Jun 29 2017 25 mins
    Most organizations understand strong authentication is a necessary part of a good security practice. But because organizations have much less control over the devices, services, and people in their environment today, identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments.

    Join this webinar to learn why identity must not simply be a "first step" but the foundation for the future of security as well as 4 ways to leverage identity to enhance your security posture.
  • Dermatological Coding Complexities and Opportunities for Fraud, Waste and Abuse
    Dermatological Coding Complexities and Opportunities for Fraud, Waste and Abuse Lindsay Surynt, Investigator, and Katherine Bass, Investigator, General Dynamics Health Solutions Recorded: Jun 29 2017 53 mins
    Dermatology is a complex clinical specialty comprising hundreds of procedure codes for surgical services related to lesion removals, biopsies and excisions. This session will familiarize investigators with dermatology’s complex clinical coding issues by reviewing accurate reporting requirements and specific sections of the National Correct Coding Initiative, or NCCI. Our experts will also demonstrate applicable data mining techniques.
  • Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics
    Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics Orion Cassetto, Sr. Product Marketing Manager, Exabeam. Anne Saita (Moderator) Recorded: Jun 29 2017 50 mins
    Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to access multiple servers on the network, and account management, where the attacker escalates privilege or creates new privileged accounts. Detection of advanced threats like these require real time analytics and the ability to find signals within the very noisy security environment. Join Exabeam and (ISC)² on June 29, 2017 at 1:00PM Eastern to learn how user behavior analytics automatically analyzes and scores activity for escalated risk allowing for quick attack detection.
  • Real World Lessons For Modernizing Data Management with Big Data Technologies
    Real World Lessons For Modernizing Data Management with Big Data Technologies Navin Parmar, Enterprise Data Management Industry Consultant & Murthy Mathiprakasam, Product Marketing, Informatica Recorded: Jun 29 2017 55 mins
    How confident are you about successfully using Hadoop for your data management needs? Despite 60-80% of organizations experimenting with new big data technologies, only a few have been able to successfully extract value sustainably.

    In this webinar, Navin Parmar, a highly experienced healthcare data management leader and longtime Informatica PowerCenter customer, will share the best practices he has gathered across multiple projects from modernizing data environments beyond traditional data warehousing and successfully leveraging big data technologies. Learn real world lessons from an experienced industry practitioner who has delivered compelling healthcare analytics outcomes, while ensuring regulatory compliance with completely trusted data.
  • How to maximise the value of digital in medtech
    How to maximise the value of digital in medtech Paul Tunnah, pharmaphorum Recorded: Jun 29 2017 64 mins
    With a wealth of market and regulatory changes impacting the medtech sector, it’s time for digital technology to steer the direction of your future business. This expert webinar will evaluate how to strategically embed digital within your own organisation and explore the challenges and the opportunities for transforming customer relationships, driving commercial outcomes.

    – Respond to the changing regulatory environment: how technology empowers your business
    – Build a business case for digital transformation and gain organisational support
    – Strengthen your customer relationships and improve engagement in a diverse payer landscape
    – Learn from pharma (and other industries) to find opportunities and avoid pitfalls
    – Measure impact and return on investment from digital engagement
  • The CIO's Guide to Digital Transformation Strategy
    The CIO's Guide to Digital Transformation Strategy Davinder Gautam, Managing Director, Accenture; Ross Mason, Founder and VP Product Strategy, MuleSoft Recorded: Jun 29 2017 46 mins
    Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.

    Attendees will learn:

    - What are the obstacles getting in the way of achieving digital transformation?
    - Strategies to end the misalignment of business and IT on digital initiatives
    - A roadmap to closing the IT delivery gap
  • Petya Variant Ransomware: How to Detect the Vulnerability and Exploits
    Petya Variant Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager. Chris Doman, Threat Engineer Recorded: Jun 27 2017 32 mins
    As you've likely heard, a variant of the Petya malware is spreading rapidly and is known to have affected organizations worldwide, regardless of size. This variant of Petya follows a similar attack method to last month's WannaCry ransomware, though it uses the PsExec and WMI services for distribution.

    Once compromised, the ransomware will overwrite the Master Boot Record (MBR), encrypt individual files that match a list of file extensions (including documents, archives, and more), and after a reboot of the system will present the user a message requesting a ransom in Bitcoin to decrypt the system. As with WannaCry, the ETERNALBLUE exploit toolkit (which was released by the Shadow Brokers group in April 2017) is suspected to be a key part of the attack.

    Join us for a 30-minute technical webcast to learn more about this Petya variant, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.

    You'll learn:

    What the AlienVault Labs security research team has uncovered about this threat
    How to scan your environment (cloud and on-premises) for critical vulnerabilities with AlienVault USM
    How AlienVault USM leverages threat intelligence for early detection of threats like this variant of Petya
    How built-in response orchestration capabilities in AlienVault USM can stop the threat from spreading
  • Best Practices and Future Direction of Security Awareness Training
    Best Practices and Future Direction of Security Awareness Training Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 Recorded: Jun 26 2017 50 mins
    While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.

    Join security awareness expert Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst for this live webinar “Best Practices and Future Direction of Security Awareness Training”. We will discuss emerging industry trends and provide the actionable information you need to train your last line of defense, your employees.

    Perry will cover these topics:

    - Practical security awareness and behavior management tips
    - Outline how and where tools are helpful
    - Discuss emerging industry trends
    - How to create a “human firewall”
  • Security Practices for a More Secure Cloud
    Security Practices for a More Secure Cloud Kurt Hagerman, CISO, Armor; Raj Goel, CTO, Brainlink; Keith Young, Security Official, Montgomery Cty Govt. Brandon Dunlap Recorded: Jun 22 2017 60 mins
    The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
  • Top Trends You Need to Know: Hyperconverged, SDS, Flash, and Cloud Storage
    Top Trends You Need to Know: Hyperconverged, SDS, Flash, and Cloud Storage George Teixeira - President, CEO & Co-founder & Sushant Rao - Senior Director of Product Marketing - DataCore Software Recorded: Jun 22 2017 59 mins
    Storage and infrastructure are going through a lot of changes. With technologies like Software-defined Storage as well as new infrastructure like Hyper-converged, there is a lot for IT admins to consider.

    Join us in this webinar where we’ll cover Software-defined Storage, Flash, Hyper-converged and Cloud Storage. You learn why these technologies and infrastructure models are or aren't being utilized by companies and the areas where they have not lived up to their promises.
  • Winning Westerns: Proven Strategies to Optimize Your Western Blots
    Winning Westerns: Proven Strategies to Optimize Your Western Blots Natasha L. Pirman, Ph.D. Recorded: Jun 21 2017 53 mins
    Does western blotting give you more trouble than expected? Do you feel like your precious samples are being wasted on bad westerns? Join us and find out how you can improve your western blots! In this seminar, you will learn general guidelines for performing and troubleshooting your westerns, such as:

    • Choice of different blotting membranes
    • Parameters affecting blotting efficiency
    • Conditions for optimizing your immunodetection
    • Information on SNAP i.d.® 2.0 system: A faster way to perform immunodetection
  • The Shadow Brokers: How to Prepare for What’s Next After WannaCry
    The Shadow Brokers: How to Prepare for What’s Next After WannaCry Peter Ewane, AlienVault Security Researcher Recorded: Jun 20 2017 46 mins
    The Shadow Brokers are a hacking group who have published several leaks containing hacking tools from the National Security Agency (NSA), resulting in high profile malware attacks like the recent WannaCry ransomware attacks. So, what can we expect next as a result of the leaked hacking tools? The AlienVault Labs security research team has been analyzing the leaked information in an effort to understand potential attack vectors, and create the necessary threat intelligence updates for AlienVault products.

    Join us for a live, technical webinar on Tuesday, June 20th to learn more about the Shadow Brokers and what the AlienVault Labs team has uncovered about potential threats posed by the leaked tools.

    You’ll learn:
    A brief history of Shadow Brokers activity
    Analysis of the leaked hacking tools and exploits and their potential impact
    How to use information related to Shadow Brokers available in the Open Threat Exchange
    An overview of threat intelligence updates made to AlienVault products
  • 3D Nephrotoxicity applications & Nortis’ microfluidic organ-on-chip technology
    3D Nephrotoxicity applications & Nortis’ microfluidic organ-on-chip technology Dr. Ed Kelly, Dr. Henning Mann Jul 25 2017 3:00 pm UTC 120 mins
    1. The kidney proximal tubule is the primary site of drug-induced nephrotoxicity. I will describe the development of a 3-dimensional flow-directed proximal tubule microphysiological system (MPS). The kidney MPS recapitulates the synthetic, metabolic and transport activities of kidney proximal tubule cells. This MPS is as an ideal platform for ex vivo modeling of nephrotoxicity. Towards this goal, we have evaluated nephrotoxicity in response to challenge with multiple toxicants, including the heavy metal pollutant cadmium, antisense oligonucleotides, the antibiotic polymyxin B and the Chinese herbal product aristolochic acid. We believe that MPS technologies will have major impacts on predictive toxicity testing and human risk assessment. Animal and in vitro systems do not always faithfully recapitulate drug and xenobiotic responses in the clinic or occupational/environmental exposures, respectively. MPS technologies will refine safety assessment and reduce our need for surrogate animal testing. An ultimate goal is to create integrated human MPS organ systems that could replace animal models.

    2. Nortis has developed a technology that is used to recapitulate functional units of human organs in microfluidic devices (chips). Such organ models include vasculature, kidney, and liver models for toxicology studies, blood-brain barrier models for drug transport studies, and vascularized tumor microenvironment models for drug efficacy studies.
  • Beyond Superior Care Quality—How Can APAC Hospitals Become Truly Patient Centric
    Beyond Superior Care Quality—How Can APAC Hospitals Become Truly Patient Centric Frost & Sullivan, Gabe Rjipma,Microsoft, Dr. Timothy Low, Farrer Park Hospital, David Vu, GE Healthcare Asia-Pacific Jul 26 2017 2:00 am UTC 60 mins
    Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.
  • Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare
    Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare Nathan Rain, Group Manager of MDM, BJC Healthcare; Prash Chandramohan, Informatica; & David Lyle, Informatica Jul 26 2017 4:00 pm UTC 60 mins
    Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.

    In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.

    If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
  • Healthcare Fraud Driving Organized Crime: Examining Sources of Illicit Income
    Healthcare Fraud Driving Organized Crime: Examining Sources of Illicit Income Erin Picton, AHFI, Investigations Manager, and Mark Starinsky, Service Delivery Manager, General Dynamics Health Solutions Jul 26 2017 6:00 pm UTC 60 mins
    This session will familiarize investigators with the connection between healthcare fraud schemes and financial crimes, and fraud’s increasing importance in organized crime. This webinar will examine case study examples and provide effective techniques for detecting, preventing and responding to healthcare fraud, as well as practical advice for leveraging law enforcement partnerships in support of identification and recovery of misappropriated assets.
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Jul 27 2017 5:30 pm UTC 60 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Tara Callan, Marketing Manager, DataCore Software Aug 1 2017 6:00 pm UTC 60 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Integrating Network Analytics Into Your Security Architecture
    Integrating Network Analytics Into Your Security Architecture Jon Oltsik, Senior Principal Analyst at ESG Jeff Costlow, Director of Security at ExtraHop Networks Aug 2 2017 10:00 am UTC 60 mins
    Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
  • Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance
    Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys Aug 2 2017 3:00 pm UTC 60 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speaker: Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
  • Next-generation Sequencing: Enabling New Business Models in Clinical Diagnostics
    Next-generation Sequencing: Enabling New Business Models in Clinical Diagnostics Neelotpal Goswami, Piyush Bansal, Senior Industry Analyst, Transformational Health Aug 9 2017 3:00 pm UTC 60 mins
    Next-generation sequencing (NGS) has emerged as a key technology to deliver the next level of healthcare solutions. While the $1,000 genome was achieved in 2015, Frost & Sullivan predicts the $100 genome to be possible by 2024. The significant dip in cost of extracting genetic data has led to the creation of massive genomic data volumes that are expected to be some of the largest data sets globally by 2025, exceeding data generated by YouTube and Twitter.
  • Scaling Up Network Security: Shifting Control Back to the Defenders
    Scaling Up Network Security: Shifting Control Back to the Defenders Shehzad Merchant, CTO, Gigamon; Paulo Shakarian, ASU; Brandon Dunlap (Moderator) Aug 10 2017 5:00 pm UTC 75 mins
    Network threats and data breaches continue to grow in number, sophistication and speed, overwhelming current defensive capabilities. Security teams, limited in staff, resources and time, suffer from diminished effectiveness and enterprise protection. To stay ahead, organizations must create an adaptive ecosystem of network defenses; much like the body leverages its immune system. A Defense Lifecycle Model speeds threat identification and mitigation by incorporating machine learning and artificial intelligence into these security processes. Join Gigamon and (ISC)2 on August 10, 2017 at 1:00PM Eastern for a discussion on automated prevention, detection, prediction and containment and how it can help to fortify your defense.
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sacha Dawes, Principal Product Marketing Manager, AlienVault Aug 15 2017 5:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.

    We'll cover:

    What core security capabilities you need to demonstrate compliance
    The top challenges in meeting and maintaining compliance with PCI DSS
    Best practices to help you plan and prepare for an audit
    How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Aug 17 2017 6:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:
    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • 浮遊系細胞培養用シングルユースシステム
    浮遊系細胞培養用シングルユースシステム コーニングインターナショナル株式会社 ライフサイエンス事業部 石渡孝至 Sep 12 2017 6:00 am UTC 75 mins
    抗体ワクチンやウイルス産生のラボスケールから、治験薬製造スケールまでの浮遊系細胞培養用シングルユース製品の導入ポイントについて概説いたします。

    近年、バイオ医薬品開発に於けるシングルユース製品の市場が活況を呈しております。抗体ワクチン、幹細胞/ヒトiPSや浮遊系細胞による製剤化やバイオバンキン グを具現化する際に、最も大きな懸案事項となりますのが“質”、“量”そして“コスト”の問題があります。そこでコーニングでの安全、安価かつ簡便なシングルユース製品の特徴や仕様についてご紹介致します。
     また治験薬に向けた品質規格や導入事例によるマーケットトレンドを示しながら、トータルソリューションシステムの振盪培養(フラスコ、べセル、バッグ)、チュービング&コネクション(閉鎖系システム、無菌接続)、パッケージング(培養 / 回収 / 凍結保存)および品質規格(施設環境、BSE/TSE、発熱物質(Pyrogen)、USPクラス6規格準拠 / 滅菌保証レベル / エンドトキシン規格 / QC試験)について概説します。
  • Cell Line Engineering and the Cell Design Studio
    Cell Line Engineering and the Cell Design Studio Mark Gerber, PhD, Principal R&D Scientist, Supervisor, Cell Design Studio Sep 13 2017 2:00 pm UTC 75 mins
    Gene editing has become a firmly established technology within the discovery sciences arena. With the advent of CRISPR/Cas9 systems, the researcher's ability to find an active nuclease for nearly any region of any genome is now a reality. With even better nucleases available, those who routinely use gene editing tools to manipulate cell lines encounter other significant challenges that pose a barrier to building the "correct" cell line model. This presentation will highlight some of those challenges, and methods that we at Merck KGaA, Darmstadt, Germany have developed and/or implemented to circumvent them. A summary of the various formats of CRISPR/Cas9 tools, and recommendations for when to use each will also be presented.
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Yuli Mikolenko, Solutions Architect, Teradici Sep 14 2017 5:00 pm UTC 30 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be, without encountering firewall issues accessing their desktop.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • Geisinger Health: Architecting for Data Quality and Governance
    Geisinger Health: Architecting for Data Quality and Governance Patrick Gies, Enterprise Architect, Geisinger Health Plan & Thomas Brence, Director of Product Marketing, Informatica Sep 27 2017 5:00 pm UTC 60 mins
    The Geisinger Health Plan cares for over 500,000 members in Northeast and Central Pennsylvania. During this webinar, you’ll learn how their team uses the Informatica Platform to build enterprise solutions for data quality and data governance while also broadly supporting their journey to modernizing their data management competencies. You’ll discover both strategic and tactical considerations for leveraging capabilities from the Informatica Intelligent Data Platform to meet your goals, including discussion of industry best practices, design concepts for governance organizations and the development of core technical competencies. You’ll also hear about lessons learned and innovative approaches directly from the experts at Geisinger.