Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.
Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.
Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.
In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:
• What audit management encompasses
• How your organization can gain efficiency from proper audit management
• Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
• Creating strategies for sustained growth in 2020 and beyond
Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!
Danielle Russell, Group Product Marketing Manager; Caryn Seippel, Manager of Risk and ComplianceRecorded: May 16 201958 mins
Conducting internal audits is a security best practice and a common requirement for most compliance standards. Yet, the internal "audit season" can slow down business productivity to a grinding halt. This is especially a challenge for agile technology organizations that rely on continuous development and release schedules to drive business forward.
By adopting a continuous compliance program, you can keep your innovation humming while ensuring that you are continually addressing important industry and regulatory demands and, more importantly, maintaining secure systems and processes.
Join us for a special session with Caryn Seippel, Manager of Risk and Compliance at AT&T Cybersecurity, to learn:
- What is continuous compliance
- Practical steps to implement continuous monitoring
- How AT&T Cybersecurity, a security company, adopted a continuous compliance program
- How AlienVault USM Anywhere uses automation to help streamline continuous compliance
Thomas Mendel; Matt KlassenRecorded: May 16 201946 mins
Service Management is evolving at the pace of the digital economy. Staying ahead of key trends could mean the difference between leader and laggard and has a direct impact on the ability for your IT department to meet the digital needs of the business.
Join us for this eye-opening webinar featuring Research in Action’s Lead Analyst, Dr. Thomas Mendel Ph.D. with Cherwell’s VP of Product Marketing, Matt Klassen. They will discuss the results of a recent survey and research project targeting over 1500 global enterprises. Find out where Automation, Service Bots, Analytics and ITIL 4 fit into leading organizations Service Management strategies and how the top vendors compare with each other.
In this enlightening webinar, Jennifer Ellis will uncover the truth about paid and unpaid (or "marketing") speaking engagements. She will also explain how you can find success with every booking – where everyone wins – the speaker, the event planner, and the audience.
Join us and learn how to:
•Successfully negotiate paid speaking engagements
•Make the most out of marketing or “unpaid” speaking engagements (and learn how Jennifer’s clients have created more revenue from “unpaid” gigs than paid ones)
•Discover how to let go of how it “should” be
•Get more visibility through speaking engagements
Payment Card Industry Data Security Standard (PCI DSS) pushes organizations to achieve six distinct goals in the aim of protecting payment systems from breaches and theft of cardholder data. The requirements supporting the goals force organizations to manage, govern and integrate different departments within the business including IT, security, compliance, risk, incident response, and policy management.
Those managing this effort quickly realize that the effort to achieve the goals effectively and in a timely manner requires PCI DSS to be a day-to-day part of your business executed with purposeful coordination and immediate access to information to continuously assess the PCI DSS environment, remediate vulnerabilities and report required information.
In this live webinar, Lockpath’s Sam Abadir will share what a PCI DSS solution looks like, including:
• Best practices for effectively managing PCI DSS
• How your organization can gain efficiency from proper a PCI DSS solution
• Maintaining a strong vulnerability management program with PCI DSS
• Advantages of managing PCI DSS solutions efforts on a Governance, Risk and Compliance or Integrated Risk Management platform
Find out what you need to know to better manage your PCI DSS solution by attending this educational webinar. Register now!
Charlie Whelan, Vice President of Consulting, Transformational Health, Americas, Frost & SullivanRecorded: May 14 201960 mins
For most cities and states, the healthcare technology and biosciences sector is one of the most attractive industries of the future that can grow their communities. However, that attention attracts significant competition among players seeking to expand in a field that is highly complex. How should your community address this industry, and what is the best path to nurturing start-ups, retaining existing employers, attracting new companies and encouraging workforce development?
• The healthcare technology and biosciences market is large and complex. Learn how the industry is structured and which segments might align best with your community.
• Cities and states across the country are all competing to grow their own biosciences economies. Find out what types of programs and strategies are the most effective.
• Come away with a simple model for assessing your own community’s strength relative to the healthcare technology and biosciences market.
Sudeep Venkatesh, Chief Product Officer, Egress; Charles Moore, Opinions Matters; Spencer Wilcox, Brandon Dunlap (Moderator)Recorded: May 9 201956 mins
According to a recent Ponemon Institute survey, the average data breach costs $3.8M, up 6.4% from 2017. When it comes to an insider data breach, 95% of IT leaders view this as a concern for their organization (statistic from 2019 Data Breach Survey from Egress Software and Opinions Matters). Employees can put sensitive data at risk by accessing or sharing without permission, just because they are “curious” or intrigued by the content. An insider data breach can be the most damaging, the most expensive and the most difficult to detect and stop. How can an organization deal with these insider data breaches? Join Egress Software and (ISC)² on May 9, 2019, at 1PM Eastern for a wide-ranging discussion on insider data breaches, the malicious and the accidental and what can be done to mitigate such occurrences.
Scott Gidley, Vice President of Product ManagementRecorded: May 8 201931 mins
We all know that data is the lifeblood of a modern enterprise. But how can your business users action relevant, quality data into their applications for immediate value?
The answer used to be “Build a data catalog”. Data catalogs have grown in popularity as an essential tool for understanding where your data exists and what it is. But, that’s only the first step – and an easy step at that! The harder part is giving your business users self-service access to understand THEIR catalog and enrich the data THEY need when THEY need it … and then allowing them to action it into their analytical or operational applications for rapid insights.
Empowering the business: that’s where an “active data hub” differentiates from a “passive data catalog”.
Join Scott Gidley, VP of Product Management from Zaloni, to learn how real world users are moving away from traditional data catalogs to embrace active data hubs, including:
- How a unified data supply chain removes unwanted tooling and rapidly delivers real business value to departmental or line of business users
- How business users can enrich their data themselves and action it into their business applications - with the right amount of governance and trust
- Test yourself against the data hub maturity curve to determine where you are within your enterprise
Erich Kron, Mitchell Milligan, Justin OngRecorded: May 8 201947 mins
The greatest risk to the security of your company isn’t just hackers. It’s the users who let the bad guys get access to your network without even knowing it! Creating a security awareness training program that really works means training and phishing your users with real-world scenarios. You have to start phishing like the bad guys!
In this Spiceworks Video Meetup we discuss KnowBe4’s most recent phishing benchmark report to see how you stack up across your industry, the latest trends in phish scams, and the power of effective new-school security awareness training.
Here’s what we discuss:
- Top email and social media topics to test your users on, and how to phish like the bad guys
- Looking at phishing vulnerability by industry
- How to develop and re-assess your security awareness training strategy to ensure your users create a human firewall
Aria Naderi; Per StrandRecorded: May 8 201949 mins
Essential to your Digital Transformation success is a modern Service Management strategy combined with a state-of-the-art approach to digital knowledge management. During this webinar you’ll learn how the integration of Enterprise Service Management with Knowledge Management can add tangible value to your business, and how the configurability, scalability and security capabilities of an integrated solution have a direct influence on your process and service efficiency. You will also learn how to quantify the ROI and the TCO of an integrated approach for your organization.
If you’re seeking an easy-to-use integrated solution, see how Cherwell and ComAround make work flow.
George Anderson, Director of Product Marketing, WebrootRecorded: May 7 201957 mins
As the volume, sophistication, and complexity of cyberattacks on SMBs grows, current IT security solutions must become more pro-active, automated, and effective in response.
This presentation looks at how SMBs and MSPs can tackle these issues now and in the future, and equips them with the IT security expertise and technology they need to defend their clients while benefitting from market growth.
Dennis Douroumis, of University of Greenwich and Dr.-Ing Margarethe Richter, Pharma Application Specialist at Thermo FisherRecorded: May 7 201959 mins
Full Title: Employing Hot Melt Extrusion As a Cost Effective Method of Increasing Solubility Of Water Insoluble API’s
• Identifying the appropriate excipients for HME processing of water insoluble drugs
• Using novel excipients to achieve increased dissolution rates (Granulation)
• Extrusion with polymeric carriers for the development of solid dispersions
• Co-crystallisation of water insoluble drugs
In the last 20 years Hot Melt Extrusion (HME) has seized the attention of pharmaceutical industry for the development of pharmaceutical solid dispersions. It is a versatile processing technology, which can effectively increase the solubility/dissolution of water insoluble active pharmaceutical ingredients (APIs). The processing of a wide range of materials including inorganic excipients, hydrophilic polymers or cocrystal formers renders HME advantageous compared to conventional formulation technologies. In this review article we discuss recent trends for increased solubility/dissolution of water insoluble actives by using HME and predictive tools for process optimisation.
As a well-known process in polymer industry hot melt extrusion (HME) is approaching pharmaceutical manufacturing. HME allows innovative formulations of solid oral dosage forms. Its main advantage in pharmaceutical applications is the possibility to enhance bioavailability of a drug, i.e. to produce solid dispersions of the active pharmaceutical ingredient (API) in the polymer matrix. The main concern of the formulator is to achieve the appropriate release profile (immediate or sustained release) or improved bioavailability of the API. The presentation gives an introduction into HME technology as an alternative to spray drying. It includes several case studies related to HME for solid oral dosage forms. In addition to solid oral dosage forms hot melt extrusion (HME) can be used for novel delivery methods. The presentation gives an overview on possible applications including examples and case studies.
Focal Point Data Risk, Lockpath, SailPointRecorded: May 2 201958 mins
More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.
So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.
In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.
In this webinar, attendees will learn:
• The benefits of applying an integrated approach to identity risk
• The key strategies for overcoming common identity risk management
• How to integrate enterprise systems to more effectively manage identity risk
Melissa Jurkoic, Senior Solutions Architect for Amadeus HospitalityRecorded: May 1 201948 mins
Companies have been integrating their systems internally and externally via APIs for many years. APIs are not new, but the idea of them being openly accessible and available to be discovered by someone without your permission is indeed new for companies. Her company had dealt with integrating with partners for over 20 years, but this was necessary due to customer demand, and not seen as an opportunity to increase our reach or revenue. In order to convince C-level executives that there is an opportunity worth investing in, it is sometimes necessary to charge forward and create the outcome you need them to see.
Using the experiences through this journey from integration to opportunity, this talk will explain how we achieved justification for an entire development team to be dedicated to delivering our future API strategy.
Tips you’ll learn:
•Not everyone will share your vision, but that doesn’t mean it’s not worth pursuing.
•You can gain executive buy-in by creating the outcome you want them to see.
•There is power in your personal network that will enable you to achieve your greatest goals.
Craig Darling, Health & Life Sciences, Microsoft and Richard Cramer, Chief Healthcare Strategist, InformaticaRecorded: Apr 30 201956 mins
Healthcare is a highly regulated industry. Before migrating data to the cloud, you must have the right measures and framework in place—including HIPAA and HITRUST—to protect healthcare information and other sensitive data. Replacing an established on-premises enterprise data warehouse (EDW) is not as simple as moving data from an on-premises database to a database in the cloud; healthcare IT organizations require an incremental, well-governed, secure strategy based on a specific provider’s needs to rapidly deliver business results while ensuring minimal disruption to existing applications and analytic workloads.
Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTORecorded: Apr 30 201953 mins
1. to use PKI for strong authentication, data encryption & code signing for IoT devices;
2. to establish identities to IoT Devices with unique characteristics and manage those identities at IoT scale without human intervention;
3. modern encryption techniques are used to establish a verifiable device identity and ensure that devices do not get compromised; and
4. IoT IAM can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
5. to enforce identity and access through online AND offline authentication
With over a billion connected devices worldwide, Internet of Things (IoT) security remains top concerns for companies of all sizes. The growth of ransomware and IoT-specific botnets such as Mirai and Reaper have heightened awareness and security concerns of IoT devices. Even though many organizations may not have been victimized by IoT security breaches yet, they must start assessing their IoT security strategy and how to leverage IoT IAM technologies to reduce IoT security risk.
Join this webinar to learn how you can leverage Public Key Infrastructure (PKI) with the scalability and automation for strong authentication and data protection through encryption. We will explore how this is relevant for different industries including national and local Government, Education and Healthcare.
Nicky Stewart, Commercial Director at UKCloudRecorded: Apr 30 201914 mins
Join our Commercial Director Nicky Stewart as she guides you through :
- What's new in G-Cloud
- Important G-Cloud Rules, Guidelines, Dates and Deadlines
and much more..
Tyler Moffitt, Sr. Threat Research Analyst, WebrootRecorded: Apr 29 201945 mins
Each year, Webroot conducts extensive research on the current threat landscape. This webinar will present findings for 2019, which were also recently published in the Webroot 2019 Threat Report
A few of the key findings that will be covered, and their consequences explored, during this webinar include:
-40% of malicious URLs were found on good domains
-36% increase in the number of phishing attacks
-93% of phishing domains offered an HTTPS site
-54% of devices that got infected once were re-infected the same year
-25 of the top recurring malicious IP addresses were reused 95 times
Join Webroot security analyst Tyler Moffitt to learn about our threat discoveries and analysis, and to arm your business with the tools it needs to overcome modern cybercrime.
Augie Gonzalez, Director of Product Marketing, DataCore SoftwareRecorded: Apr 25 201945 mins
The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages.
Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs.
In this webinar you’ll become acquainted with:
•Machine learning (ML) techniques that sense data temperature variations in real-time
•Artificial intelligence (AI) methods used to dynamically migrate data accordingly, between primary, secondary and cloud storage from different suppliers
•Relative distribution of storage tiers necessary for optimum savings
Bob Maley, Normshield; Tony Rock, LockpathRecorded: Apr 25 201956 mins
Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.
In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.
As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.
John Jolliffe, Strategic Engagement, Adobe Document Cloud.Recorded: Apr 25 201945 mins
When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?
Join our webinar, to learn:
• Why e-signatures are essential to your company's success now and in the future.
• Which three signature types are legal under eIDAS.
• How to select the right approach for your business.
• Next-gen e-Signatures and The Cloud Signature Consortium.
Nick Cavalancia, Erich KronRecorded: Apr 24 201963 mins
When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. The problem is that cybercriminals are constantly evolving their tradecraft, becoming more daring, sophisticated, and successful at cyberattacks and making it increasingly difficult for IT to keep the bad guys out.
With so many possible issues for you to address, what do other IT pros like you really have a handle on and what’s keeping them lying awake at night?
In this informative webcast, cybersecurity expert and Microsoft MVP, Nick Cavalancia, and Erich Kron, KnowBe4's Security Awareness Advocate, as they discuss the results of KnowBe4’s 2019 What Keeps You Up At Night Report.
Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.
KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator)May 21 20192:00 pmUTC60 mins
More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
HIPAA requirements can be mind-boggling especially for smaller medical practices. Healthcare businesses of all sizes should comply with several requirements of HIPAA law. There are multiple components of the law involved, such as security, privacy and breach notification provisions. Hear directly from Lorri Doyle, Office Manager, Jacaranda Smiles, about her perspective on HIPAA compliance and how she went about it. Lorri has several years of experience working in a multi-location healthcare practice and will share her experiences and anecdotes related to HIPAA compliance, the challenges and its benefits.
CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
Simon Hill, Chief Legal and Compliance Officer, Certes NetworksMay 22 20191:00 pmUTC45 mins
Handling lawful consent in GDPR is one area that can be especially tricky. Companies need to be particularly aware of new rights for consumers and notification requirements as these types of regulated responsibilities are not just limited to Europe. Any enterprise that provides a service whereby personal data is processed, are impacted by GDPR requirements.
So, companies may think they have obtained sufficient consent regarding personal data and transparency only to find out that they have failed to obtain valid consent.
In this interactive webinar, Certes Networks will cover:
• What Did We Learn in 2018?
• What is Important in 2019?
• Getting Back to Basics
• The Top Three Keys to Sufficient Consent
• Case Studies
On behalf of Certes Networks, we look forward to your participation.
Markus Grueneberg, GDPR Evangelist and Michael McGrath, Senior Director, Compliance and Digital RiskMay 22 20192:00 pmUTC45 mins
According to the 2019 Cyber Security Breaches Survey conducted by the UK government, the number of data breaches suffered by businesses has declined over the last twelve months since the introduction of the EU GDPR.
However, is this decline because of the changing threat landscape, is it due to investments in security controls that protect our people or has GDPR truly transformed the way businesses protect the privacy of consumer data?
Join Michael McGrath and Markus Grüneberg as we discuss the impact GDPR has had one year on and the new challenges and opportunities it presents as we pass into the second year.
Audrey Bergeron, Applications ScientistMay 22 20194:00 pmUTC45 mins
In recent years, three-dimensional (3D) cell culture models have been emerging as the preferred in vitro cancer model as they better mimic the in vivo tumor microenvironment. For instance, 3D cultures develop hypoxic cores and demonstrate gradients of soluble factors and a diffusion profile for drugs similar to solid tumors. Understanding the interactions between cancer cells and other cell types in the tumor microenvironment is also critical to predicting therapeutic efficacy.
In this webinar, Audrey Bergeron will review:
•An introduction to 3D cell culture
•Assay techniques in spheroid microplates
•Several 3D cancer models and technology tools used to better capture the complexity of the tumor microenvironment in assay-compatible formats.
About the Presenter:
Audrey Bergeron is an applications scientist for Corning Life Sciences. She evaluates new products and develops protocols and technical documents using Corning cell culture products. She also provides product training to Corning employees and customers, and assists technical services with customer support by helping to troubleshoot customer experiments.
Emily Watson, Director of Payments and Global BankingMay 22 20196:00 pmUTC60 mins
The world is moving faster each day and both payers and business entities are demanding more of the way they both send and receive money. It is no surprise that in current global receivables there is a lack of transparency and the ability for an entity in one country to fully reconcile received funds with all the information they need.
With the rise of mobile payments and more choices and options than ever before, join Flywire's Director of Payments & Global Banking Emily Watson for this session where she'll share her expertise and insights on market dynamics and trends in global receivables, including:
-How to localize your payment experience
-Best practices on enhancing FX capabilities
-Payment types and what to expect for changes in payment methods to best serve your customer needs
-Tips on structuring a global banking network
Tim Lawrence, UKCloud & Mark Melvin, Shaping CloudMay 29 201910:00 amUTC60 mins
You have probably realised that your organisations needs to adopt multiple cloud services – but that’s a long way from where you are today. When facing a myriad of systems, technologies and contracts, how do you disentangle everything and turn your vision into an executable plan?
This webinar, hosted by transition expert, Tim Lawrence and joined by Mark Melvin from Shaping Cloud , will guide you through this journey and help you choose the right destination.
•How cloud is not the answer to everything
•Why the strategy and business case are critical to get the outcome you are looking for.
•Customer Case Study
•An overview of how cloud assessments are performed.
Laura Foley, Cheater of Death by PowerPointMay 29 20194:00 pmUTC60 mins
You’ve sat through boring presentations with terrible slides. But what makes these slides so hard to look at? And what can be done to improve them? Attend this webinar and learn about common slide design mistakes how to fix them. You’ll learn how the Analyze and Synthesize technique can be used to redesign problem presentations. At the end of this webinar, you’ll have a better understanding of how to create presentations that are simple, easy to understand and compelling!
Join Cherwell for a webinar outlining the need for and considerations of how to implement automation. As businesses look to streamline processes, there are several ‘quick wins’ to enhance efficiency within existing workflow, removing the need for resource to manage common, repetitive tasks and allow focus on shifting business priorities.
In this session we’ll discuss:
•What is Automation?
•Easy to apply Automation changes
This webinar is intended as an introduction level to applying automation and is the first module in a series of webinars by Cherwell covering this topic.
Gabriele Roberti and Andrea SivieroMay 30 20191:00 pmUTC30 mins
Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.
In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:
- How fast the different European industries are surfing the innovation wave?
- What are the key digital use cases and associated business outcomes across European sectors?
- What are the next-horizon technologies and their impact on different industries?
- What a “Digital Octopus vertical strategy” is for handling multiple use cases and emerging technologies, and how to build one.
Our webinar will help you charting out a solid vertical roadmap to address the most innovative and promising segments of the European technology market, while learning about real life end-user examples and preempting those emerging technologies that will reshape the future European business landscape.
Fiona Challis, Channel Enablement & Sales Expert, Next GenJun 4 20192:00 pmUTC60 mins
CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:
• How the cloud, edge computing, and 5G form modern economic infrastructure
• How IoT and AI are opening new doors for ambient computing
• How distributed technology models challenge existing structures
• How the business of emerging technology prompts sales channels’ reinvention
• How partnerships are bridging gaps in the new tech ecosystem
• How persistent tech personnel shortages are fueling new, creative staffing solutions
• How global tech hubs shine the spotlight on the ingredients for innovation
Leighton James, CTO at UKCloudJun 5 201910:00 amUTC60 mins
You’ve spent years developing a great application based on a unique domain expertise that addresses a particular niche. But the market is changing, new software providers are driving competition and customers no longer want to be responsible for software on-premises and want to consume it as a service, where you become responsible for the hosting, infrastructure and more flexible commercial model. So how do you take on this added burden and continue to deliver great solutions?
Join our CTO Leighton James as he answers this question, guiding you through:
- How Cloud is transforming the software business & enabling new opportunities
- What SAAS is and why it matters to your customers
- The growing opportunity for specialist software across UK Public Sector
- Where to start and how UKCloud can help
Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, ProofpointJun 5 201910:30 amUTC45 mins
Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.
Join security experts across the industry for an interactive discussion on:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technology and human talent
- Coping with analyst fatigue
- Threats on the horizon
- Recommendations for strengthening security
David Boda, CISO, Camelot Group
Darren Thomson, CTO - EMEA, Symantec
George Patsis, CEO, Obrela Security Industries
Martin Mackay, Senior Vice President - EMEA, Proofpoint
Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Robert Dobson, Device Authority and Jon Hill, InVMAJun 6 20193:00 pmUTC60 mins
Sign up to this webinar to learn:
- How to connect your devices
- Challenges of securing devices, applications and data, and how to overcome them
- Real world examples of secure connected devices for Industrial and Healthcare
IoT adoption has increased in recent years due to the benefits gained by organizations in almost every industry, just by connecting their devices to the internet. Connected sensors, actuators and edge nodes enable companies to pick up on inefficiencies and problems sooner and save time and money while supporting business intelligence efforts.
In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency. In an industrial setting, IIoT is key to processes such as predictive maintenance, enhanced field service, energy management and asset tracking.
The IoT has the potential to create a world where billions of devices can connect and communicate seamlessly. But bridging the gap between the digital and physical has proven harder than expected. Most deployments were brownfield and required technological, architectural, and organizational integration with legacy solutions.
In addition, Security has turned out to be one of the greatest barriers to widespread IoT adoption. The good news is that we’ve come to recognize a secure by design approach as the most viable security option for organizations in IIoT, healthcare and smart connected products. Security architectures must be flexible and allow for multi-vendor collaboration. Ultimately, a security solution which prevents and protects against security attacks is better than a detect and respond method which many traditional IT security vendors offer today.
Mike Jude, Ph.D., Research Manager, Digital Health, Frost & SullivanJun 11 20197:00 pmUTC60 mins
Are you curious about how Digital Health will change through the end of 2020? Are you looking for new growth opportunities to capitalize on now to ensure a successful future?
We invite you to attend the complimentary webinar, Digital Health Predictions and Trends—What to Expect in 2020, hosted by Mike Jude, Ph.D., Research Manager who will provide expert insight and predictions on new developments poised to help you build a growth pipeline. Insights will be based on the likely impact of technologies such as AI, Big Data, predictive analytics, and telemedicine, as well as evolving areas such as new billing practices and Femtech. Learn about real-world success stories as well as potential mistakes you will not want to make.
• Learn what the digital health market potential is through 2020
• Better understand which technologies and services will be the primary industry drivers in the short term
• Identify growth opportunities in digital health
• Explore the impact of new technologies and regulations on market potential
• Gain insight on new approaches to achieve more efficient management of the healthcare process
The California Consumer Privacy Act (CCPA) is the first major U.S. privacy law to unfold. This law has interested other states in following suit, which may soon call for a national U.S. Privacy Law. Organizations are uncertain how to comply with CCPA, which takes effect January 1, 2020.
In this live webinar, Lockpath’s Sam Abadir will share what preparation for CCPA compliance entails, including:
• Protecting consumer data
• Applying technology to processes
• Managing multiple channels for consumers exercising their rights
• Ensuring a fast response to breaches
• Requirements of CCPA
• Strategic approach to CCPA
• Best practices for managing CCPA
• Best practices for responding to privacy incidents
As an attendee you’ll learn how to approach CCPA to prepare yourself for the new law in 2020 and set the foundation for other privacy laws as they impact your organization. Register now!
Patrick Wheeler, Director of Threat Intelligence, ProofpointJun 12 20195:00 pmUTC51 mins
This year, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.
Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss:
- Predictions for the 2019 threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts
Peter Meeus, European Orphan Medicines, Sarah Rickwood, IQVIA, Angela McFarlane, IQVIA, Paul Tunnah, pharmaphorumJun 13 20192:00 pmUTC75 mins
Launching orphan medicines excellently will become even more important over the next five years as more patients with rare diseases have pharmacotherapies available.
There are also a growing number of disease-focussed registries, increasing public and policy maker awareness, and significant R&D investment in orphan drugs, as well as in digital technologies to support trials and treatment.
But a new frontier of challenge faces orphan medicines companies as the gap between orphan medicines and mainstream specialty products narrows.
To understand how to succeed in launching an orphan medicine in the coming years, companies must learn from past launches and apply an orphan medicines-focused launch excellence framework for success.
This internationally relevant webinar will provide US and European examples to illustrate the ways in which the pharmaceutical market for orphan medicines is changing and how, consequently, launch strategies must evolve.
This pharmaphorum debate, held in partnership with IQIVA, will also look at how pharmaceutical companies can optimise all the activities needed to take orphan medicines from clinical development to commercialisation, including:
•Identifying the three fundamental challenges for orphan medicine launch excellence
•Discussing the ways in which companies launching orphan medicines can learn from excellence in mainstream launches
•Examining, in-depth, the specific areas of focus which are crucial for orphan medicines excellence.
Brian Robison, BlackBerry Cylance; Justin Silbert, LEO Cyber Security; Eric Walters, Burns & McDonnell; B. DunlapJun 13 20195:00 pmUTC60 mins
The historical evidence of rules-based solutions in the Endpoint Detection and Response (EDR) has proven that this approach is unable to keep up with the speed of the shifting threatscape. Join BlackBerry Cylance and (ISC)2 on June 13, 2019 at 1:00PM Eastern where we will explore how machine learning and artificial intelligence are closing the OODA (observe–orient–decide–act) loop on the attackers. We’ll also examine how you can gain an advantage over emerging threats, your time to respond and impact of artificial intelligence on security professionals.
Every master plan is created to fulfill specific demands. But what if you did not consider one or two unpredictable factors? This webinar will provide insights to help you maintain business continuity by adapting to those inevitable, yet unforeseen turn of events.
- Find out where your organization ranks within the Vulnerability Index
- How to protect your BC/DR plans and avoid common storage pitfalls
- Discover the new standard of BC/DR planning and stay future-ready
Tyler Moffitt, Sr. Threat Research Analyst, WebrootJun 18 20193:00 pmUTC60 mins
Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.
SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.
Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.
Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
Garbage in, garbage out, or so the saying goes. If you get more efficient at garbage, then you too can have a bigger pile of garbage. Automation is an area where “work smarter, not harder” really comes into play. Let’s look at what some companies have done to avoid this.
Kelvin Murray, Sr. Threat Research Analyst, WebrootJun 25 201910:00 amUTC60 mins
With cybercriminals constantly innovating ways to steal information and monetise data, it’s crucial for businesses and MSPs to keep up to date on emerging cyber threat trends.
Webroot is hosting a series of webinars every three months that aim to keep the industry informed on the latest threat trends and to review the top cyberattacks that hit businesses each quarter, as well as tips for staying safe in a complex threat landscape.
Join Webroot as we discuss topics like:
• Information theft and phishing attacks
• Headline-grabbing breaches and the torrent of smaller ones that don't make the news
• The evolution of ransomware
• The theft, trade, and cracking of passwords