Hi [[ session.user.profile.firstName ]]

Health IT

  • How to Get More Out of Your Splunk Deployment with ExtraHop
    How to Get More Out of Your Splunk Deployment with ExtraHop
    Scott Olson, Sr. Sales Engineer; Stephen DeSanto, Solutions Engineer Recorded: Nov 15 2018 44 mins
    Splunk is an excellent platform for analyzing machine data and orchestrating responses. ExtraHop extracts wire data events and metrics from network communications, and can send this information to Splunk for added accuracy and context.

    This webinar explains why ExtraHop and Splunk make such a great fit, and how you can use the ExtraHop App for Splunk to stream wire data such as details for DNS, database, storage, and more.
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS Recorded: Nov 15 2018 59 mins
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    • Learn why automatic mitigation is crucial to keeping your business up and running
    • Understand the power and importance of the Incapsula 10-second DDoS SLA
    • Participate in a live Q&A with DDoS experts
  • IDC FutureScape: Worldwide Security Products & Services 2019 Predictions
    IDC FutureScape: Worldwide Security Products & Services 2019 Predictions
    Sean Pike, Program Vice President, Security Products Recorded: Nov 15 2018 52 mins
    In this IDC FutureScape presentation, IDC's Sean Pike will lead a team discussion of the key predictions that will impact enterprise security purchase decisions over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • ¿Por qué importa la seguridad?  Perspectivas de Latinoamérica de Unisys Security
    ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 62 mins
    Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
    Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
    Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.
  • IDC FutureScape: Worldwide Cloud 2019 Predictions
    IDC FutureScape: Worldwide Cloud 2019 Predictions
    Frank Della Rosa, Al Gillen, and Deepak Mohan of IDC's Cloud Services Team Recorded: Nov 14 2018 60 mins
    In this IDC FutureScape presentation, IDC's Frank Della Rosa, Al Gillen, and Deepak Mohan will discuss some of the key predictions that will impact the global market for cloud services over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Challenges and Myths of Enterprise Blockchain
    Challenges and Myths of Enterprise Blockchain
    Rao Cherukuri, CTO and James Penney, Director, Product Management Recorded: Nov 14 2018 48 mins
    This webinar will explore:
    •Reality checks of Private Blockchain implementations
    •IAM a key security and foundation layer in Enterprise Blockchain implementations
    •Options to protect private keys and crypto keys
    •Ensuring data security and privacy between participating entities

    With the hype and popularity of crypto currencies, there has been tremendous publicity about Blockchain, the distributed ledger technology and its use cases. The hype around blockchain is growing with the vast majority of Enterprises saying they are “actively involved” in the technology.

    Blockchain relies heavily on Public Key cryptography, but it doesn’t have a defined security model to secure the participating nodes and associated private keys.

    Enterprise private blockchain operations are substantially different, often utilize a permissioned network in which consensus can be achieved through a process called “selective endorsement,” where authorized peers verify the transactions. The advantage of this for businesses is that only participants with the appropriate access and permissions can maintain the transaction ledger. This calls for traditional Enterprise IAM (Identity and Access Management) methodologies to be extended to participating nodes.

    Device Authority specializes in device centric IAM with a focus on automated PKI and security management functions for entities and data. Our KeyScaler platform delivers the entity and data trust at scale for any Enterprise Blockchain implementation.

    Who should attend?
    •Blockchain as a Service Providers
    •Systems Integrators with Blockchain Practices
    •Private Blockchain Platform Providers
    •Healthcare Blockchain Providers
    •IoT Blockchain Providers
  • Por que a segurança importa?  Perspectivas globais e locais do Unisys Security
    Por que a segurança importa? Perspectivas globais e locais do Unisys Security
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 63 mins
    Unisys Security Index é uma importante pesquisa sobre preocupações de segurança realizadas em todo o mundo. Lançado globalmente em 2007, fornece uma medida regular e estatisticamente sólida das preocupações que os consumidores em 13 países têm sobre os principais aspectos da segurança, incluindo segurança nacional, financeira, pessoal e cibernética.
    Participe deste webinar para ouvir Leonardo Carissimi, diretor de Segurança Cibernética da Unisys América Latina, compartilhar os resultados e fatos da pesquisa sobre as preocupações de segurança dos consumidores do Brasil.
    Leonardo usará os resultados deste ano, justapostos com mais de uma década de histórico de pesquisas para fornecer um relatório convincente sobre o estado de segurança da perspectiva que mais importa: o usuário.
  • Power Your Security Ecosystem to Prevent Against Data Breaches
    Power Your Security Ecosystem to Prevent Against Data Breaches
    Teju Shyamsundar, Sr. Manager, Product Marketing, Okta Recorded: Nov 13 2018 26 mins
    It’s no secret that today’s employees are more mobile than ever, accessing your corporate resources from a myriad of devices, locations and networks. This has brought on a new shift in the IT paradigm which requires identity to act as the central control point in defining an enterprise security strategy.

    A dynamic identity and access management platform should be extensible and integrate with your existing detection and response tools, as well as give you flexible automation and orchestration in managing an end user’s lifecycle journey.

    Join us to learn how to:

    - Enhance your existing investments in security by providing a centralized identity and access management tool
    - How enterprises can protect against data breaches and common identity attacks
  • Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Nicky Stewart Recorded: Nov 13 2018 14 mins
    After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?

    This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement

    What you'll learn
    - The main differences between TS2 & G-Cloud
    - The Pros & Cons of using TS2 vs G-Cloud
    - Top Tips for making a succesful bid through either framework

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • 2019 Healthcare Predictions – Growth Opportunities, Technology, and Trends
    2019 Healthcare Predictions – Growth Opportunities, Technology, and Trends
    Reenita Das, Partner and Senior Vice President, Kamaljit Behera, Industry Analyst, Transformational Healthcare Recorded: Nov 8 2018 72 mins
    In 2019, digital health will come of age. Favorable reimbursement policies for clinically relevant digital health applications will expand care delivery models beyond physical medicine. 2019 will be a reality check for two of the most hyped healthcare technologies of this decade—Artificial Intelligence (AI) and Blockchain.

    Globally, 2019 will be a year of value-based care as we expect the outcomes-based care focus to globalize. Access to affordable and quality care will be a key political agenda for upcoming elections in emerging markets such as Asia, Africa, and Central and Eastern European countries. Non-traditional players with digital technologies, such as Amazon, Ali Health, Microsoft and IBM, will provide the required impetus to public health systems to ensure accessibility and affordability of care.

    Key Takeaways:
    • Learn how many of our 2018 predictions came true
    • Gain insight into the critical issues affecting the healthcare industry globally
    • Identify new opportunities connected to the pharmaceutical, biotechnology, medical technologies, diagnostics, and healthcare IT sectors
  • Email and the Web – Defending Against Attackers’ Favorite Vectors
    Email and the Web – Defending Against Attackers’ Favorite Vectors
    Matt Gardiner, Dir. Prd Mkg, Mimecast; Derrick Butts, CIO/CO, Truth Init.; Bruce Beam, Dir Infr & Sec (ISC)²; Brandon Dunlap Recorded: Nov 8 2018 58 mins
    According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered via malicious email attachments or via the web. With the vast majority of all security incidents and breaches using email and the web -- and the necessity of these services to your organization’s day-to-day operations -- how can you protect yourself? What are the best practices for defending against these types of threats? What are the best methods of acquiring, deploying and managing these protections? Join Mimecast and (ISC)2 on November 8, 2018 at 1:00PM Eastern for a discussion of these questions and the methods attackers are currently using to accomplish their goals, how attackers are using email and the web against organizations, why email and web security should be considered together and the benefits of cloud delivered security solutions, including improved security efficacy and reduction in overall costs.
  • Security Analytics: How to Identify True Risks to Your Data
    Security Analytics: How to Identify True Risks to Your Data
    Sara Pan, Product Marketing, Imperva, and Shelly Hershkovitz, Product Management, Imperva Recorded: Nov 8 2018 38 mins
    The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies.

    Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.

    Join this webinar to learn how security analytics can help:

    • Pinpoint real threats to your apps and data
    • Prioritize the most critical incidents
    • Interpret risk in plain language
    • Provide actionable insights to contain a potential breach
  • Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
    Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 43 mins
    Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
  • IDC FutureScape: Worldwide Health Industry 2019 Predictions
    IDC FutureScape: Worldwide Health Industry 2019 Predictions
    Lynne Dunbrack, Research Vice President, Mutaz Shegewi, Research Director, IDC Health Insights Recorded: Nov 8 2018 54 mins
    In this IDC FutureScape presentation, the IDC Worldwide Healthcare team discusses the key predictions that will impact CIOs and IT professionals in the worldwide healthcare industry over the next three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Data Centre Modernisation: Unlock Capabilities, Reduce Costs & Improve Security
    Data Centre Modernisation: Unlock Capabilities, Reduce Costs & Improve Security
    Andy Webb Recorded: Nov 8 2018 29 mins
    80% of spend in IT is used just "keeping the lights on". In our upcoming webinar we'll show you how to reduce the total cost of operations, enabling you to reallocate resources, directly driving growth and enabling real innovation and transformation.

    Our presenter for the session will be UKCloud's Head of Products Andy Webb, Who leads a team of product managers, product marketers and technical authors to define, develop and deliver UKCloud's latest products and services that delight our customers.

    From this session you'll leave with an comprehensive understanding of how you can reclaim wasted time & money you can reinvest in frontline services

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Webroot Protezione DNS Demo Webinar (in Italiano)
    Webroot Protezione DNS Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 45 mins
    Webroot Protezione DNS Demo Webinar (in Italiano)
  • Webroot Protezione Endpoint Demo Webinar (in Italiano)
    Webroot Protezione Endpoint Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 51 mins
    Webroot Protezione Endpoint Demo Webinar (in Italiano)
  • FBI Warning: Cyber Attacks on ATMs - Are you prepared?
    FBI Warning: Cyber Attacks on ATMs - Are you prepared?
    Joan McGowan, Senior Analyst at Celent and Steve Migliore, Head, Cybersecurity at Unisys Recorded: Nov 7 2018 46 mins
    A recent warning issued to banks by the FBI reads like the script for a Hollywood movie: cybercriminals are plotting a sophisticated, global “ATM cash-out” using cloned credit cards to fraudulently withdraw millions of dollars in just a few hours. A few days later, reports of a $13.5 million heist of 25 ATMs across the globe confirmed the reality that ATMs are a prime target for hackers.

    Are you prepared for when an ATM breach occurs, or more importantly, when a hacker gains access to your network and confidential customer information through your ATM networks?

    Join Unisys and Celent for this very critical, time sensitive topic that will help you understand this increasing threat and how to respond.

    In this webinar we will cover:

    •How global trends, such as open banking, will increase these threats
    •How ATM security fits in your end to end security and risk posture
    •We will be discussing Unisys Stealth®, which is a flexible software suite that leverages microsegmentation to secure critical assets
    •And so much more!
  • IDC FutureScape: Worldwide Digital Transformation 2019 Predictions
    IDC FutureScape: Worldwide Digital Transformation 2019 Predictions
    Robert Parker, Group Vice President, Shawn Fitzgerald, Research Director, Digital Transformation Strategies Recorded: Nov 7 2018 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Digital Transformation team discusses the key predictions that will impact CIOs and IT professionals in the worldwide digital transformation industry over the next three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • IDC FutureScape: Worldwide Internet of Things 2019 Predictions
    IDC FutureScape: Worldwide Internet of Things 2019 Predictions
    Carrie MacGillivray, Group Vice President, Internet of Things & Mobility Recorded: Nov 6 2018 37 mins
    In this IDC FutureScape presentation, IDC's Carrie MacGillivray will lead a team discussion of the key predictions that will impact the Internet of Things ecosystem over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical five-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • IDC FutureScape: Worldwide Developer & DevOps 2019 Predictions
    IDC FutureScape: Worldwide Developer & DevOps 2019 Predictions
    Al Gillen, Arnal Dayaratna, and Jim Mercer, Software Development and DevOps Solutions Recorded: Nov 6 2018 61 mins
    In this IDC FutureScape presentation, IDC's Al Gillen will lead a team discussion of the key predictions that will impact the world of application developers over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical five-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Configuration Risk
    Configuration Risk
    Sam Abadir Recorded: Nov 6 2018 33 mins
    We talk a lot about risk management as part of an overall GRC security strategy, but today we'll focus on one specific area: configuration risk. Of all the types of security risks companies face, configuration risk is one of the most prevalent; it touches all company assets and affects all parts of the business, however, managing these risks is often deprioritized or overlooked. There are three main challenges organizations face when evaluating and managing misconfigurations: how to obtain a holistic and accurate view of company assets, how much risk does each misconfiguration pose to the company, and how to communicate these risks to other parts of the business for remediation escalation. Today’s 20/20 webcast explores these challenges in-depth and discusses how organizations can leverage existing GRC security strategies to address and reduce configuration risk.
  • Understanding and Preventing the Latest Social Engineering Attacks
    Understanding and Preventing the Latest Social Engineering Attacks
    Erich Kron, Tim Wilson (Dark Reading), Chris Hadnagy, Ryan MacDougall Recorded: Nov 3 2018 63 mins
    While hackers and cyber attackers are continually developing more sophisticated methods for penetrating enterprise systems, most of their exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks – including phishing, social networking scams, and online "watering holes" – are designed to trick your users into giving up their passwords or opening email attachments that contain malware. But how can enterprises prevent this sort of attack? Can users be trained to recognize such exploits and avoid them? In this webcast, experts discuss the most effective methods of defending against social engineering attacks.
  • Gigamon 3 - Threat Hunting: Objectively Measuring Value
    Gigamon 3 - Threat Hunting: Objectively Measuring Value
    Justin Kohler, Sen Dir, Customer Success, Gigamon; Patrick Perry, Technical Acct Mgr, Gigamon Insight; Brandon Dunlap Recorded: Nov 1 2018 57 mins
    Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident response capability and teams invest significant time and effort in the development and maintenance of that program. However, management is always looking for metrics to demonstrate the value of threat hunting in real terms due to the number of hours consumed by such highly skilled professionals. It’s a big investment. Join Gigamon on November 1, 2018 at 1:00PM Eastern for an examination of how to demonstrate value from threat hunting operations with practical methods and examples for tracking hunting operations, reporting and attributing outcomes to industry-leading frameworks and plot hunting goals and coverage across the MITRE ATT&CK framework.
  • Roadmap to Smarter Health and Safety Management
    Roadmap to Smarter Health and Safety Management
    Sam Abadir, VP of Industry Solutions, Lockpath Recorded: Nov 1 2018 40 mins
    Safety is job number one in many organizations and employee health is an ongoing concern for firms. Both highlight the vital importance of health and safety management and its impact on operational risk. If workers are injured, are exposed to dangers, or are absent, they can't do their jobs and it impacts margins and goals. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter health and safety, including:

    • Critical capabilities required for health and safety management
    • Strategies for streamlining OSHA compliance and reporting
    • Approaches for increasing accountability
    • Ideas for leveraging data for operational risk management

    Making health and safety management a higher priority at your company is possible. Discover the road to smarter health and safety by attending this educational webinar. Register now!
  • Everything SMBs and MSPs Need to Know about Machine Learning
    Everything SMBs and MSPs Need to Know about Machine Learning
    George Anderson, Director of Product Marketing at Webroot Nov 20 2018 3:00 pm UTC 60 mins
    Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.

    We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.

    Topics include:

    • Understanding Machine Learning (ML)
    • How ML can stop zero-day and never-before-seen threats
    • The importance of contextual analysis and predictive analytics
    • Real-world results from the “new” ML technology
    • How ML Directly Benefits your Customers
  • Internet of Medical Things: How to Design and Deliver Secure Connected Products
    Internet of Medical Things: How to Design and Deliver Secure Connected Products
    Device Authority – Rob Dobson, PTC – Stefan Küsgen, SyroCon – Thomas Baumgart Nov 20 2018 4:00 pm UTC 60 mins
    The Internet of Medical Things, or Healthcare IoT, refers to a connected infrastructure of medical devices and software applications that can communicate with various healthcare IT systems. Frost & Sullivan estimates that there were 4.5 billion IoMT devices in 2015, a number that they expect to increase to between 20 and 30 billion by 2020.

    As the IoMT device landscape heats up and hospitals delve more into remote care, healthcare systems need to protect each and every IoT device from potential cybersecurity risks. To do this, medical device manufacturers should integrate the power of automation into a rock-solid digital technology foundation, making it easier to stay on top of the security needed to protect both the device and the patient, while also adhering to regulatory compliance.

    Hear from Device Authority, SyroCon and PTC on a real customer use case which encourages building secure connected IoT medical devices. Learn about potential benefits, best practices and key challenges, and how they can be solved with out of the box solutions and integrations between PTC, SyroCon and Device Authority.
  • The Workforce Gap Widens: The Need to Focus on Skills Development
    The Workforce Gap Widens: The Need to Focus on Skills Development
    John McCumber, Director of Cybersecurity Advocacy, North America, (ISC)2 Nov 20 2018 6:00 pm UTC 75 mins
    The 2018 (ISC)² Cybersecurity Workforce Study finds the cybersecurity skills shortage continues to grow. But the news isn’t all doom and gloom. Our latest deep dive into the issues and challenges facing cybersecurity professionals adopts a new approach to more broadly define the cybersecurity workforce. The study reveals a relatively satisfied, younger and more diverse field of practitioners focused on developing their skills and advancing their careers. Join (ISC)² Director of Cybersecurity Advocacy, North America, John McCumber On November 20, 2018 at 1:00PM Eastern as we examine how practitioners are dealing with the workforce gap while balancing skills development, hiring priorities and everyday threats they face.
  • 多段型セルカルチャーおよびマイクロキャリアによる細胞培養技術セミナー
    多段型セルカルチャーおよびマイクロキャリアによる細胞培養技術セミナー
    コーニングインターナショナル株式会社  ライサイエンス事業部 石渡 孝至 Nov 21 2018 6:00 am UTC 60 mins
    バイオロジクスの治験薬製造における効果的な細胞培養と分離工程の簡素化を実現させる幹細胞・癌細胞の基礎的培養技術を概説いたします。
    今回は、大量培養に向けたシングルユース技術導入のポイントを概説します。

    <セミナーのポイント>
    実際に静置型/撹拌型のシングルユース培養容器を使用した時のヒト間葉系幹細胞(hMSC)及びヒト胎児腎細胞(HEK293T)の培養データを例示します。
  • How to drive digital agility & efficiency in the Pharma & Life Sciences industry
    How to drive digital agility & efficiency in the Pharma & Life Sciences industry
    Sean Donnelly (Econsultancy), Toby Donnison (Pharma Lead - Adobe), and Rupert Wills (Solutions Consultant - Adobe) Nov 21 2018 3:00 pm UTC 60 mins
    The 2018 Digital Trends report released by Adobe & Econsultancy found that only 5% of healthcare and pharma organizations reported being digital-first. Yet in today’s digital world, there has never been a better time for the Pharma industry to innovate and improve health outcomes whilst driving business performance. Technology has sparked a revolution across all functions, from research and development to sales and operations. However, meeting these demands is not without its challenges. The unique nature of the pharma and life sciences industry means that it faces issues that other businesses do not have to grapple with. There are complex supplier networks, growing regulatory requirements and increasing pressure to reduce costs – so what can digital leaders do to effect change quickly?

    Join Econsultancy & Adobe in this webinar to learn:
    • The reality of the digital first challenge and the trends causing complexity.
    • How technology is shaping the future and the opportunities for digital agility & efficiency.
    • How Merck transformed time consuming business processes though digital workflows – accelerating business, and improving the employee & customer experience.
    • How electronic signatures can digitally transform your documents and workflows, accelerating an organisations digital transformation journey.
    • How to ensure you stay compliant with regulations including a live demonstration the BioPharma module (covering Title 21 CFR Part 11)
  • Can simulated datasets unlock the potential of patient data?
    Can simulated datasets unlock the potential of patient data?
    Jem Rashbass, Health Data Insight, Chris Carrigan, use MY data, Adam Reich, IQVIA, Dominic Tyer, pharmaphorum Nov 27 2018 2:00 pm UTC 75 mins
    Patient level data offers the promise of insights which can craft new and better pathways, enable development of innovative therapies and treatments, and of course identify and prevent diseases much earlier in their lifecycle.

    One area of particular interest is cancer. However, in trying to realise the potential, the health sector is faced with the conundrum of protecting patients’ identities, while at the same time allowing doctors access to their data and enabling industry to benefit from vital insights into the disease.

    This presents a paradox, as the UK has some of the best healthcare data in the world, however, accessing the data can be challenging and time consuming due to patient confidentiality checks.

    So, what is the solution?

    IQVIA brings a unique perspective to this event, having partnered with Health Data Insight to develop an innovative solution to this seemingly intractable problem: Simulacrum, a database comprised of only artificial data that is modelled on real patient data collected by the National Cancer Registration and Analysis Service (NCRAS) in England.

    Simulacrum has already produced identical results to the real data when predicting incidence of tumours in the population, whilst simultaneously removing any risk of breaching patient confidentiality.

    In this webinar, IQVIA and pharmaphorum will also provide advice to industry, patient advocacy groups and healthcare professionals on how to leverage Simulacrum, and utilise this simulated dataset to facilitate access to England’s world-leading healthcare data, while complying with regulations designed to protect and maintain individual confidentiality.
  • WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    Aria Naderi Nov 28 2018 9:00 am UTC 60 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Tom Patterson, Chief Trust Officer, Unisys Nov 28 2018 3:00 pm UTC 60 mins
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • Machine Learning, Personalized Medicine, and the Future of Drug Discovery
    Machine Learning, Personalized Medicine, and the Future of Drug Discovery
    Gabe Musso, CSO, BioSymetrics Nov 28 2018 4:00 pm UTC 75 mins
    Despite tremendous achievements in the fields of Artificial Intelligence (AI) and Machine Learning (ML), there remain several areas in healthcare and drug discovery where AI/ML has seen limited success. This includes, notably, improving the high attrition rates associated with discovery of new drugs. As genomic data becomes more widely available and clinical data continue to become digitized, there is an opportunity to use this data to understand and predict drug activity at a more personalized level than ever before. So what limits the application of AI/ML in the precision medicine & drug discovery space? Here we discuss the practical advantages and limitations of AI/ML as it relates to precision medicine and drug discovery, focusing on challenges that need to be addressed before the promise of AI-based approaches can be realized.
  • How to Achieve a 360° View of your Data
    How to Achieve a 360° View of your Data
    Jatin Hansoty, Director of Solutions Architecture Nov 28 2018 7:00 pm UTC 120 mins
    A majority of the data collected by organizations today is wasted. Whether through poor analytics, lack of resources, or just having too damn much of it. So how can organizations turn this around and actually start utilizing their data for powerful results?

    By leveraging an X-360 initiative, companies are able to take their customer, product, patient, or other data and provide a 360-degree view using a governed and actionable data lake. By breaking down the silos associated with traditional data located in disjointed systems and databases, companies are finding new ways to improve loyalty programs, product development, marketing campaigns, and even find a new source of revenue from their data.

    Join Jatin Hansoty, Director of Solutions Architecture at Zaloni, as he dives into real-world use cases from several of the world’s top companies. Learn from their architecture and the results they achieved.

    Topics covered include:

    - Best practices
    - Common pitfalls to avoid
    - Real-world use cases
    - Future-proof architecture
  • Modern Cyberattacks and How to Keep Businesses Safe
    Modern Cyberattacks and How to Keep Businesses Safe
    Dan Slattery, Sr. Information Security Analyst, Webroot Nov 29 2018 12:00 am UTC 45 mins
    Small and medium-sized businesses and the MSPs who serve them are major targets for cybercriminals. To stay safe, today’s businesses and MSPs must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses will face this year to get details and tips that will help you keep your business and clients safe.

    Some of the topics Dan Slattery, Sr. Information Security Analyst, Webroot will cover:

    • Ransomware, banking Trojans, and phishing
    • Cryptomining, cryptojacking, and other crypto-crime
    • Best practices for keeping businesses safe.
  • Maintaining (and Improving) Security on your Journey to Cloud
    Maintaining (and Improving) Security on your Journey to Cloud
    Jason Garbis, VP of Cyb. Products, Cyxtera; Mike Brannon, Dir. Infra. & Sec., National Gypsum; Spencer Wilcox, B. Dunlap Nov 29 2018 6:00 pm UTC 75 mins
    Like a good rollercoaster, a journey to the cloud can be both exhilarating and terrifying. Unlike a rollercoaster, however, a cloud journey is a long-term commitment and requires thoughtful planning, especially the need to ensure security and compliance controls. Join Cyxtera and (ISC)2 on November 29, 2018 at 1:00PM Eastern for a discussion on making a secure journey to the Cloud and the benefits of a software-defined perimeter.
  • Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Steve Hunt, Dir. Product Management - DataCore Nov 29 2018 7:00 pm UTC 60 mins
    IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.

    This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.
  • 2019 and Beyond: Incident Detection and Response at Wire Speed
    2019 and Beyond: Incident Detection and Response at Wire Speed
    Chris Kissel, IDC, and Barbara Kay, ExtraHop Dec 5 2018 4:00 pm UTC 60 mins
    While some innovations deliver material benefit, many aren’t worth your POC time. In this webinar, featured speaker Chris Kissel, Research Director, Security Products and head of the IDC security analytics and orchestration practice, will present new research on what will disrupt, what will innovate, and what will merely evolve in the security analytics market over the next several years. Futurescape trends provide insights on the best ideas enhancing incident detection and response and provide a look at the ideal use cases for the most beneficial new technologies.
  • The devil’s in the e-detail: what HCPs really want from you
    The devil’s in the e-detail: what HCPs really want from you
    Heiko Schmidt, Integrated Multichannel Marketing and Sales, Bayer, Sari Ruth Carter, Head of Marketing, Anthill Agency Dec 6 2018 10:00 am UTC 75 mins
    Overview:
    Communication; we all do it, it is a critical part of effective business practice and in this pharma is no exception.

    It is no secret that for pharma companies, face time with healthcare professionals (HCPs) has reduced drastically over the last 10 years while the cost of in person engagements has increased significantly.

    Like any customer their expectations for the content they receive have changed, with a focus on useful, succinct and easy to consume materials rather than the sales materials of old.

    So what is it that HCPs want and through this lens, what is it that pharma should be doing?

    The evidence points towards creating meaningful two-way conversations through multiple channels, connecting otherwise siloed touchpoints with and for HCPs in the process.

    For the past 40 years detailing has been the backbone of pharma/HCP communication – but what about e-Detailing? Is it just detailing on an ipad or is it supposed to be something more? How does this fit and what is possible, and more importantly desirable?

    To analyse the current situation and present practical insights, pharmaphorum presents a new free to attend digital debate. Working with our partner Anthill agency we have put together a panel of leading experts from Bayer and Anthill.

    This debate will cover:

    •What is the current landscape for optimal HCP communication?
    •What is the future in terms of HCP channel preference?
    •New technologies in pharma marketing that help you to better engage with HCPs and extend HCP reach – AI, chatbots, self-detailing
    •How to reach more HCPs, when, where and how they want
    •How to overcome low content usage by HCPs
    •The most common challenges for traditional eDetailing effectiveness
    •How to achieve better communication without having to reinvent the wheel
    •How to activate your existing content and reach all customers willing to engage with your brand, regardless of their preference.
  • IDC FutureScape: Worldwide Future of Work 2019 Predictions
    IDC FutureScape: Worldwide Future of Work 2019 Predictions
    Roberta Bigliani, Vice President, IDC Energy Insights, Avinav Trigunait, Research Director, Future of Work, IDC Dec 6 2018 3:00 pm UTC 60 mins
    In this IDC FutureScape presentation, analysts discuss key predictions that will impact CIOs and IT professionals in the future of work over the next three to five years.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • Metrics to meaning: demonstrating the value of medical communications
    Metrics to meaning: demonstrating the value of medical communications
    Lynda Chang, Scientific Director, Complete HealthVizion, David Pearce, Commercial Director, Complete HealthVizion Dec 6 2018 3:00 pm UTC 75 mins
    Medical affairs and publications teams are under increasing pressure to demonstrate effectively the success of the medical communications activities they undertake.

    Naturally, there are a huge number of metrics that could be used to measure and demonstrate medical communications value. The challenge is to identify, and track, those metrics that really matter, and ensure this information is interpreted effectively.

    This pharmaphorum webinar, which will be held in partnership with Complete HealthVizion, will look at how to measure medical communications activities, how to continue with what is successful and how to change what isn’t working.

    This means identifying what can be measured, both in terms of reach and engagement as well as behavioural impact, deciding what ‘great’ looks like and how best to define success.

    The expert panel will also look at how behavioural science can provide a framework to develop smarter communications and, ultimately, drive better patient outcomes.

    This Metrics to Meaning webinar will take place on Thursday, 6 December, at 15:00 pm GMT (10:00 EST) and will teach you how to measure the effectiveness of different types of medical communications programmes.

    Interacting with the panel will also allow you to learn about a range of practical approaches to implementing metrics, including:

    • Innovative ways to measure medical communications value and success
    • How to help medical affairs and publications teams demonstrate greater value
    • How to optimise tactical outputs year on year
    • The importance of demonstrating and measuring behavioural change

    In doing so they will also discuss the role of behaviour and the implications of this for measuring success.
  • Halt! Who Goes There? Improving the Intersection of Identity & Security
    Halt! Who Goes There? Improving the Intersection of Identity & Security
    John MacInnis, Prd Mktg Mgr, IAMS, HID Global; Brandon Dunlap (Moderator) Dec 6 2018 6:00 pm UTC 75 mins
    With the multiple points of access to an organization, both internal and external, as well as physical and electronic, identity and access control is a critical security concern. Practitioners need to constantly monitor and assess the organization’s security posture, access provisioning and even the on boarding of employees, partners and customers. Join HID Global and (ISC)2 at 1:00pm Eastern Thursday, December 6, 2018 for a discussion on why identity has become the center of security and how to better manage identity, access management and authentication in your enterprise.
  • 2019 Risk Trends and Predictions
    2019 Risk Trends and Predictions
    Sam Abadir, Lockpath Dec 13 2018 5:00 pm UTC 60 mins
    What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.

    As an attendee, you’ll learn:

    • The shift to a more integrated risk management
    • The growing emphasis on supply chain cybersecurity
    • The rise in data privacy and its impact on information security

    Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
  • 3Dスフェロイド培養のアプリケーションとミニチュアライズ
    3Dスフェロイド培養のアプリケーションとミニチュアライズ
    コーニングインターナショナル株式会社 ライフサイエンス事業部 江藤 哉子 Dec 20 2018 6:00 am UTC 60 mins
    弊社独自の超低接着表面・形状のプレートを用いた三次元がんスフェロイドや、免疫細胞の作用モデルなどのハイスループットスクリーニング、オルガノイド作製の実例を交えて概説いたします。

    今回は、3Dスフェロイドを使用したアプリケーションをご検討中のみなさまに向けて、基礎から実際のアプリケーションまでをお話しいたします。