Browse communities
Browse communities
Presenting a webinar?

Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
  • La malnutrición es un problema general a nivel mundial, ya que las personas no consumen el nivel suficiente de nutrientes esenciales. A su vez, la obesidad se ha convertido en una preocupación creciente porque se consumen demasiados alimentos para el nivel de actividad. A este ritmo, la sociedad actual no podrá cumplir con los objetivos de la Asamblea Mundial de la Salud (WHA) 2025 en materia de nutrición y es esencial que los programas de nutrición se desarrollen aún más para mejorar la situación nutricional. La fortificación de los alimentos es una manera efectiva de producir alimentos altamente nutritivos y combatir la malnutrición y así lograr un mejor desarrollo socioeconómico. La industria de alimentos, bebidas y suplemento dietario cumple una función clave en la promoción de la nutrición de la salud pública al desarrollar opciones nutritivas, saludables y asequibles para los consumidores.

    En este seminario web informativo, el experto independiente Alfonso Valenzuela Bonomo junto con Hector Cori de DSM, director de Nutrition Science & Advocacy LATAM, debatirán sobre la necesidad de la colaboración entre sectores (gobierno, organizaciones civiles y empresas) para combatir la malnutrición.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.
  • This webinar will introduce the history, theory, basic techniques, and potential pit-falls of mammalian cell culture. It is designed for students and new lab technicians, as well as bench scientists interested in updating their techniques or knowledge in the field.

    Topics to be discussed include:
    • History and practical theories of cell culture and its impact on today’s science
    • The requirements needed to set up a cell culture laboratory
    • Challenges when performing mammalian cell culture and how to overcome them

    About our Presenter:
    Dr. Mark Rothenberg graduated from Emory University with his Ph.D. in Cell and Developmental Biology. Over the past 25 years, Mark has held positions in both academia and industry where he has developed an expertise in the areas of assay development and cell culture. He currently holds the position of Manager Scientific Training and Education with Corning Life Sciences.
  • Keeping Compliance in Check & Controlling Access Risk:

    Learn how one of the nation's largest health insurers provides access to users efficiently and effectively while also assuring that private constituent data is protected in compliance with HIPAA, HITECH and other federal and state privacy and security regulations. Join (ISC)2, Courion and Harvard Pilgrim Health Care on April 28, 2015 at 1:00pm Eastern to learn how the information security team is able to identify and remediate user access risks such as unnecessary privileged access, orphaned and abandoned accounts, and system or non-human accounts that call for administrative oversight.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • More than 100,000 information security professionals have invested time, effort and resources to achieve what has long been considered the Gold Standard security certification – The CISSP. Now that the security industry is growing and career trends are shaping the current job market, there is a bigger need to understand where the CISSP fits and what value it brings to any professional undertaking the path to become certified.

    During this panel session you'll hear different perspectives, including that of the hiring manager, recruiter and credential holders themselves around the following questions:

    - How is the CISSP viewed in the market place?
    - Which career paths are worth exploring with a CISSP?
    - What skillset does a CISSP have?
    - Is the CISSP a differentiator for a candidate?
    - How does the CISSP help the professional perform his job?
  • Host-based IDS systems, or HIDS, work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM features a complete integration of OSSEC, one of the most popular and effective open source HIDS tools.

    In this live webinar, we'll show you how USM helps you get more out of OSSEC with:
    Remote agent deployment, configuration and management
    Behavioral monitoring of OSSEC clients
    Logging and reporting for PCI compliance
    Data correlation with IP reputation data, vulnerability scans and more
    We'll finish up by showing a demo of how OSSEC alert correlation can be used to detect brute force attacks with USM
  • Regardless of the colour of the next UK government that emerges as a result of the May election, the £30-£50bn NHS budget chasm is the abyss that all the parties fear in respect of its thereat to quality health service delivery and re-election.

    With political backs to the abyss, no hostages will be taken. It is not unrealistic to expect a well co-ordinated and concerted offence by politicians and patient organisations alike on industry pricing of innovative speciality and rare diseases medicines:

    With this scenario in mind pharmaphorum is once again working with IMS Health to bring you expert insight into what this means for the UK health system and more specifically market access for specialist treatments in the post-election environment.

    Angela McFarlane, Senior principal IMS Health Local Market Access, Anthony Grosso, Principal Pharmacist at the National Hospital for Neurology and Neurosurgery and Sheela Upadhyaya, previously a NHS Senior Manager with over 17 years of experience in the delivery of services and in commissioning of highly specialised services for rare and ultra rare conditions, combine with pharmaphorum's Paul Tunnah to deliver an accurate analysis and frontline insight as to the already complex roadmap for access is about to change again.

    This one hour event will include analysis of informed predictions which include:

    The NICE HTA criteria will get tougher post end to end review (IMMTreV)
    NICE and the NHS England will join forces to streamline access pre/post NICE
    Risk at local level will be shifted to Providers under the new marginal tariff arrangements; which could indeed see a close to the CDF as the PbR excluded drugs list becomes a thing of a glorious past
    Provider baselines will take the strain of innovation - the tough decisions will be softened by a drive to really accelerate uptake of NICE approved medicines

    How can industry prepare for these changes in what is already a tough and complex environment?
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • It's been said that defensive driving is about "driving for the other cars on the road." The same can be said for setting your organization's security strategy and "to think like your enemy". It's a sound practice which focuses on infosecurity practitioners putting themselves in the shoes of their attackers and anticipating where the next threat may be coming from. Using advanced analytics to compile simplified reporting can help to streamline your these efforts, enabling you to more clearly see the threats the attackers may be using and helping you to react faster. Join (ISC)2and NopSec on April 9, 2015 at 1:00PM for a discussion on vulnerability and threat analytics to better secure an organization.
  • Accurate, complete, secure — these are the hallmarks of enterprise data at world-class organizations. In healthcare, the importance of these metrics carries even more importance. That’s why CHRISTUS Health takes a systematic approach to managing its information assets. Operating in more than 60 U.S. cities and half a dozen states in Central and South America, CHRISTUS understands the challenges of building information systems that respect privacy, while enabling the kind of analysis that leads to better patient outcomes.

    During this Health Data Management webcast, learn how CHRISTUS Health assembled a comprehensive data strategy for delivering an advanced analytics infrastructure. You’ll hear how a combination of Data Management tools and Data Governance process addressed core challenges of working with multiple systems across the spectrum of healthcare domains. An in-depth Q&A session will let attendees learn about the best practices that enable operational and clinical efficiencies through this next-generation analytical solution.
  • Osterman Research and (ISC)2 recently conducted a survey of individuals in mid-sized and large organizations on how they choose off-the-shelf applications, how they develop custom applications, and how they select third-party application developers. Join (ISC)², Michael Osterman and a panel of experts for a discussion about the findings from the survey and the state of software development quality on Tuesday, April 7th at 1:00pm Eastern. Attendees will also have the opportunity to download the entire survey report.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • How do ischemia and fixation impact the quality of your assay results and information transfer? Garbage in! Garbage out! Join Geoffrey Baird MD, PhD and David Chafin, PhD at 9 AM Mountain Time, March 31, 2015, who will discuss the impact of ischemia and fixation on assay results, information transfer and some novel approaches to address these important factors. Dr. Baird is an Assistant Professor of Laboratory Medicine and an Adjunct Assistant Professor of Pathology at the University of Washington. Dr. Chafin is a Principle Scientist, Technology and Applied Research at Ventana Medical Systems Inc.
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • Abstract:
    There is a great interest in application of human mesenchymal stem cells (hMSCs) in cell therapy and tissue engineering due to their self-renewal, multi-lineage differentiation, immunomodulation, and trophic potential. One of the challenges faced in the clinical application of hMSCs is the need for efficient expansion of these cells in vitro without altering their capacity. Serum-free mammalian cell culture media, in particular, require optimization of the expansion protocols. Even subtle changes in routine handling can have a significant impact on the cells’ potential.

    This seminar will cover the variables that can influence the desired regenerative and differentiation properties including medium selection, vessel surface treatment, impact of the cell source, and seeding density. We will also discuss how users can select the correct conditions for optimized growth and functionality.

    Speaker Biography:
    Brian Posey is a Product Development Manager for cell culture media at Corning Life Sciences. Brian has over 10 years experience in cell biology and industrial scale cGMP manufacturing of both liquid and powder cell culture media. Since joining Corning in 2012, Brian has lead numerous innovative technology projects for the media business ranging from customer technology transfer for production scale-up to developing new serum-free media for industrial and stem cell lines.
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • The NHS Five Year Forward View recognised improvements of outcomes in key areas like cancer and cardiac but also acknowledged preventable illness is still widespread. While new medical equipment technologies are emerging all the time to support improvements in diagnosis and treatment of preventable illness, more financially sustainable solutions are needed to fund them.
    This CPD accredited webinar will feature speakers from Lancashire Teaching Hospitals NHS FT and Plymouth Hospitals NHS Trust along with NHS Supply Chain. They will demonstrate how you can apply strategic asset management to optimise the replacement and management of medical capital equipment to:
    •Make the latest medical equipment technology more affordable for your trust
    •Ensure your patients have access to the best quality care possible
  • Lync 2013 (soon to be Skype for Business) is commonly known as an instant messaging client that includes voice and video capabilities within the enterprise. However, its ability to cross enterprise network boundaries and reach colleagues, partners, and customers across the globe via mobile phones or traditional telephony systems is often overlooked. The natural progression in collaboration may start with a quick instant messaging conversation but often leads to picking up the phone and calling someone to attain resolution.

    Join us on Wednesday, March 25th at 2pm EST to learn about the capabilities of Lync Enterprise Voice, ways to implement it as a cost savings to your business, the impact of the launch of Skype for business and how the progression of enterprise voice collaborative tools are changing the way we run our businesses today.

    Key Takeaways:
    •What is Lync Enterprise Voice
    •How can Lync Enterprise Voice be implemented
    •Is Skype for Business different than Lync Enterprise Voice
  • There are many decisions when choosing a video conferencing solution. Free versus subscription? Cloud solution or not? What type of video system is best suited for your meeting rooms? Join Michael Helmbrecht, VP of Product Marketing, in this webinar where he will breakdown the top five considerations of video conferencing for 2015. Michael will also elaborate on the competitive landscape and which solutions best fit your company’s needs.

    Follow us on Twitter @LifesizeHD and use the hashtag #AskLS to ask questions.
  • Course Description:

    The JUNOS EX Switching webinar is a 2.5 hour presentation offered in fast-paced delivery format. As the 4th webinar within the Jump-Start JUNOS webinar series, we will explore basic through advanced EX switching operations on the EX4200 platform. Specifically, we will detail topics such as trunking, vlans, port security, bridge table, virtual chassis, link-aggregation and others as detailed below.


    Objectives:

    At the conclusion of this webinar students will be equipped with the following:

    •Layer 2 switch interface configuration.
    •Virtual Chassis configuration.
    •VLAN implementation.
    •Port Security.
    •Link-Aggregation.
    •Spanning Tree.
    •Interface monitoring.

    Intended Audience:

    The JUNOS EX Switching webinar is designed as a “how to” webinar for JUNOS Network Engineers, NOC personnel, as well as other support staff who are responsible for JUNOS EX Switch implementation, administration and support.

    Prerequisites:

    Participants should be familiar with the JUNOS CLI and attendance of Jump-Start Fundamentals.
  • Already tasked with protecting companies from a vast domain of ever-changing threats, Chief Information Security Officers (CISOs) and other security leaders must now prepare for more avenues of attack as well as more sophisticated attackers. Research from the IBM Centre for Applied Insights pinpoints what worries today’s security leaders and what they’re doing to address those concerns. We also identify several actions that security leaders can take to help their companies manage the approaching uncertainties in information security.

    Speaker:

    Martin Borrett, Director, IBM Institute of Advanced Security in Europe

    Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, technical and architectural issues associated with security. Martin leads IBM's Security Blueprint work and is co-author of the IBM Redbooks Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security and Understanding SOA Security . He is Chairman of the European IBM Security User Group community and a member of the board of EOS, the European Organisation for Security. He is a Fellow of the British Computer Society, and a Chartered Engineer (CEng) and member of the IET. Martin has a passion for sailing and has represented Great Britain; he is also a keen tennis player.