Hi [[ session.user.profile.firstName ]]

Health IT

  • Top Cyber Security Trends for 2017 Top Cyber Security Trends for 2017 Amichai Shulman, CTO and Co-Founder, Imperva Jan 19 2017 6:00 pm UTC 60 mins
    CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

    Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

    · What top 3 cyber security trends will have the largest impact in 2017
    · Why cyber attacks are on the rise and multiplying quickly
    · How to combat the increasing number of breaches
    · What to consider in building a security plan that is right for your organization
  • Visibility and Security - Two Sides of the Same Coin Visibility and Security - Two Sides of the Same Coin Cricket Liu, Exec VP, Infoblox; Dan York, CISSP, DNS Sec Prog Mgr, Internet Society; Dave Lewis, Global Sec Advocate, Akamai Jan 19 2017 6:00 pm UTC 75 mins
    You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
  • Multicellular Tumor Spheroids in HTS: New Assays Multicellular Tumor Spheroids in HTS: New Assays Wojciech Senkowski Jan 25 2017 3:00 pm UTC 60 mins
    Three-dimensional cell cultures, and multicellular tumor spheroids in (MCTS) in particular, have recently become a widely used tool for preclinical anticancer drug testing in high-throughput screening (HTS) setup. However, even though MCTS have been applied for HTS, their use has been limited to simple assays, such as assessing cell viability or inhibition of growth.

    This webinar will cover new approaches to MCTS-based HTS. It will present a new, robust viability assay, well-suited for HTS and based on green fluorescent protein (GFP) used as a surrogate marker of spheroid viability. It will also review a first-ever approach to obtain information-rich transcriptomic data from drug-treated MCTS on a large scale. In addition, the presenter will demonstrate how this novel platform resulted in the identification of previously unrecognized, context-dependent drug responses of cancer cells and in findings with potential clinical relevance.

    In summary, this webinar will demonstrate new ways of how MCTS-based HTS can be used to provide unique insights into context-dependent biology and cellular drug responses.

    About the Presenter:

    Wojciech Senkowski will soon complete his Ph.D. in Medical Sciences at Uppsala University, Sweden. In his work, he looks for applications of various tumor spheroid models in high throughput drug screening. For his work, Wojciech has received the AACR Scholar-in-Training Award. He was also a presenter and expert panelist at the Genetic Engineering & Biotechnology News webinar on 3D cell cultures, sponsored by Corning in February of 2016.
  • Billion-dollar Growth Opportunities in the Global Healthcare Industry by 2025 Billion-dollar Growth Opportunities in the Global Healthcare Industry by 2025 Transformational Health Team: Reenita Das, Venkat Rajan, Siddharth Shah Jan 25 2017 4:00 pm UTC 60 mins
    The healthcare industry is undergoing rapid transformation. By 2025, the healthcare ecosystem is expected to look drastically different from today. In 2025, global trends of aging populations, rising chronic disease prevalence and urbanization are bound to further strain healthcare systems already grappling with issues of healthcare access, quality, and cost. In response, new business models are expected to emerge to address the needs of the future. In order to make the most gains, stakeholders must successfully leverage this transformation.
  • Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Dr. Lance Cottrell; Dominique Kilman; Aamir Lakhani; Brandon Dunlap Jan 26 2017 6:00 pm UTC 75 mins
    Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
  • 2017 Frost & Sullivan Predictions in Digital Health 2017 Frost & Sullivan Predictions in Digital Health Daniel Ruppar, Nancy Fabozzi, Victor Camlek, Koustav Chatterjee Jan 31 2017 4:00 pm UTC 60 mins
    Over the past decade, the adoption of digital solutions has increased significantly throughout the healthcare industry. This exceptionally strong growth trajectory is expected to continue into the foreseeable future as U.S. healthcare organizations transform to meet the demand for more efficient, clinically integrated and decentralized care systems that serve empowered, technologically-savvy consumers who strongly value convenience and personalization.
  • CA Briefings Part 6: Step 4: Governance and Tying it all Together CA Briefings Part 6: Step 4: Governance and Tying it all Together CA Technologies and (ISC)2 Feb 9 2017 6:00 pm UTC 75 mins
    Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On February 9, 2017, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.
  • How do you Decide Whom to Biopsy for Prostate Cancer? How do you Decide Whom to Biopsy for Prostate Cancer? Dr. E. David Crawford Feb 17 2017 12:00 am UTC 60 mins
    In our webinar, Identifying Men with Significant Prostate Cancer—The Role of phi and Other Biomarkers, Dr. E. David Crawford will discuss key issues that challenge a physician's ability to make informed decisions regarding whom to biopsy for prostate cancer. After the webinar, you will be able to:

    • Understand the historical perspective and controversy regarding prostate-specific antigen (PSA) screening

    • Improve your interpretation of a PSA result

    • Use biomarkers, such as Prostate Health Index (phi), to reduce negative biopsies and have more confidence in the decision to biopsy

    • Understand how the phi score, combined with family and patient history, can determine patient management decisions

    Dr. Crawford is an internationally renowned urologist and distinguished endowed professor of surgery, urology and radiation oncology. He also serves as the head of the section of urologic oncology at the University of Colorado Anschutz Medical Campus in Aurora, Colorado. Dr. Crawford received his medical degree from the University of Cincinnati. His postgraduate training included an internship and residency in urology at the Good Samaritan Hospital in Cincinnati. He subsequently completed a genitourinary cancer fellowship at the University of California Medical Center in Los Angeles.
  • Reducing server densities & ensuring a consistent user experience Reducing server densities & ensuring a consistent user experience Olivier Favre, Director of Product Management Feb 23 2017 6:00 pm UTC 30 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities. Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.
    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.
    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Brandon Dunlap (Moderator) Feb 23 2017 6:00 pm UTC 75 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • Analytical Strategies for Comparability in Bioprocess Development Analytical Strategies for Comparability in Bioprocess Development Christine P. Chan, Ph.D Mar 28 2017 2:00 pm UTC 75 mins
    Comparability exercises are commonly required at certain milestones during drug development as well as after product registration when changes are implemented into the manufacturing process. The goal is to evaluate if the product remains highly similar (not necessarily identical) before and after the change in terms of quality and stability and have no adverse impact on safety and efficacy predicted for the patients. This assessment requires product-specific knowledge gathered through drug development, taking a totality-of-evidence approach. The different levels of information are obtained from analytical studies for characterization of the molecule, animal studies for toxicity, pharmacokinetics and pharmacodynamics for pharmacological activities, and clinical studies for safety/tolerability, immunogenicity and efficacy. This Webinar discusses strategies and considerations for analytical characterization of protein structure and function which forms the foundation of the comparability demonstration.
  • Illuminator: Your window on Industry Benchmarks Illuminator: Your window on Industry Benchmarks Jan Keuppens,( VP Integrated Execution, Across Health) and Christophe Brock, (Senior Consultant , Across Health) Apr 19 2017 3:00 pm UTC 60 mins
    1- Which channels create engagement amongst your target audience?
    2- Why should we increase or decrease investment in (under)leveraged channels?
    3- How do you perform against the industry average?
    4- How does this all differ per country, target audience, specialty, message type & stage of product lifecycle?