Hi [[ session.user.profile.firstName ]]

Health IT

  • AlienVault Partner Program: An Intro to AlienVault USM
    AlienVault Partner Program: An Intro to AlienVault USM Mike LaPeters, VP Global Channel Sales & Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 60 mins
    Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.

    An intro to AlienVault USM
    How to identify prospects quickly with a simple set of questions
    How to sell the benefits of USM for easier and faster threat detection
  • How to Grow and Accelerate your Managed Security Business
    How to Grow and Accelerate your Managed Security Business Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 33 mins
    Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:

    Common security challenges for the mid-market
    Considerations when selecting security vendor partners and ensuring a profitable practice
    Operational, financial, and process considerations that are key to a successful MSSP
    Essential skills critical to build successful MSSPs
    Solutions, business resources, tools, and programs available to enable the success of an MSSP
    In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
  • Threat Intelligence: The MSP’s Secret Weapon
    Threat Intelligence: The MSP’s Secret Weapon Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 34 mins
    One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.

    In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.

    Attend this Webchat and you will also learn:

    The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
    The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
    Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
    and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
  • A Step-By-Step Guide to Building a Profitable Security Practice
    A Step-By-Step Guide to Building a Profitable Security Practice Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 33 mins
    As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.

    Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.

    In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:

    The five vital technology tools you need to run an effective security practice
    A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
    A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 17 2017 35 mins
    Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.


    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:

    Current threats and how they are evolving
    Comprehensive threat protection for the cloud
    Unified security for detecting threats and responding to incidents
  • Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre
    Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre Garrett Gross Director, Field Enablement Recorded: Aug 17 2017 55 mins
    Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.

    In this session you'll learn about key findings from this survey including:

    The predominant driver for organizations to consider managed security services
    The most critical capabilities organizations look for in MSSPs
    The most requested security services offered by MSSPs
    Key benefits respondents have achieved by partnering with an MSSP

    Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
  • How to Modernise Enrolment and Onboarding Experiences
    How to Modernise Enrolment and Onboarding Experiences Mark Greenaway, Digital Media Director, Adobe Recorded: Aug 17 2017 40 mins
    In regulated industries, such as Financial Services, Government and Healthcare, forms and signatures are critical components of enrolment and onboarding interactions. Yet most services still rely on forms and signatures that function poorly on mobile—the very place most consumers spend their time. Creating and updating high volumes of forms in a timely manner can also be a huge challenge.

    Join us to learn how Adobe Experience Manager Forms and Adobe Sign can help transform complex forms-based transactions into streamlined and compliant experiences that accelerate business and deliver better customer service.

    In this webinar, learn how to:
    •Provide an end-to-end digital form filling and signing experience across any channel
    •Integrate e-signatures across the document process with Adobe Sign and Adobe Experience Manager integration
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Aug 15 2017 59 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.

    We'll cover:
    - What core security capabilities you need to demonstrate compliance
    - The top challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
  • Scaling Up Network Security: Shifting Control Back to the Defenders
    Scaling Up Network Security: Shifting Control Back to the Defenders Shehzad Merchant, CTO, Gigamon; Mat Gangwer, CTO, Rook Security; Paulo Shakarian, ASU; Brandon Dunlap (Moderator) Recorded: Aug 10 2017 60 mins
    Network threats and data breaches continue to grow in number, sophistication and speed, overwhelming current defensive capabilities. Security teams, limited in staff, resources and time, suffer from diminished effectiveness and enterprise protection. To stay ahead, organizations must create an adaptive ecosystem of network defenses; much like the body leverages its immune system. A Defense Lifecycle Model speeds threat identification and mitigation by incorporating machine learning and artificial intelligence into these security processes. Join Gigamon and (ISC)2 on August 10, 2017 at 1:00PM Eastern for a discussion on automated prevention, detection, prediction and containment and how it can help to fortify your defense.
  • Building a World-Class Hybrid Cloud Infrastructure with AWS
    Building a World-Class Hybrid Cloud Infrastructure with AWS Dirk Petersen (Cancer Research Center), Jeff Tabor (Avere), Ian Scofield (AWS) Recorded: Aug 9 2017 43 mins
    Having an agile, enterprise hybrid cloud platform that lets you leverage cloud compute, storage, or both and keep data where it makes the most sense—without lofty storage costs, latency, and security concerns.

    In this webinar, you’ll learn how organizations with complex IT environments like the Cancer Center harness hybrid cloud environments to simplify data storage and management, and improve both security and performance. Find out how Avere and Amazon Web Services (AWS) provide hybrid cloud solutions that can eliminate roadblocks and open opportunities to more efficiently meet the needs of your users and customers.

    Presenters:
    Dirk Petersen, Scientific Computing Director, Cancer Research Center
    Jeff Tabor, Sr. Director of Product Marketing, Avere Systems
    Ian Scofield, Solutions Architect, Amazon Web Services
  • NGS: New Business Models in Diagnostics and Drug Development
    NGS: New Business Models in Diagnostics and Drug Development Frost & Sullivan Transformational Health Team, Dr. Misha Kapushesky,Genestack CEO and Dr. Elia Stupka,Boehringer Ingelheim Recorded: Aug 9 2017 58 mins
    Next-generation sequencing (NGS) has emerged as a key technology to deliver the next level of healthcare solutions. While the $1,000 genome was achieved in 2015, Frost & Sullivan predicts the $100 genome to be possible by 2024. The significant dip in cost of extracting genetic data has led to the creation of massive genomic data volumes that are expected to be some of the largest data sets globally by 2025, exceeding data generated by YouTube and Twitter.
  • Ransomware Defense 101
    Ransomware Defense 101 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Aug 3 2017 56 mins
    We all have data - tons of data. We have data like personal family photos and critical enterprise databases. It’s a scary time for data. Whether it’s personal data or critical enterprise data - it’s being held hostage by evil attackers from around the world. Ransomware is running rampant and it’s our job to protect it. But how?

    In this Ransomware Defense 101 webinar we’ll be joined by one of the most respected ransomware experts in the industry today. CISSP and veteran security expert Erich Kron of KnowBe4 will answer the most common ransomware defense questions, tell you what you need to know to protect your organization, like creating a “human firewall” as your last line of defense.
  • Provider Data Evolution
    Provider Data Evolution John Hurd (NTT DATA), Liz Peters (NTT DATA), Karen Way (NTT DATA), Jeff Rivkin (IDC Health Insights) Recorded: Aug 2 2017 55 mins
    Turn your provider directory into an asset, not a liability.

    Comprehensive provider data combined with analytics can yield actionable business insights to help you improve member satisfaction and financial performance. You can track patients’ health, physician performance towards shared savings goals and understand network and attribution patterns. You can also see referral patterns and practice variations, benchmark physicians’ performance on cost and quality measures to help you improve member health and your financial performance.

    This session will explore the evolving use of consumerism practices and using advanced analytics to understand provider data and to impact satisfaction, retention, and outcomes.

    Participants will learn how to:

    - Link your provider directory to your CRM, allowing you to expand members’ profiles and provide more personalized experiences
    - Use an intuitive and user-friendly member portal and dynamic content to enhance the user experience when searching for providers and educational material, which will encourage members to share additional details for better resource alignment
    - Integrate an online scheduling tool and telehealth virtual visits for greater member convenience and to improve outcomes
    - Identify high-performing providers using a combination of provider data and other data sources (e.g., claims)
    - Enable monitoring and prediction of provider performance via cost/quality metrics to ensure adherence to value-based agreements.
    - Ensure network adequacy by comparing provider locations to population distribution

    Speakers
    John Hurd - Go to Market Lead, Provider Data Management Solutions, NTT DATA Services

    Liz Peters - Go to Market Lead, Customer Relationship Management Solutions, NTT DATA Services

    Karen Way - Go to Market Lead, Business Intelligence & Analytics Solutions, NTT DATA Services

    Jeff Rivkin - Research Director, Payer IT Strategies, IDC Health Insights
  • Integrating Network Analytics Into Your Security Architecture
    Integrating Network Analytics Into Your Security Architecture Jon Oltsik, Senior Principal Analyst at ESG Jeff Costlow, Director of Security at ExtraHop Networks Recorded: Aug 2 2017 59 mins
    Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Tara Callan, Marketing Manager, DataCore Software Recorded: Aug 1 2017 30 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Recorded: Jul 27 2017 41 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • Healthcare Fraud Driving Organized Crime: Examining Sources of Illicit Income
    Healthcare Fraud Driving Organized Crime: Examining Sources of Illicit Income Erin Picton, AHFI, Investigations Manager, and Mark Starinsky, Service Delivery Manager, General Dynamics Health Solutions Recorded: Jul 26 2017 56 mins
    This session will familiarize investigators with the connection between healthcare fraud schemes and financial crimes, and fraud’s increasing importance in organized crime. This webinar will examine case study examples and provide effective techniques for detecting, preventing and responding to healthcare fraud, as well as practical advice for leveraging law enforcement partnerships in support of identification and recovery of misappropriated assets.
  • Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare
    Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare Nathan Rain, Group Manager of MDM, BJC Healthcare; Prash Chandramohan, Informatica; & David Lyle, Informatica Recorded: Jul 26 2017 61 mins
    Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.

    In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.

    If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
  • Beyond Superior Care Quality—How Can APAC Hospitals Become Truly Patient Centric
    Beyond Superior Care Quality—How Can APAC Hospitals Become Truly Patient Centric Frost & Sullivan, Gabe Rjipma,Microsoft, Dr. Timothy Low, Farrer Park Hospital, David Vu, GE Healthcare Asia-Pacific Recorded: Jul 26 2017 61 mins
    Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.
  • Using Identity & Access Management for Better App Security & Automation
    Using Identity & Access Management for Better App Security & Automation Nadav Benbarak, Head of Education Solutions, Okta; Ce Cole Dillon, Former CIO, Chicago State University Recorded: Jul 25 2017 61 mins
    Identity and Access Management can enable higher ed IT teams to boost security, increase automation, and ship new applications quickly. But it's not uncommon for legacy IAM investments to slow down technology projects across campus, and overwhelm the IT team with new operations and maintenance.
     
    In this moderated panel discussion, Ce Cole Dillon, former CIO of Chicago State University, and Nadav Benbarak, Head of Education Solutions at Okta, discuss:

    -Core higher education IAM use cases and requirements
    -Challenges posed by legacy solutions
    -How Identity-as-a-Service helps higher ed IT teams solve IAM once and for all
  • 3D Nephrotoxicity applications & Nortis’ microfluidic organ-on-chip technology
    3D Nephrotoxicity applications & Nortis’ microfluidic organ-on-chip technology Dr. Ed Kelly, Dr. Henning Mann Recorded: Jul 25 2017 97 mins
    1. The kidney proximal tubule is the primary site of drug-induced nephrotoxicity. I will describe the development of a 3-dimensional flow-directed proximal tubule microphysiological system (MPS). The kidney MPS recapitulates the synthetic, metabolic and transport activities of kidney proximal tubule cells. This MPS is as an ideal platform for ex vivo modeling of nephrotoxicity. Towards this goal, we have evaluated nephrotoxicity in response to challenge with multiple toxicants, including the heavy metal pollutant cadmium, antisense oligonucleotides, the antibiotic polymyxin B and the Chinese herbal product aristolochic acid. We believe that MPS technologies will have major impacts on predictive toxicity testing and human risk assessment. Animal and in vitro systems do not always faithfully recapitulate drug and xenobiotic responses in the clinic or occupational/environmental exposures, respectively. MPS technologies will refine safety assessment and reduce our need for surrogate animal testing. An ultimate goal is to create integrated human MPS organ systems that could replace animal models.

    2. Nortis has developed a technology that is used to recapitulate functional units of human organs in microfluidic devices (chips). Such organ models include vasculature, kidney, and liver models for toxicology studies, blood-brain barrier models for drug transport studies, and vascularized tumor microenvironment models for drug efficacy studies.
  • Ransomware Hostage Rescue Guide: Part 2 of 2
    Ransomware Hostage Rescue Guide: Part 2 of 2 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Jul 21 2017 62 mins
    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.

    In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.

    Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide, Part 2”. We will look at recent infections, give actionable info that you need to prevent infections, and cover what to do when you are hit with ransomware.
  • Meet the next generation of Dell EMC OEM PowerEdge appliances
    Meet the next generation of Dell EMC OEM PowerEdge appliances David Pennington, VP Global Sales & Jared Wilson, Entrerprise Product Manager Dell EMC OEM Solutions Recorded: Jul 21 2017 59 mins
    Digital transformation is driving a need for OEMs to address key concerns — agility, scalability, flexibility, simplicity and automation. Dell EMC’s next generation of PowerEdge servers meets those concerns head-on with an end-to-end portfolio of scalable, virtualized, software-defined and converged solutions on a common server platform capable of running any application, from traditional to native cloud applications (NCA). With Dell EMC PowerEdge servers, you can build your vision of a digitally transformed infrastructure with secure, worry-free solutions.
  • Multichannel Maturometer 2017 results: Key global trends
    Multichannel Maturometer 2017 results: Key global trends Fonny Schenck (CEO, Across Health) and Dirk Szynka (MD Across Health Germany) Recorded: Jul 20 2017 48 mins
    Join us to find out about the results of the 2017 Multichannel Maturometer. The ninth version of this industry-renowned survey illuminates some of the big changes sweeping through the Pharma industry, as well as highlighting some trends which are still lagging.
    Questions which will be answered include:

    • Is senior leadership still on the fence for digital?
    • Marketing budgets – how are they changing?
    • How satisfactory are those in the industry finding digital offerings?
  • Bring Order to Chaotic Storage Management with Software-defined Storage
    Bring Order to Chaotic Storage Management with Software-defined Storage Sushant Rao Senior Director WW Product Marketing DataCore Software & Bill Hansen Sr. Product Manager & Product Planner Lenovo Aug 22 2017 6:00 pm UTC 60 mins
    Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?

    In a word, CHAOS!

    That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.

    Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
    • Abstracts away the underlying complexity of storage infrastructure
    • Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning
    Shoring up Your Defenses by Leveraging Analytics and Machine Learning Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM Aug 24 2017 5:00 pm UTC 75 mins
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Digital Health Markets Update: From AI to Zzzs - What Comes Next?
    Digital Health Markets Update: From AI to Zzzs - What Comes Next? Daniel Ruppar, Global Program Director - Digital Health Aug 29 2017 5:00 pm UTC 60 mins
    Digital health brings a diverse range of growth opportunities for vendors across the value chain. As the space evolves we have experienced a multitude of stepwise successes and stellar failures, yet funding continues to flood the sector. Major moves continue to come into the industry from the broader vendor environment, underlining the importance of health in everyone’s lives and progressively in strategic interests of the C-Suite across the ecosystem. Join Frost & Sullivan in this webinar update showcasing different facets of the market, and learn why there’s something for everyone in digital health.
  • The CIO's Guide to Digital Transformation Strategy
    The CIO's Guide to Digital Transformation Strategy Davinder Gautam, Managing Director, Accenture; Ross Mason, Founder and VP Product Strategy, MuleSo Aug 30 2017 4:00 pm UTC 60 mins
    Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.

    Attendees will learn:

    - What are the obstacles getting in the way of achieving digital transformation?
    - Strategies to end the misalignment of business and IT on digital initiatives
    - A roadmap to closing the IT delivery gap
  • Pharma and proactive, preventative healthcare: how to use the pharmacy channel
    Pharma and proactive, preventative healthcare: how to use the pharmacy channel Andrew McConaghie (moderator), John Munson, Nemanja Jankovic and Nina Felton Sep 6 2017 1:00 pm UTC 75 mins
    Across Europe, a shift towards greater prevention, earlier diagnosis and treatment is needed in order to contain the growing cost of healthcare.
    But how can healthcare systems make this transition – and how do pharmaceutical companies play a role in this, while also growing their market?
    A forthcoming webinar hosted by pharmaphorum with sponsor PHOENIX group looks at how harnessing the data and expertise of pharmacies, and via greater engagement with patients, consumers and shoppers can meet this emerging need.
    •Industry: how can pharma switch from treating a disease to earlier health management?
    The role of preventative medicine, vaccines and early diagnosis explored
    •The role of community pharmacies in prevention and health – increasing screening and diagnosis rates and facilitating appropriate medication
    •How point of sale information in pharmacies can help generate a picture of patient groups and individuals. How loyalty card schemes support OTC and consumer spending patterns, which illuminate health needs, prescription patterns and purchasing behaviour
  • 浮遊系細胞培養用シングルユースシステム
    浮遊系細胞培養用シングルユースシステム コーニングインターナショナル株式会社 ライフサイエンス事業部 石渡孝至 Sep 12 2017 6:00 am UTC 75 mins
    抗体ワクチンやウイルス産生のラボスケールから、治験薬製造スケールまでの浮遊系細胞培養用シングルユース製品の導入ポイントについて概説いたします。

    近年、バイオ医薬品開発に於けるシングルユース製品の市場が活況を呈しております。抗体ワクチン、幹細胞/ヒトiPSや浮遊系細胞による製剤化やバイオバンキン グを具現化する際に、最も大きな懸案事項となりますのが“質”、“量”そして“コスト”の問題があります。そこでコーニングでの安全、安価かつ簡便なシングルユース製品の特徴や仕様についてご紹介致します。
     また治験薬に向けた品質規格や導入事例によるマーケットトレンドを示しながら、トータルソリューションシステムの振盪培養(フラスコ、べセル、バッグ)、チュービング&コネクション(閉鎖系システム、無菌接続)、パッケージング(培養 / 回収 / 凍結保存)および品質規格(施設環境、BSE/TSE、発熱物質(Pyrogen)、USPクラス6規格準拠 / 滅菌保証レベル / エンドトキシン規格 / QC試験)について概説します。
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Yuli Mikolenko, Solutions Architect, Teradici Sep 14 2017 5:00 pm UTC 30 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be, without encountering firewall issues accessing their desktop.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • How Smart Security Teams Use Cyber Threat Intelligence
    How Smart Security Teams Use Cyber Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault Sep 19 2017 5:00 pm UTC 60 mins
    As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.

    Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
    - What threat intelligence is, and how it speeds threat detection and incident response
    - Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
    - How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
    - A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
  • Geisinger Health: Architecting for Data Quality and Governance
    Geisinger Health: Architecting for Data Quality and Governance Patrick Gies, Enterprise Architect, Geisinger Health Plan & Thomas Brence, Director of Product Marketing, Informatica Sep 27 2017 5:00 pm UTC 60 mins
    The Geisinger Health Plan cares for over 500,000 members in Northeast and Central Pennsylvania. During this webinar, you’ll learn how their team uses the Informatica Platform to build enterprise solutions for data quality and data governance while also broadly supporting their journey to modernizing their data management competencies. You’ll discover both strategic and tactical considerations for leveraging capabilities from the Informatica Intelligent Data Platform to meet your goals, including discussion of industry best practices, design concepts for governance organizations and the development of core technical competencies. You’ll also hear about lessons learned and innovative approaches directly from the experts at Geisinger.
  • Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance
    Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys Oct 11 2017 6:00 pm UTC 60 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speaker: Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.