Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.
An intro to AlienVault USM
How to identify prospects quickly with a simple set of questions
How to sell the benefits of USM for easier and faster threat detection
Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:
Common security challenges for the mid-market
Considerations when selecting security vendor partners and ensuring a profitable practice
Operational, financial, and process considerations that are key to a successful MSSP
Essential skills critical to build successful MSSPs
Solutions, business resources, tools, and programs available to enable the success of an MSSP
In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.
In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.
Attend this Webchat and you will also learn:
The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.
Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.
In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:
The five vital technology tools you need to run an effective security practice
A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
Current threats and how they are evolving
Comprehensive threat protection for the cloud
Unified security for detecting threats and responding to incidents
Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.
In this session you'll learn about key findings from this survey including:
The predominant driver for organizations to consider managed security services
The most critical capabilities organizations look for in MSSPs
The most requested security services offered by MSSPs
Key benefits respondents have achieved by partnering with an MSSP
Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
In regulated industries, such as Financial Services, Government and Healthcare, forms and signatures are critical components of enrolment and onboarding interactions. Yet most services still rely on forms and signatures that function poorly on mobile—the very place most consumers spend their time. Creating and updating high volumes of forms in a timely manner can also be a huge challenge.
Join us to learn how Adobe Experience Manager Forms and Adobe Sign can help transform complex forms-based transactions into streamlined and compliant experiences that accelerate business and deliver better customer service.
In this webinar, learn how to:
•Provide an end-to-end digital form filling and signing experience across any channel
•Integrate e-signatures across the document process with Adobe Sign and Adobe Experience Manager integration
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.
- What core security capabilities you need to demonstrate compliance
- The top challenges in meeting and maintaining compliance with PCI DSS
- Best practices to help you plan and prepare for an audit
- How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
Network threats and data breaches continue to grow in number, sophistication and speed, overwhelming current defensive capabilities. Security teams, limited in staff, resources and time, suffer from diminished effectiveness and enterprise protection. To stay ahead, organizations must create an adaptive ecosystem of network defenses; much like the body leverages its immune system. A Defense Lifecycle Model speeds threat identification and mitigation by incorporating machine learning and artificial intelligence into these security processes. Join Gigamon and (ISC)2 on August 10, 2017 at 1:00PM Eastern for a discussion on automated prevention, detection, prediction and containment and how it can help to fortify your defense.
Having an agile, enterprise hybrid cloud platform that lets you leverage cloud compute, storage, or both and keep data where it makes the most sense—without lofty storage costs, latency, and security concerns.
In this webinar, you’ll learn how organizations with complex IT environments like the Cancer Center harness hybrid cloud environments to simplify data storage and management, and improve both security and performance. Find out how Avere and Amazon Web Services (AWS) provide hybrid cloud solutions that can eliminate roadblocks and open opportunities to more efficiently meet the needs of your users and customers.
Dirk Petersen, Scientific Computing Director, Cancer Research Center
Jeff Tabor, Sr. Director of Product Marketing, Avere Systems
Ian Scofield, Solutions Architect, Amazon Web Services
Next-generation sequencing (NGS) has emerged as a key technology to deliver the next level of healthcare solutions. While the $1,000 genome was achieved in 2015, Frost & Sullivan predicts the $100 genome to be possible by 2024. The significant dip in cost of extracting genetic data has led to the creation of massive genomic data volumes that are expected to be some of the largest data sets globally by 2025, exceeding data generated by YouTube and Twitter.
We all have data - tons of data. We have data like personal family photos and critical enterprise databases. It’s a scary time for data. Whether it’s personal data or critical enterprise data - it’s being held hostage by evil attackers from around the world. Ransomware is running rampant and it’s our job to protect it. But how?
In this Ransomware Defense 101 webinar we’ll be joined by one of the most respected ransomware experts in the industry today. CISSP and veteran security expert Erich Kron of KnowBe4 will answer the most common ransomware defense questions, tell you what you need to know to protect your organization, like creating a “human firewall” as your last line of defense.
Turn your provider directory into an asset, not a liability.
Comprehensive provider data combined with analytics can yield actionable business insights to help you improve member satisfaction and financial performance. You can track patients’ health, physician performance towards shared savings goals and understand network and attribution patterns. You can also see referral patterns and practice variations, benchmark physicians’ performance on cost and quality measures to help you improve member health and your financial performance.
This session will explore the evolving use of consumerism practices and using advanced analytics to understand provider data and to impact satisfaction, retention, and outcomes.
Participants will learn how to:
- Link your provider directory to your CRM, allowing you to expand members’ profiles and provide more personalized experiences
- Use an intuitive and user-friendly member portal and dynamic content to enhance the user experience when searching for providers and educational material, which will encourage members to share additional details for better resource alignment
- Integrate an online scheduling tool and telehealth virtual visits for greater member convenience and to improve outcomes
- Identify high-performing providers using a combination of provider data and other data sources (e.g., claims)
- Enable monitoring and prediction of provider performance via cost/quality metrics to ensure adherence to value-based agreements.
- Ensure network adequacy by comparing provider locations to population distribution
John Hurd - Go to Market Lead, Provider Data Management Solutions, NTT DATA Services
Liz Peters - Go to Market Lead, Customer Relationship Management Solutions, NTT DATA Services
Karen Way - Go to Market Lead, Business Intelligence & Analytics Solutions, NTT DATA Services
Jeff Rivkin - Research Director, Payer IT Strategies, IDC Health Insights
Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.
About the speaker:
Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.
During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
This session will familiarize investigators with the connection between healthcare fraud schemes and financial crimes, and fraud’s increasing importance in organized crime. This webinar will examine case study examples and provide effective techniques for detecting, preventing and responding to healthcare fraud, as well as practical advice for leveraging law enforcement partnerships in support of identification and recovery of misappropriated assets.
Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.
In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.
If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.
Identity and Access Management can enable higher ed IT teams to boost security, increase automation, and ship new applications quickly. But it's not uncommon for legacy IAM investments to slow down technology projects across campus, and overwhelm the IT team with new operations and maintenance.
In this moderated panel discussion, Ce Cole Dillon, former CIO of Chicago State University, and Nadav Benbarak, Head of Education Solutions at Okta, discuss:
-Core higher education IAM use cases and requirements
-Challenges posed by legacy solutions
-How Identity-as-a-Service helps higher ed IT teams solve IAM once and for all
1. The kidney proximal tubule is the primary site of drug-induced nephrotoxicity. I will describe the development of a 3-dimensional flow-directed proximal tubule microphysiological system (MPS). The kidney MPS recapitulates the synthetic, metabolic and transport activities of kidney proximal tubule cells. This MPS is as an ideal platform for ex vivo modeling of nephrotoxicity. Towards this goal, we have evaluated nephrotoxicity in response to challenge with multiple toxicants, including the heavy metal pollutant cadmium, antisense oligonucleotides, the antibiotic polymyxin B and the Chinese herbal product aristolochic acid. We believe that MPS technologies will have major impacts on predictive toxicity testing and human risk assessment. Animal and in vitro systems do not always faithfully recapitulate drug and xenobiotic responses in the clinic or occupational/environmental exposures, respectively. MPS technologies will refine safety assessment and reduce our need for surrogate animal testing. An ultimate goal is to create integrated human MPS organ systems that could replace animal models.
2. Nortis has developed a technology that is used to recapitulate functional units of human organs in microfluidic devices (chips). Such organ models include vasculature, kidney, and liver models for toxicology studies, blood-brain barrier models for drug transport studies, and vascularized tumor microenvironment models for drug efficacy studies.
2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.
In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.
Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide, Part 2”. We will look at recent infections, give actionable info that you need to prevent infections, and cover what to do when you are hit with ransomware.
Digital transformation is driving a need for OEMs to address key concerns — agility, scalability, flexibility, simplicity and automation. Dell EMC’s next generation of PowerEdge servers meets those concerns head-on with an end-to-end portfolio of scalable, virtualized, software-defined and converged solutions on a common server platform capable of running any application, from traditional to native cloud applications (NCA). With Dell EMC PowerEdge servers, you can build your vision of a digitally transformed infrastructure with secure, worry-free solutions.
Join us to find out about the results of the 2017 Multichannel Maturometer. The ninth version of this industry-renowned survey illuminates some of the big changes sweeping through the Pharma industry, as well as highlighting some trends which are still lagging.
Questions which will be answered include:
• Is senior leadership still on the fence for digital?
• Marketing budgets – how are they changing?
• How satisfactory are those in the industry finding digital offerings?
Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?
In a word, CHAOS!
That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.
Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
• Abstracts away the underlying complexity of storage infrastructure
• Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
Digital health brings a diverse range of growth opportunities for vendors across the value chain. As the space evolves we have experienced a multitude of stepwise successes and stellar failures, yet funding continues to flood the sector. Major moves continue to come into the industry from the broader vendor environment, underlining the importance of health in everyone’s lives and progressively in strategic interests of the C-Suite across the ecosystem. Join Frost & Sullivan in this webinar update showcasing different facets of the market, and learn why there’s something for everyone in digital health.
Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.
Attendees will learn:
- What are the obstacles getting in the way of achieving digital transformation?
- Strategies to end the misalignment of business and IT on digital initiatives
- A roadmap to closing the IT delivery gap
Across Europe, a shift towards greater prevention, earlier diagnosis and treatment is needed in order to contain the growing cost of healthcare.
But how can healthcare systems make this transition – and how do pharmaceutical companies play a role in this, while also growing their market?
A forthcoming webinar hosted by pharmaphorum with sponsor PHOENIX group looks at how harnessing the data and expertise of pharmacies, and via greater engagement with patients, consumers and shoppers can meet this emerging need.
•Industry: how can pharma switch from treating a disease to earlier health management?
The role of preventative medicine, vaccines and early diagnosis explored
•The role of community pharmacies in prevention and health – increasing screening and diagnosis rates and facilitating appropriate medication
•How point of sale information in pharmacies can help generate a picture of patient groups and individuals. How loyalty card schemes support OTC and consumer spending patterns, which illuminate health needs, prescription patterns and purchasing behaviour
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be, without encountering firewall issues accessing their desktop.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.
Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
- What threat intelligence is, and how it speeds threat detection and incident response
- Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
- How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
- A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
The Geisinger Health Plan cares for over 500,000 members in Northeast and Central Pennsylvania. During this webinar, you’ll learn how their team uses the Informatica Platform to build enterprise solutions for data quality and data governance while also broadly supporting their journey to modernizing their data management competencies. You’ll discover both strategic and tactical considerations for leveraging capabilities from the Informatica Intelligent Data Platform to meet your goals, including discussion of industry best practices, design concepts for governance organizations and the development of core technical competencies. You’ll also hear about lessons learned and innovative approaches directly from the experts at Geisinger.
Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.
About the Speaker: Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.