Hi [[ session.user.profile.firstName ]]

Health IT

  • Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Plan the Work & Work the Plan – Continuing the Move to the Cloud Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr, Tech Ops, (ISC)2; Brandon Dunlap, Moderator Recorded: Feb 15 2018 58 mins
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.
  • Achieving Compliance Agility with a Harmonized Controls Framework
    Achieving Compliance Agility with a Harmonized Controls Framework Lynn Heiberger - Unified Compliance; Sam Abadir - Lockpath Recorded: Feb 15 2018 60 mins
    In our uncertain regulatory climate, it’s essential for compliance to remain flexible. One way to achieve this is by implementing a harmonized controls framework. In this webinar, Lockpath and Unified Compliance will explore the growing need for harmonized controls and how this type of controls framework can bring agility to compliance--a necessity in a time of regulatory uncertainty.

    Attendees will learn:
    • The concept and reasons for using a single controls framework
    • How one organization quickly addressed updated regulatory guidance using a harmonized controls framework
    • How to achieve compliance agility with harmonized controls and an integrated risk management platform
  • How To Achieve Single Pane of Glass Performance Management
    How To Achieve Single Pane of Glass Performance Management John Worthington,Director of Product Marketing, eG Innovations Recorded: Feb 14 2018 56 mins
    Achieving a single pane of glass for performance management has been an elusive goal, as organizations are faced with an increasingly complex mix of legacy, virtual and cloud technologies, as well as emerging operating models and evolving roles/skillsets.

    But, monitoring the performance of digital business services demands more than visibility to just the end user experience, applications, or the underlying infrastructure. It requires an ability to automatically anticipate and isolate performance issues across a heterogeneous mix of technologies, devices and suppliers.

    Digital business services are how end users experience IT, and that is how IT services must be managed. Achieving unified performance management will continue to be elusive until all stakeholders are aligned with this approach.

    Join this webinar, as John Worthington, Director of Product Marketing at eG innovations, details some best practices for achieving the single pane of glass vision. Attendees will receive the related White Paper, "Best Practices for Achieving Transparency in Digital Business Services Monitoring".

    In this webinar, you will:
    -Learn how monitoring can be leveraged in continuous improvement and other transformative change programs
    -See how converged APM/IPM can accelerate achievement of a single point of glass for performance monitoring
    -Identify some best practices you can apply for achieving unified monitoring and improving organizational transparency
  • State of the Market: IT Spending Review and Outlook
    State of the Market: IT Spending Review and Outlook Stephen Minton Recorded: Feb 14 2018 56 mins
    In this IDC web conference, Stephen Minton will review the latest ICT spending data and leading economic indicators for ICT budget trends and new 3rd Platform technologies, alongside updated market sizing and forecasts from the IDC Worldwide Black Book, answering questions such as:

    • How has the technology market performed so far in 2018, and how have forecasts for 2019-2022 changed as a result?
    • What impact will economic trends have on IT spending over the next 5 years, and what are the main downside risks to the outlook?
    • Which new technologies are experiencing the fastest growth in emerging markets, and which geographies are set to emerge as global leaders beyond 2020?
    • How quickly are tech budgets moving from traditional IT deployments to the 3rd Platform of cloud, mobile and new technologies such as IoT and robotics?
    • What does the expansion of the ICT industry and the emergence of new categories mean for traditional tech vendors and buyers?
  • Vendor Risk Management with the Lockpath Keylight Platform
    Vendor Risk Management with the Lockpath Keylight Platform Lockpath Recorded: Feb 9 2018 2 mins
    Keylight from Lockpath empowers you to manage the entire third-party lifecycle in one platform.
  • March of the Bots: How to Deal with the Onslaught
    March of the Bots: How to Deal with the Onslaught Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator) Recorded: Feb 8 2018 60 mins
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers. On February 8, 2018 at 1:00PM Eastern, Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
  • Business Continuity Management with the Lockpath Keylight Platform
    Business Continuity Management with the Lockpath Keylight Platform Lockpath Recorded: Feb 5 2018 2 mins
    Create detailed, up-to-date business continuity and disaster recovery plans for business interruptions all in one platform with Keylight from Lockpath.
  • Strains of CEO Fraud: Urgent Request for W-2s - Fireside Chat with TruthInIT
    Strains of CEO Fraud: Urgent Request for W-2s - Fireside Chat with TruthInIT Erich Kron CISSP, Security Awareness Advocate Recorded: Jan 30 2018 53 mins
    Soon the news will be packed with W-2 phishing and CEO fraud, also known as "Business Email Compromise" attacks. The cost of these attacks against organizations totaled over 5.3 billion dollars.

    Each year the U.S. Internal Revenue Service warns about these scams where internet criminals successfully combine W-2 and CEO fraud schemes, targeting a much wider range of organizations than ever before.

    What's next and how can you protect your organization? Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, for our Truth in IT webinar “Strains Of CEO Fraud: Urgent Request for W-2s”. We will look at scary features of the new blended and current threats of W-2 phishing and CEO fraud, give actionable info that you need to prevent infections, and what to do when you are hit.
  • IoT Insights: The IoT and Smart Transportation
    IoT Insights: The IoT and Smart Transportation Satish Ram, IoT Planning & Product Strategy, Dell Recorded: Jan 30 2018 7 mins
    In this 10 minute overview, learn how the industrial IoT is disrupting the transportation industry, what this means for your business, and how our transportation customers are successfully leveraging the IIoT to gain a competitive edge.
  • Developing the New IT Capabilities for Digital Transformation
    Developing the New IT Capabilities for Digital Transformation Joseph Pucciarelli, Group Vice President, IDC's IT Executive Programs Recorded: Jan 30 2018 38 mins
    By 2022, IDC forecasts that 80% of enterprise revenue growth will depend directly on digital offerings and operations. To benefit from this growth opportunity, IT and business leaders of the enterprise must prepare by building up the correct capabilities.

    During this session, you will learn new IT capabilities (processes, platforms, talent, governance) needed for digital transformation, and walk away with the three critical digital strategies many organizations are pursuing: experiential engagement, data monetization, and digital business at scale.

    Key Questions Addressed:
    • What technology management strategies and practices should IT organizations adopt as digital business capabilities are requested by the various business units?
    • What is a technology capability, and how is it different than IT's existing implementation models?
    • How should CIOs and technology leaders begin their own technology capabilities journey?

    Who Should Attend:
    • Chief Information Officers, and their direct reports
    • Chief Technology Officers
    • Chief Digital Officers
    • Senior IT and business executives
    • Digital innovation leaders
  • A New Approach to IT Risk Identification
    A New Approach to IT Risk Identification Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 30 2018 24 mins
    Risk management often takes on different forms throughout the business. Some approaches are very strategically focused, some are very technology focused and some are even missing. During this webinar, LockPath’s Sam Abadir will discuss how IT departments can identify risks in a way that is not only meaningful to their operations but also meaningful to other parts of the business. Abadir will talk about how this approach not only improves risk management but also makes IT a more valued part of the business.
  • Counter the Careless Click, Tools to Help You Train Your Users
    Counter the Careless Click, Tools to Help You Train Your Users Erich Kron CISSP, Security Awareness Advocate Recorded: Jan 25 2018 36 mins
    Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of decreasing the cost of a data breach.*

    Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization.

    Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.

    Erich will cover:

    * Current threat landscape
    * Top 5 tips for security awareness
    * How to easily create your security awareness program
    * Outlining how and where tools are helpful

    * Based on recent research by the Ponemon Institute
  • Thrive in the DX Era with Data Services for Hybrid Cloud
    Thrive in the DX Era with Data Services for Hybrid Cloud Ritu Jyoti and Robert Westervelt Recorded: Jan 25 2018 54 mins
    This IDC Web Conference will feature data highlights from the inaugural IDC Worldwide Data Services for Hybrid Cloud Forecast. Every vertical industry is now seeing the impact of digital transformation (DX). In DX, data is core as every change and process relies on converting data into actionable insights. And the leading digital organizations are discovering that the cloud – in terms of its power to deliver agility and flexibility in data management and faster time to insights – is indispensable for achieving their DX business objectives.

    IDC's Ritu Jyoti and Robert Westervelt will discuss the latest trends in hybrid/multicloud deployments, proliferation of application deployment models and data formats across hybrid IT, associated data management challenges, and how data services for hybrid cloud can help organizations gain a competitive edge and thrive in the DX era.
  • OCC 2018 Part 3: Change Management to Address New Regulations
    OCC 2018 Part 3: Change Management to Address New Regulations Sam Abadir, Director of Product Management, LockPath Recorded: Jan 25 2018 31 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • The Picture Perfect Future of the US Medical Imaging Industry
    The Picture Perfect Future of the US Medical Imaging Industry Frost & Sullivan Transformational Health Team, Shannon Werb, vRad Recorded: Jan 23 2018 62 mins
    The US medical imaging industry is transforming to cope with the challenges of the present and the demands of the future. The current care provision landscape is highly fragmented, and a coherent strategy is required to enhance interoperability among stakeholders across the imaging ecosystem. Stakeholders across the industry must also come together to eliminate redundancies and duplications, and streamline the imaging process, to improve the patient experience.
  • Using GRC to Tackle Operational Risk Management
    Using GRC to Tackle Operational Risk Management Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 23 2018 39 mins
    Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management program. Practitioners identify how daily managed activities and external events impact strategic goals, value creation, and operations. Managing operational risk can be challenging, in part, because of the inability to fully understand how risk impacts value.

    In this fast-paced webinar, LockPath’s Sam Abadir shares current ORM trends and challenges, Lockpath’s ORM maturity model and how a governance, risk management, and compliance (GRC) processes can address ORM.

    Specifically, you’ll learn about the following:

    • A practical guide to ORM processes, including current trends and challenges
    • The impact of daily managed activities and external events on overall business operations and strategic goals
    • One organization that uses a GRC solution to conduct ORM and create value
    • How a GRC platform can help you avert crisis and embrace risk
  • The Converging Worlds of Big Data and IoT
    The Converging Worlds of Big Data and IoT Chuck Yarbrough, Pentaho VP of Solutions Management & Marketing Recorded: Jan 22 2018 39 mins
    IoT has the potential to change the competitive landscape and drive transformation that leads to new business models. However, much of the machine-generated data collected today is not fully exploited or even used. Watch this presentation to learn about marrying big data together with machine data to realize your full IoT potential.
  • Data Science 101
    Data Science 101 Arik Pelkey, Pentaho Senior Director of Product Marketing and Scott Cooley, Pentaho Sales Engineer Recorded: Jan 22 2018 37 mins
    Watch this session to learn the basics of data science, including the data science process, how data scientists think and do their best work, and how to attract and retain data scientists. The session will also cover basic data science terminology, types of algorithms, and technologies for different use cases so you can work more productively with your data science teams.
  • Data Explorer - Inspect, Visualize, and Collaborate from any PDI Step
    Data Explorer - Inspect, Visualize, and Collaborate from any PDI Step Ben Hopkins, Pentaho Senior Product Manager Recorded: Jan 22 2018 33 mins
    Data Explorer enables PDI users to visualize data at any point in their PDI pipelines to better spot inconsistent or missing data, making sure that the analytics they provide to analysts is right the first time around. We’ll walk through the basic features of Data Explorer, review its main use cases, and demonstrate how it can be used to both inspect data and rapidly publish prototype analytic sets for business users to consume in PUC without physically staging the data.
  • The Future of IoT
    The Future of IoT Don DeLoach, Co-Chair, Midwest IoT Council Recorded: Jan 22 2018 37 mins
    Watch this presentation to learn about the progression of the IoT market, highlighting the evolution from early closed-loop message response-based IoT-enabled products towards the establishment of the IoT-enabled enterprise. In particular, session will explore the role of
    data primacy and governance and strategies for effectively leveraging the utility value of IoT data as the key ingredient for maximum leverage and insight.
  • Understanding the Big Data Technology Ecosystem
    Understanding the Big Data Technology Ecosystem Mark Burnette, Pentaho Director Sales Engineering Recorded: Jan 22 2018 42 mins
    This presentation covers how data architecture modernization involves many emerging technologies. Understanding the ecosystem of big data technologies can help organizations improve data processing and performance. This session will cover various big data technologies as they pertain to data volume, variety, velocity, and latency.
  • The Auditor's Perspective: An Insider's Guide to Regulatory Compliance
    The Auditor's Perspective: An Insider's Guide to Regulatory Compliance Divya Jeyachandran, Sr. Manager - Payments, Cloud & Technology, Coalfire Recorded: Jan 18 2018 46 mins
    Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.

    Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.

    Topics covered:

    Overview of common compliance requirements
    Best practices for preparing for and demonstrating compliance
    Keys to overcoming challenges in your on-premises and cloud environments
    How a unified security toolset can greatly simplify this process


    Hosted By
    Divya Jeyachandran
    Sr. Manager - Payments, Cloud & Technology, Coalfire
    Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Recorded: Jan 18 2018 59 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • Forecasting 2018: An insider’s look to the future of IoT — a webinar
    Forecasting 2018: An insider’s look to the future of IoT — a webinar Aeris Communications Recorded: Jan 16 2018 64 mins
    With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.

    Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.

    “SIM providers are going away. It’s just a matter of when.”
    —Drew Johnson, VP Engineering & Operations, Aeris

    “Automotive transformation via the IoT will become mainstream.”
    —Michelle Avary, VP, Automotive Strategy, Aeris

    “With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
    —Dr. Rishi Mohan Bhatnagar, President, Aeris India

    “Security will have to up its game as IoT delivers huge volumes of data.”
    —Syed “Z” Hosain, Chief Technology Officer, Aeris

    My prediction: This will be the only IoT futuristic view you will need to attend this year!

    Sign up now for this futuristic view into the future of IoT.
  • From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st
    From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st Wesley Simpson, MSM, COO, (ISC)² Recorded: Jan 16 2018 49 mins
    (ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
  • Need to judge your product? Use HPTLC to get insights into sample composition
    Need to judge your product? Use HPTLC to get insights into sample composition Melanie Broszat, PhD CAMAG, Muttenz, Switzerland & Michaela Oberle Merck KGaA, Darmstadt, Germany Feb 20 2018 8:00 am UTC 75 mins
    Thin-Layer Chromatography has been a well-known method for analysis of botanicals and other complex samples since the end of the 1930s. Today’s modern thin-layer chromatography combines the advantage of analytical robustness and high sample throughput with the possibility to use all kind of specific detection methods, e.g. classical UV/Vis/Fluorescence detection, mass spectrometry or effect-directed analysis. This method increases the amount of information for a fast and efficient screening for new compounds and the identification of raw materials especially for samples with a high matrix load such as herbal drugs, cosmetic and food samples.
    HPTLC, the most advanced form of Thin-Layer Chromatography, is a powerful yet simple and cost effective tool for testing identity, purity, and strength (content) of botanicals as well as excluding adulteration during quality control. With the publication of general chapters by the United States Pharmacopoeia (USP ) and European Pharmacopoeia (Ph.Eur. 2.8.25) HPTLC has officially come into existence as a highly standardized and therefore reproducible analytical technique. The use of high performance plates, suitable instrument and software, a standardized methodology, and validated methods ensures reliable results that are fully compliant with current Good Manufacturing Practice (cGMP). HPTLC fingerprints allow convenient visual comparison of multiple samples even if those originate from different plates (and different laboratories worldwide). Reference images (HPTLC fingerprints of botanical reference materials or other references) can be used to qualify data and pass/fail samples based on similarity or difference.
    We will give you an overview about the versatility of HPTLC, applicable to many of your analytical tasks. Don’t miss the chance to extend your knowledge!
  • Need to judge your product? Use HPTLC to get insights into sample composition-S2
    Need to judge your product? Use HPTLC to get insights into sample composition-S2 Melanie Broszat, PhD CAMAG, Muttenz, Switzerland & Michaela Oberle Merck KGaA, Darmstadt, Germany Feb 20 2018 3:00 pm UTC 75 mins
    Thin-Layer Chromatography has been a well-known method for analysis of botanicals and other complex samples since the end of the 1930s. Today’s modern thin-layer chromatography combines the advantage of analytical robustness and high sample throughput with the possibility to use all kind of specific detection methods, e.g. classical UV/Vis/Fluorescence detection, mass spectrometry or effect-directed analysis. This method increases the amount of information for a fast and efficient screening for new compounds and the identification of raw materials especially for samples with a high matrix load such as herbal drugs, cosmetic and food samples.
    HPTLC, the most advanced form of Thin-Layer Chromatography, is a powerful yet simple and cost effective tool for testing identity, purity, and strength (content) of botanicals as well as excluding adulteration during quality control. With the publication of general chapters by the United States Pharmacopoeia (USP ) and European Pharmacopoeia (Ph.Eur. 2.8.25) HPTLC has officially come into existence as a highly standardized and therefore reproducible analytical technique. The use of high performance plates, suitable instrument and software, a standardized methodology, and validated methods ensures reliable results that are fully compliant with current Good Manufacturing Practice (cGMP). HPTLC fingerprints allow convenient visual comparison of multiple samples even if those originate from different plates (and different laboratories worldwide). Reference images (HPTLC fingerprints of botanical reference materials or other references) can be used to qualify data and pass/fail samples based on similarity or difference.
    We will give you an overview about the versatility of HPTLC, applicable to many of your analytical tasks. Don’t miss the chance to extend your knowledge!
  • Internet of Things: Market Spending and Trend Outlook for 2018 and Beyond
    Internet of Things: Market Spending and Trend Outlook for 2018 and Beyond Marcus Torchia, Research Manager, Customer Insights & Analysis, IDC, and Carrie MacGillivray, VP IoT & Mobility, IDC Feb 22 2018 4:00 pm UTC 60 mins
    The Internet of Things marches relentlessly toward a ubiquitous future as it becomes the underpinning of many 3rd platform technologies. Organizations are beginning to move beyond pilot deployments to realize the promise of the IoT.. Along this journey, technology adoption and the investment horizon is moving fast and hindered only by the speed of business change. In this webinar, we will share market insights on expectations about technology adoption from the field, key insights on the spending landscape and IoT buyer sentiment.
  • 2018 Frost & Sullivan Predictions and Outlook for Digital Health
    2018 Frost & Sullivan Predictions and Outlook for Digital Health Daniel Ruppar, Global Program Director, Analysts from Frost & Sullivan's Global Digital Health Team Feb 22 2018 4:00 pm UTC 60 mins
    Expert Insights You Will Not Want to Miss:

    • Hear market predictions from world-renowned analysts
    • Learn areas of growth and controversy for 2018 in digital health and health IT
    • Discussions on hot areas including AI, Digital Therapeutics and Blockchain
    • Movements of major ICT and Technology companies in their Healthcare strategy
    • Understand the critical vendors to watch for this year
  • How to Buy a GRC Platform
    How to Buy a GRC Platform Adam Billings - Principal Consultant, Lockpath Feb 22 2018 5:00 pm UTC 60 mins
    Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

    In this webinar, you will discover:

    • How to assess your organization and determine what type of platform is right for you
    • What questions to ask when evaluating GRC vendors
    • Tips for building a business case for a GRC platform and estimating potential ROI

    In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
  • The One Man SOC - How Unified Security Management Simplifies Threat Detection
    The One Man SOC - How Unified Security Management Simplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Feb 22 2018 5:00 pm UTC 75 mins
    With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.

    Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.

    In this webcast, we'll cover:

    Essential security capabilities that all IT teams should have, regardless of size
    Challenges of integrating and maintaining multiple security tools
    How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
    A demo of how AlienVault Unified Security Management speeds threat detection and incident response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • The Pulse of Outsourcing 2H 2017: IDC's Semiannual Look at Rolling 4-Quarter Dea
    The Pulse of Outsourcing 2H 2017: IDC's Semiannual Look at Rolling 4-Quarter Dea David Tapper and Xiao-Fei Zhang, IDC Global Services Markets and Trends Feb 22 2018 5:00 pm UTC 60 mins
    In this IDC Web conference, outsourcing analysts David Tapper and Xiao-Fei Zhang will leverage IDC's BuyerPulse Services Deals Database to provide an analysis and assessment of outsourcing deals based on a rolling 4-quarter view from Q3 2015 through Q4 2017. The analysis will better enable service providers to pursue key markets, incorporate strategic capabilities, and ensure that they are optimally positioned.
  • Transformation of Business using Containers, Orchestration & Digital Initiatives
    Transformation of Business using Containers, Orchestration & Digital Initiatives Paul Nashawaty, Director of Product Marketing, DataCore Software Feb 22 2018 7:00 pm UTC 45 mins
    Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.

    In this webinar you'll discover how to:
    • Use containers for digital initiatives
    • Maintain the desired application state and manage persistent storage
    • Maximize your IT investments by leveraging existing infrastructure
    • Automate and integrate your infrastructure

    Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
  • Ransomware Hostage Rescue Guide
    Ransomware Hostage Rescue Guide Erich Kron CISSP, Security Awareness Advocate Feb 26 2018 7:00 pm UTC 60 mins
    2017 was a Ransomware nightmare. If you've been in the IT trenches over the past year, you've probably noticed that ransomware attacks are accelerating, damages are more severe and there is no end in sight for 2018

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and advise what to do when you are hit with ransomware.

    Erich will cover these topics:

    * What are new scary ransomware features in the wild?
    * I’m infected, now what?
    * Proven methods of protecting your organization
    * Why the “human firewall” is so effective
  • Everything You Need to Know About Critical Healthcare Segments
    Everything You Need to Know About Critical Healthcare Segments Sanjeev Kumar (Industry Manager), Natasha Gulati (Industry Manager), Siddharth Shah (Industry Analyst) Feb 27 2018 6:30 am UTC 120 mins
    Frost & Sullivan is forecasting another year of disruptions in critical healthcare segments such as diabetes care, smart hospitals, healthcare cloud computing and digital pathology. This webinar will focus on these industries along with insights on key trends influencing the healthcare system, followed by a live question-and-answer session.

    Join Us to Gain Insights on:

    • Future paradigms in diabetes care and harnessing evolutionary trends to improve the quality of life for diabetics
    • Understanding the smart hospital concept and identifying relevant applications and growth opportunities
    • Healthcare cloud computing trends, such as global provider spending on cloud solutions approaching $10 billion by 2021
    • Growth opportunities in the global digital pathology market
  • How To Avoid Downtime While Using 100% Commodity Hardware
    How To Avoid Downtime While Using 100% Commodity Hardware Sander Puerto, Sr. Technical Account Manager DataCore Software Feb 28 2018 5:30 pm UTC 45 mins
    Businesses lose productivity, revenue and resources during unplanned outages. To prevent unexpected downtime, many organizations are searching for solutions that can provide business continuity without breaking their budgets.

    What if you were able to achieve both goals while utilizing your existing commodity hardware? How would this benefit your customers and improve productivity?

    Join this webinar and we will show you:
    - How to keep 2 active copies of your data, even if your disks are from different vendors
    - An economical way to deploy existing x86 servers for business continuity
    - Ways to keep your hosts and applications running, even if you lose one of your SANs
    - How to cluster your preexisting Hypervisors using local disks for high availability
  • Digital Transformation with the Microsoft Cloud
    Digital Transformation with the Microsoft Cloud James Phillips, Microsoft, Judson Althoff, Microsoft Mar 6 2018 8:00 pm UTC 75 mins
    In this session, learn about Microsoft’s vision and strategy for helping companies transform, about Microsoft’s own digital transformation, as well as that of innovative customer Otis Elevator Company. You’ll see impactful demonstrations illustrating innovative use cases in sales, service, and marketing, including insight on our partnership with Adobe and LinkedIn and how that’s changing the way companies work.
  • Roadmap to Smarter Compliance & Policy Management
    Roadmap to Smarter Compliance & Policy Management Sam Abadir - VP of Industry Solutions, Lockpath Mar 8 2018 5:00 pm UTC 60 mins
    In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.

    Attendees will learn:

    • What compliance and policy management encompasses
    • Communication strategies for working with cross-functional teams
    • How organizations are bringing automation to manual processes
    • Low-hanging fruit for quick wins and ideas for sustained growth

    The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.
  • Blockchain: Market Spending and Trend Outlook for 2018 and Beyond
    Blockchain: Market Spending and Trend Outlook for 2018 and Beyond Stacey Soohoo, Research Manager and Bill Fearnley, Research Director, Worldwide Blockchain Strategies Mar 13 2018 6:00 pm UTC 60 mins
    The future of blockchain remains promising, and as enterprises move along their journey of technology adoption to keep up with accelerating digital transformation, technology suppliers' futures also seem bright. In this web conference, analysts from IDC's Customer Insights & Analysis will review key market insights on blockchain spending trends, how it will affect technology buyers, and the impact it will have on the IT supplier.
  • CISO Perspective: How to Prepare for GDPR
    CISO Perspective: How to Prepare for GDPR Sacha Dawes, Principal Product Marketing Manager, AlienVault Mar 15 2018 4:00 pm UTC 60 mins
    The GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018 and requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organization will need to start planning now to achieve compliance and mitigate the risk of high fines for failing to comply.

    That's where AlienVault can help. In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault has approached the GDPR compliance process internally, along with how our Unified Security Management (USM) platform can help accelerate and simplify your path to compliance.

    Join this webcast to learn:

    - Best practices for approaching GDPR compliance
    - How to assess your level of readiness and build your roadmap to compliance
    - How a unified security toolset can both expedite and simplify this process

    We'll also provide a brief demo of the USM platform to illustrate some of the technical controls you need in place TODAY for compliance.

    Hosted By
    Sacha Dawes
    AlienVault Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • When the Hunted Becomes the Hunter – How to be a Threat Hunter
    When the Hunted Becomes the Hunter – How to be a Threat Hunter Scott Taschler, Crowdstrike; Brandon Dunlap (Moderator) Mar 15 2018 5:00 pm UTC 75 mins
    Organizations of all sizes continue to be targets of cyber criminals and the threats that they present. However, some organizations are taking a proactive approach and are hunting for these threats. But what exactly is “threat hunting"? How does it fit into the SOC? Should my organization be threat hunting? How could it help us? Do I leverage outide expertise to augment my staff? Join Crowdstrike and (ISC)2 on March 15, 2018 at 1:00PM Eastern to learn how to go from being a guppy to a shark by exploring these questions and an examine the resources needed to threat hunt and the tools that can be employed to be successful.
  • How can pharma support a more collaborative NHS through STPs and ACSs?
    How can pharma support a more collaborative NHS through STPs and ACSs? Stephen Dorrell, NHS Confederation, James Roach, Accountable Care Partnership, Essex Andrew Smith, Cobic, Steve Jowett, IQVIA Mar 21 2018 12:30 pm UTC 60 mins
    Is your company prepared for the changes in the NHS, and is it aware of pharma’s potential to play a leading role in transforming services?

    Over the last few years, the government has been trying to reshape the NHS by making it more responsive to the health needs of regional populations. By dividing England’s NHS into 44 Sustainability and Transformation Partnerships (STPs), policymakers hoped to promote new care models by forging links between NHS, councils and other stakeholders.

    These are now evolving into Accountable Care Systems (ACSs), involving closer collaboration between the key players, including the private sector and pharma. This system change has been controversial, with critics saying that it is tantamount to privatisation by the back door. But champions of ACSs say that it can improve governance and commissioning outcomes and create a health system that is matched to the population it serves.

    This IQVIA/pharmaphorum webinar gives an update on the latest developments and asks how pharma can be a catalyst for change at a time when the NHS is under immense pressure to cut costs and become more efficient.

    Watch this interactive digital debate and:
    •Learn more about the STP/ACS model of delivery
    •Find out what is needed to set them up successfully
    •Discover the role of data in delivering STP/ACS models
    •Understand the importance of STP/ACS models for pharma
  • Roadmap to Smarter IT Risk Management
    Roadmap to Smarter IT Risk Management Sam Abadir - Lockpath Apr 5 2018 4:00 pm UTC 60 mins
    The latest data breach or vulnerability may capture headlines and prompt speculation, but where the rubber meets the road is being smarter about IT risk management (ITRM). In this webinar, you'll learn what being wiser entails, including:

    · What IT and security disciplines ITRM encompasses
    · How to tailor your ITRM message to different departments
    · Strategies for working with cross-functional teams
    · Advantages and disadvantages of using spreadsheets
    · Quick wins and ideas for sustained growth

    Don't wait for a breach or a vulnerability to get smarter about ITRM. Learn what you need to know to get where you're going. Register for this webinar.