Hi [[ session.user.profile.firstName ]]

Health IT

  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Oct 17 2019 48 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 17 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Oct 16 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • Get to the Point! Communicate More By Saying Less
    Get to the Point! Communicate More By Saying Less
    Diane DiResta Recorded: Oct 16 2019 49 mins
    Do you do most of the talking? Do you take too long to get your point across? Do you allow the conversation to go down a rabbit hole?

    Whether you’re an entrepreneur or business professional, you can’t seal the deal unless you can speak clearly and concisely. In this webinar you’ll learn:
    - how speakers and high level executives lose their audience
    - how to create a message that’s crisp
    - a mantra for keeping you on track

    When you learn to be crisp, you’ll see glazed eyes of boredom turn into raised eyebrows of interest.
  • How to enhance and manage your IoT security in a Microsoft Azure environment
    How to enhance and manage your IoT security in a Microsoft Azure environment
    James Penney, Device Authority and Ian Banham, Microsoft Recorded: Oct 16 2019 52 mins
    IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.

    While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.

    Enterprise IoT security solutions typically use owner-controlled security posture
    and need to integrate with IoT Platforms’ device and data management.

    The webinar discussion will include:

    • Challenges of building, deploying and securing IoT – on premise and in the cloud
    • A real world Automotive / Connected Car use case; the problem/challenge and the solution
    • The value of Microsoft Azure IoT together with KeyScaler
  • SMBs Market Overview and Technology Buying Trends (EMEA)
    SMBs Market Overview and Technology Buying Trends (EMEA)
    Sue Gilkes, CompTIA Faculty, CompTIA Recorded: Oct 15 2019 40 mins
    ** This is an EMEA focused webinar **

    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • API monitoring and troubleshooting in a hybrid world
    API monitoring and troubleshooting in a hybrid world
    Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoft Recorded: Oct 10 2019 34 mins
    Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.

    Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.

    Watch this live demo to learn:
    - How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
    - Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
    - How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
  • Nice to Have or Have to Have? The Case for Cyber Insurance
    Nice to Have or Have to Have? The Case for Cyber Insurance
    John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, Moderator Recorded: Oct 10 2019 59 mins
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • Key Considerations for Your Future Email Security Solution
    Key Considerations for Your Future Email Security Solution
    Cheryl Tang, Product Marketing Director Recorded: Oct 8 2019 50 mins
    The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector?

    Join Proofpoint for an educational webinar to learn:

    - What the threat landscape looks like today
    - What key capabilities you should look for to future proof your email security
    - How Proofpoint we’ve helped customers with their email security
  • Cybersecurity: Malware Mayhem (EMEA)
    Cybersecurity: Malware Mayhem (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Oct 8 2019 60 mins
    ** This is an EMEA focused webinar **

    One thing is certain: the threats facing small and medium-sized businesses keep changing.

    This webinar looks at the threats Webroot, our MSP partners, and SMB clients are experiencing and the impact to their business. The aim of this webinar is to provide threat information you can easily share with your business colleagues or managed service clients to reassure them you have the knowledge and the tools to look after their endpoints.
  • Integrating Data Protection: Risks & Benefits for Asia-Pac Solution Developers
    Integrating Data Protection: Risks & Benefits for Asia-Pac Solution Developers
    Amit Sharma, Asia-Pacific Specialty Sales - Dell Technologies OEM & Charlie Wood, Project Manager - Vanson Bourne Recorded: Oct 8 2019 34 mins
    In this co-produced webinar by Vanson Bourne and Dell Technologies, we will examine the results of a recent worldwide survey entitled the Global Data Protection Index (GDPI) and how OEM solution developers can benefit from integrating data protection.

    Among other data points, we’ll review the costs associated with downtime, compliance with government regulations, and the challenges faced in protecting newer technologies associated with Artificial Intelligence/Machine Learning, Robotics, etc. All of this will be done through both industry and geographical lenses, allowing attendees to compare their solution’s preparedness against that of their peers.
  • 9 Modern Data Warehousing Architecture Patterns and Use Cases
    9 Modern Data Warehousing Architecture Patterns and Use Cases
    Dave Wells, Director, Eckerson Vamshi Sriperumbudur, Portfolio Marketing, Informatica Recorded: Oct 3 2019 43 mins
    For successful analytics & AI initiatives, your cloud data warehouses and cloud data lakes must work together in a cohesive data management architecture. There is no one-size-fits-all solution for data management architecture. Every data warehouse is unique; thus, every modernization plan is unique. There are, however, several architectural patterns for modernization that help to shift from data warehouse and data lake silos to cohesion and compatibility between data lakes and data warehouses.

    Use these patterns individually, in combination, or as mix-and-match for multiple warehouses to develop a modernization plan and drive your analytics and AI projects:
    • Data Warehousing Outside the Data Lake
    • Data Warehousing Inside the Data Lake
    • Data Warehousing in Front of the Data Lake
    • Data Warehousing Inside & Outside the Data Lake
  • Migrate to S/4HANA with MuleSoft
    Migrate to S/4HANA with MuleSoft
    John Withers, Product Marketing Manager, MuleSoft & Jimil Patel, Product Marketing Manager, MuleSoft Recorded: Oct 3 2019 60 mins
    SAP S/4HANA represents a major step forward in enterprise resource planning (ERP) software, and with support ending in 2025 for ECC 6.0, now is the time to begin planning your migration. Traditionally, migrations are costly, complex, multi-year projects that introduce considerable risk to both IT and lines of business.

    MuleSoft’s API-led approach to S/4HANA migration uses APIs to decouple your ERP, data, and third-party systems. By doing so, you de-risk the entire process while increasing flexibility to migrate on your own terms.

    Watch this webinar, which includes a demo of Anypoint Platform, to learn how to:
    - De-risk your program by adopting best practices built directly into APIs that reduce the need for S/4HANA customization
    - Increase speed of delivery by building your migration layer and integration layer simultaneously
    - Reduce program spend by accelerating dev, test, and training processes
    - Maximize business outcomes with a flexible architecture designed for future growth
  • Infoblox #1 - Get Encrypted! Examining Emerging DNS Privacy Standard
    Infoblox #1 - Get Encrypted! Examining Emerging DNS Privacy Standard
    Paul Adair, Principal Product Manager, Infoblox; Brandon Dunlap (Moderator) Recorded: Oct 3 2019 58 mins
    DNS has always seemed to have a “last mile” security issue. Communications from a local DNS served to a client are typically unencrypted and not secure, leaving this traffic vulnerable to spoofing, hijacking and more. But privacy standards and protocols are emerging which are helping to encrypt this traffic. Join Infoblox and (ISC)2 on October 3, 2019 at 1:00PM Eastern for an examination of DNS over TLS (DoT) and DNS over HTTPS (DoH). The discussion will include the pros and cons of the two protocols, what option might make sense for your security & risk requirements and simple ways to secure your network and DNS.
  • Live Demo: Security Awareness Training
    Live Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 3 2019 28 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • TLS/SSL certificate management Best Practices
    TLS/SSL certificate management Best Practices
    Dave Corbett, Senior Manager, Sales Engineering Recorded: Oct 3 2019 42 mins
    Join DigiCert's Solutions Engineering expert Dave Corbett to uncover the 4 key phases of best-in-class TLS/SSL certificate management. During this 30-minute webinar, you will learn how to:

    - Identify your entire SSL landscape with a baseline inventory
    - Remediate and remove any weak keys, cipher suites and hashes
    - Protect your assets and prevent outages with process automation
    - Monitor your certificate suite with reliable tools and resources

    Don’t miss this opportunity to learn how to implement a robust TLS/SSL certificate management strategy, and to directly ask your questions to our subject matter expert.
  • Integrating Data Protection: Risks & Benefits for EMEA OEM Solution Developers
    Integrating Data Protection: Risks & Benefits for EMEA OEM Solution Developers
    Keith Crowley, EMEA Specialty Sales - Dell Technologies OEM & Charlie Wood, Project Manager - Vanson Bourne Recorded: Oct 3 2019 32 mins
    In this co-produced webinar by Vanson Bourne and Dell Technologies, we will examine the results of a recent worldwide survey entitled the Global Data Protection Index (GDPI) and how OEM solution developers can benefit from integrating data protection.

    Among other data points, we’ll review the costs associated with downtime, compliance with government regulations, and the challenges faced in protecting newer technologies associated with Artificial Intelligence/Machine Learning, Robotics, etc. All of this will be done through both industry and geographical lenses, allowing attendees to compare their solution’s preparedness against that of their peers.
  • 20 Questions on the CCPA with Joe Bracken, Deputy General Counsel
    20 Questions on the CCPA with Joe Bracken, Deputy General Counsel
    Joe Bracken, VP and Deputy General Counsel, Nathan Turajski, Sr. Director, Product Marketing, Recorded: Oct 2 2019 44 mins
    Personal data privacy is top of mind with massive data breaches in the news, along with new US privacy legislation taking effect. As high-profile regulation for the world’s fifth largest economy, the California Consumer Privacy Act (CCPA) starts enforcement on January 1, 2020. But how does the CCPA impact US organizations, their customers and ordinary California citizens, as well as other US States keeping a close eye with their own new rules? Unlike prior legislation that started with breach notifications, the CCPA now raises the stakes with data protection requirements and new user rights for transparency into how sensitive data is handled. Are you prepared for the CCPA?

    Watch this webinar with Joe Bracken, Informatica’s VP and Deputy General Counsel, Privacy, Products and Intellectual Property, as he answers 20 common questions that businesses and consumers alike should be asking about how the CCPA will impact them. Insights into the CCPA can help you on your journey with a data privacy governance approach to new compliance obligations and consumer rights about to take effect!
  • 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
    2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: Oct 2 2019 52 mins
    More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities?

    Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users.

    In this session we'll share:

    - Trends in volume and types of attacks, providing useful insights for both defenders and organizations
    - Refined techniques and new platforms used by attackers
    - The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond
    - The evolution of business email compromise and impostor threats
    - Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Show Me the Money
    Show Me the Money
    Bonnie Low-Kramen, International Speaker and Bestselling Author Recorded: Oct 2 2019 64 mins
    Let’s talk money. No more taboos, secrets, or stigma, just facts and strategies. We have no choice. If we keep going with the status quo, it will take 208 years to get to equality. I don’t have that kind of time, do you?

    This webinar will be a bad news/great news hour. The bad news is that the stress about money can be overwhelming. Very few women ever get formal negotiation skills training that could be applied to terms of employment. Too many women are underpaid and do not know what their role is actually worth in their market. The great news is that Bonnie Low-Kramen is determined to fix that and she has the success stories to prove she can.

    This webinar is for anyone who has a stake in today’s workplace. That means professional women, manbassadors, managers, students, human resources professionals, and recruiters. After all, real change in our workplace is going to take all of us – women and men. This webinar will be mind-opening and could be your catalyst for action.

    As the CEO of You, Incorporated, it’s time to address the financial wellbeing of your “company.” Are you ready to make the money that you deserve?
  • Disaster Recovery
    Disaster Recovery
    Jeff Gilmer Recorded: Oct 1 2019 61 mins
    If a disaster were to strike, would you be able to successfully recover your network?

    Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

    Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

    You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

    Don't wait until it's too late. Know what to expect in the event of a disaster.

    Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
  • Integrating Data Protection: Risks & Benefits for Americas Solutions Developers
    Integrating Data Protection: Risks & Benefits for Americas Solutions Developers
    Sean Phelan. Global VP Sales - Dell OEM & Charlie Wood, Project Manager - Vanson Bourne Recorded: Oct 1 2019 34 mins
    In this co-produced webinar by Vanson Bourne and Dell Technologies, we will examine the results of a recent worldwide survey entitled the Global Data Protection Index (GDPI) and how OEM solution developers can benefit from integrating data protection.

    Among other data points, we’ll review the costs associated with downtime, compliance with government regulations, and the challenges faced in protecting newer technologies associated with Artificial Intelligence/Machine Learning, Robotics, etc. All of this will be done through both industry and geographical lenses, allowing attendees to compare their solution’s preparedness against that of their peers.
  • Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Oct 22 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • Accelerate Life Sciences R&D with the Veeva Vault Connector
    Accelerate Life Sciences R&D with the Veeva Vault Connector
    Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoft Oct 24 2019 5:00 pm UTC 42 mins
    Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.

    Watch this webinar with a Veeva Vault Connector demo to learn how to:
    - Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
    - Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
    - Deliver omnichannel customer interactions with integrated customer data and digital asset management.
  • Cost & Management of Oncology Combination Regimens
    Cost & Management of Oncology Combination Regimens
    Marcia Palmer, Allen W. Becker, Anthony Chiefari, Howard Deutsch, Nicolle Hamilton, ZS Associates Oct 30 2019 2:00 pm UTC 90 mins
    Overview
    Oncology treatment increasingly involves combinations of novel oral and biologic drugs. While combo approaches aren’t new, there are significant cost implications of combining high priced innovator drugs (versus older, generic chemotherapies).

    Payers are in a difficult spot regarding the cost and management of these regimens. Traditional utilization management tools are still difficult to apply in oncology, given no payer wants to be on the front page of a major newspaper for denying treatment. Pathways have not held up to their promise for containing cost.

    Personalized medicine approaches such as biomarkers serve an important role in targeting therapy to the most appropriate patients, thereby reigning in cost. However, there are limitations in the breadth and utility of these tools. For example, PD-1/PDL-1 drugs have shown conflicting outcomes associated with receptor expression – and these drugs are the backbone for many combo regimen programs in clinical development.

    Environment/perception shifts, new approaches to management, indication-based pricing or other novel pricing approaches, and innovative payment models may hold promise for controlling cost in this new era of combination therapy.

    Focus
    Join ZS Associates for a live expert payer panel discussion on the challenges and potential solutions for managing the cost of combo oncology regimens. Topics will include:

    •Perspectives on oncology drug management and combination regimen pricing today
    •Potential payer-driven and pharma-driven solutions to price and cost management for oncology combo regimens
    •What oncology manufacturers should consider in engaging payers in the future

    The live payer webinar, co-moderated by Nicolle Hamilton, ZS Associates and Dominic Tyer, pharmaphorum, will take place on Wednesday, October 30 2019 from 14:00-15:15 GMT/10:00-11:15 ET.
  • Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Alexis Kushner, Director of Product Marketing, Salesforce and Sam Steiny, Product Marketing Manager, MuleSoft Oct 30 2019 3:00 pm UTC 44 mins
    Business efficiency is the No. 1 priority for CEOs and CIOs. In fact, 84% of IT leaders say improving employee-facing technology is critical for their company’s success.

    Join this webinar for a live demo of Salesforce Lightning Platform with MuleSoft-powered integrations. Learn how to:
    - Deliver a connected experience by integrating back-office applications and systems like Workday and Salesforce.
    - Overcome data silos, IT backlogs, and outdated development tools.
    - Modernize and automate internal processes like onboarding to improve employee experience.
  • Power Through Presence
    Power Through Presence
    Leah Marone Oct 30 2019 4:00 pm UTC 60 mins
    Stress is a normal part of life that we will continue to experience from time to time. But understanding when stress has gained too much power and is interfering with our daily functioning is critical. Are you constantly multitasking, struggling with sleep, feeling unfulfilled, experiencing symptoms of anxiety? If so, listen in to’ reset’ yourself and regain presence in your world.

    Leah Marone is a psychotherapist who specializes in anxiety, depression, relationships, and Mindfulness. By having a variety of clinical roles in various states and countries, she has developed diverse professional experience and global perspective. Currently, Leah sees individuals and families at her practice in Charlotte. She is also sought out by corporations and non-profits to work with executives and teams on improving communication, productivity and job satisfaction.
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 30 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 31 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Pharmaceutical Forensics for Safe Manufacturing and Supply
    Pharmaceutical Forensics for Safe Manufacturing and Supply
    Ravi Kalyanaraman and Jeremy Peters of BMS and Robert Heintz of Thermo Fisher Scientific Nov 6 2019 6:00 am UTC 76 mins
    Why Use Raman Microscopy for Pharmaceutical Forensics?
    by Dr. Robert Heintz, Senior Applications Specialist at Thermo Fisher Scientific

    Raman microscopy is uniquely suited for providing essential information for pharmaceutical forensic applications. The use of visible lasers allows for analysis of very small samples with spatial resolutions down to a micron or better. Materials can be analyzed in glass containers and through transparent packaging. Mapping and imaging provides information on the spatial distribution of components as well as particle sizes and shapes. Confocal operation allows for probing inside transparent materials and analyze different layers or inclusions without the need to cut or cross-section the sample. Raman microscopy is non-destructive and preserves the sample for further analysis. Raman spectra can be used not only for the conformation of expected components but also the identification of unknown contaminants or impurities. Spectral features are very sensitive to molecular structure and can be used to distinguish polymorphs and other very chemically similar materials.

    Followed by Pharmaceutical Forensics for Safe Manufacturing and Supply
    by Ravi Kalyanaraman, Director at BMS

    Pharmaceutical Investigations and Technology (PIT) is a group within Global Analytical Technology (GAT) department in the commercial Quality organization within Bristol-Myers Squibb. The PIT group has been a key part in BMS for 30 + years in providing analytical support for commercial manufacturing and in pharmaceutical forensics. This include particulate and foreign matter characterization in pharmaceutical products and screening counterfeit drugs. Several analytical tools and techniques are used by PIT to support the pharmaceutical forensics.This talk will feature all the analytical techniques used by PIT and how the results are used in resolving manufacturing issues and to protect patients from counterfeit drugs.
  • Building a platform for digital insurance
    Building a platform for digital insurance
    Ben Turner, CTO, Legal and General and Dan Snowdon, UK&I Financial Services Marketing Lead, MuleSoft Nov 6 2019 5:00 pm UTC 43 mins
    Digital insurance platforms enable insurance companies to connect with their ecosystem of customers, partners, and vendors on a single, unified platform. Hear firsthand from CTO Ben Turner how Legal and General’s digital insurance platform helped the company diversify product offerings, and scale quickly to meet customer expectations.

    Key Takeaways:
    - How industry leaders have digitally transformed insurance offerings with a platform business model.
    - How to build an integrated insurance platform to connect your ecosystem of suppliers and exceed customer expectations.
    - Best practices to increase customer retention and profitability with a single view of the customer.
  • Zeroing in on Zero Trust Network Access – Everything You Need to Know
    Zeroing in on Zero Trust Network Access – Everything You Need to Know
    Michelle Drolet, Tony Yodice Nov 6 2019 6:00 pm UTC 60 mins
    In today’s modern enterprise, the use of legacy network access solutions has resulted in both an overly complex and inevitably vulnerable perimeter. Poor networking configuration and excess visibility into the perimeter leaves organizations open to both external attack and insider threat.

    Join Michelle Drolet, CEO at Towerwall and Tony Yodice, Director of US Operations at Safe-T to learn:

    -What is Zero Trust Network Access
    -Why modern enterprises require access policies built with an identity centric approach
    -How to protect your organization from the inside out
  • Common HIPAA Violations and How To Mitigate Them
    Common HIPAA Violations and How To Mitigate Them
    24by7Security, Inc Nov 7 2019 5:00 pm UTC 60 mins
    HIPAA requirements can be mind-boggling especially with HIPAA laws constantly changing every year. Healthcare businesses of all sizes should comply with several requirements of HIPAA law. It is important to keep up to date with these changes no matter how small. Hear directly from Rema Deo, Managing Manager, Rupal Talati, Senior Security Analyst, and Parita Patel, HIPAA Security Analyst as they speak about the most common HIPAA Violations that they have experienced out on the field. With this information, you can prepare your medical practice to avoid these common failings so that you are more secure for the future.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Operational Risk Management for 2020 and Beyond
    Operational Risk Management for 2020 and Beyond
    Sam Abadir Nov 6 2019 5:00 pm UTC 60 mins
    Operational risks have been constantly increasing due to immature processes, unmanaged third parties and more. With the growing number of complex products and services, this issue is intensified, and traditional operational risk management can't keep up.

    In this live webinar, Lockpath’s Sam Abadir will share what operational risk management for 2020 and beyond looks like, including:

    • What areas operational risk management encompasses

    • How your organization can gain efficiency from proper operational risk management

    • Advantages of managing operations on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage operational risk in 2020 and beyond by attending this educational webinar. Register now!
  • Viral Safety by Design for Cell and Gene Therapy Products
    Viral Safety by Design for Cell and Gene Therapy Products
    Mark Plavsic, Chief Technology Officer at Lysogene & Archie Lovatt, Life Sciences Biosafety Scientific Director at SGS Nov 11 2019 2:00 am UTC 67 mins
    Together with product efficacy, product safety is an essential characteristic of any medicinal product including cell and gene therapy (C&GT) biologics. Adventitious agents (viruses, bacteria, mycoplasma, prions, etc) pose constant risk to these biologics, and, as such they may impact directly product and patient safety. It is therefore of supreme importance to intentionally (by design) employ effective measures across the whole C&GT product manufacturing process to mitigate risk of adventitious agents. This presentation will review various interconnected steps throughout the manufacturing process, from the raw materials to the fill and finish, that would, in concert, help mitigate the risk while providing a high degree of product safety by design.
  • Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics (EMEA)
    Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Nov 11 2019 11:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    This webinar will provide expert insights on the latest cybercriminal activity, highlighting the year's most innovative, dangerous, and pervasive instances of malware.

    Specifically, we will be covering the developments including information theft, Emotet, BEC scams, ransomware, targeted attacks, and more. Come learn about these developments and strategies to help secure your organisation from ransomware and next-generation cyberthreats.
  • Live Demo: Advanced People-Centric Cybersecurity
    Live Demo: Advanced People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Nov 12 2019 6:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Aging and Dental Health
    Aging and Dental Health
    Joy Poskozim, DDS Nov 13 2019 5:00 pm UTC 60 mins
    In this webinar, Joy Poskozim joins Bobbie Carlton for a fireside chat about the connection between aging and dental health.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Nov 14 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Anypoint Platform for iPaaS: Support your cloud connected business
    Anypoint Platform for iPaaS: Support your cloud connected business
    Kevin Balaji, Product Marketing Manager at MuleSoft Nov 14 2019 6:00 pm UTC 26 mins
    Anypoint Platform, the most scalable iPaaS solution, gives users the power to integrate apps, data, and devices at lightning speed whether you are tech-savvy or a low-tech integrator. Designed specifically with the enterprise in mind, this fully cloud-based solution takes advantage of the elasticity of the cloud while providing a secure connection to on-premises systems.

    See first-hand how Anypoint Platform’s market-leading platform for eiPaaS allows you to easily integrate on-premises systems to any SaaS application within on unified platform.

    In this webinar, we’ll demonstrate how to:
    - Integrate account data from Salesforce to MySQL database using Anypoint Flow Designer, the no-code, guided web interface capability for delivering integrations
    - Easily build a bi-directional sync, leveraging templates within Anypoint Exchange to handle enterprise grade volumes with batch processing and set up integration tests using MUnit
    - Apply out-of-the-box tokenization policies to sensitive data in transit, and validate security formats within Anypoint Runtime Manager
    - Monitor your application network’s health using dashboards within Anypoint Monitoring and quickly resolve issues with Anypoint Visualizer
  • Biopharmaceutical Process Model Evolution – Enabling Process Knowledge Continuum
    Biopharmaceutical Process Model Evolution – Enabling Process Knowledge Continuum
    Saly Romero-Torres, PhD, of Biogen and David Lovett & John Mack of Perceptive Engineering Nov 15 2019 3:00 pm UTC 90 mins
    Full Title: Biopharmaceutical Process Model Evolution – Enabling Process Knowledge Continuum from an Advanced Process Control Perspective

    Presented by Saly Romero-Torres, PhD, Senior Manager, Advanced Data Analytics, Biogen

    Biogen is adopting modeling maturity models similar to the ones used by high tech industries such as semiconductors, electronics and AI. The focus of this maturity model is to ensure that a plan for model evolution is conceived, and socialized, among SMEs and regulatory agencies early on during process development. This plan is crucial particularly when implementing data driven models that rely on process experience. A well-planned modeling continuum should allow the pharmaceutical industry to realize the benefits from modeling activities early on, while evolving into more mature prescriptive controllers that operate within Established Conditions (EC) and are potentially implemented through Post-Approval Change Management Protocols (PACMPs).

    Followed a Presentation by David Lovett, Managing Director & John Mack, Engineering Director at Perceptive Engineering
  • FedRAMP compliant cloud-based integration
    FedRAMP compliant cloud-based integration
    Kevin Flanagan, Public Sector Marketing at MuleSoft and Jay Fielding, Principal Solutions Consultant at MuleSoft Nov 19 2019 3:00 pm UTC 43 mins
    While a growing number of government-adopted applications are in the cloud, the underlying technologies connecting these applications are still based on-premise. MuleSoft is excited to introduce Government Cloud, the industry-leading FedRAMP-authorized environment for cloud-based integration. In this live demo, we’ll walk through the latest Anypoint Platform features included in the Government Cloud environment, as well as best practices to get started.

    In this webinar, we’ll cover:
    -Top integration use cases in government IT.
    -How government IT can solve common outdated middleware challenges with Government Cloud.
    -A demo of our new Government Cloud and additional benefits when deploying, managing and monitoring APIs and integrations from a FedRAMP secure environment.
  • 2019 Cybersecurity Trends (EMEA)
    2019 Cybersecurity Trends (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Nov 19 2019 4:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    As we near the end of 2019, we’ll take a look at some of the most pressing and prevalent threat trends from another busy year in cybercrime.

    This webinar promises to be a sneak peek at some of the developments sure to be covered in the 2020 Webroot Threat Report, so don’t miss it.

    We will update the key topics to be discussed closer to the date.
  • Monitoring Impurities in Biologics
    Monitoring Impurities in Biologics
    Diane McCarthy, PhD, Senior Scientific Liaison, Global Biologics, US Pharmacopeia  Nov 26 2019 3:00 pm UTC 90 mins
    The complexity of biotherapeutic products and their manufacturing processes can yield a variety of impurities, which must be monitored and controlled to minimize safety concerns and ensure product quality. These impurities can be broadly grouped into two categories: 1) product-related impurities, such as precursors, aggregates and degradation products, and 2) process-related impurities, such as host cell DNA, host cell protein, and particulates.  This presentation will provide an overview of approaches for monitoring impurities, including a discussion of existing USP standards and standards under development to support impurity testing.

    Presented by Diane McCarthy, PhD, Senior Scientific Liaison, Global Biologics, US Pharmacopeia 

    Dr. McCarthy is a Senior Manager, Science and Standards within USP’s Global Biologics Department. Diane works with stakeholders to identify areas where standards are needed and define and develop new standards. Prior to joining USP, Dr. McCarthy was Senior Scientific Director at Caprion Biosciences, where she focused on the use of mass spectrometry for characterization of biologics and host cell proteins. Her previous roles also included Director of Scientific Affairs at Ezose Sciences, where she focused on identification and quantitation of glycans by mass spectrometry and Global Manager, Biomarker Research Center, at Bio-Rad Laboratories, where she directed translational and biomarker research contracts and collaborations with industry, key consortia, academic, and government groups.
  • Personal Style Coaching
    Personal Style Coaching
    Allison Hamilton-Rohe, Founder and CEO at DailyOutfit Nov 27 2019 5:00 pm UTC 60 mins
    Allison Hamilton-Rohe, Founder and CEO of DailyOutfit, will outfit us with the information on how personal style can prime us to become the best version of ourselves and propel our purpose forward. Her evidence-based talk showcases how we all can use the latest research on embodied cognition, positive psychology, and color theory to improve your results and better your outcomes. After this webinar, walk away knowing how you can set yourself up for your own definition of success.

    DailyOutfit is a styling consulting company that empowers women to find their personal style. Allison attended Cornell and the Fashion Institute of Technology.