Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.
Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
Wael Elrifai shares his experience working in the IoT and AI space; covering complexities, pitfalls, and opportunities to explain why innovation isn’t just good for business—it’s a societal imperative.
For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.
Attendees will learn:
* A definition of exclusion risk with real-world examples
* Challenges encountered with managing exclusion risk
* Strategies for implementing a consistent, repeatable review process
* Technology's role in streamlining exclusion risk management
Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
With 3rd Platform technologies, hospitals are entering an era when operations, processes, and technology are tightly linked to patients and other providers. Hospital boundaries blur, thereby triggering collaboration between sectors to enable a true integrated and personalized care service delivery model. Hospital managers (CEO, CIO, CMO) are challenged to move their enterprises to the next level — that of digital business transformation — implementing digital solutions, new business models, and innovation initiatives.
But how is it done in real life? The Region of Southern Denmark has an enterprise wide adopted solution that include hospitals, GPs, Municipalities and regional authorities and they are happy to share their knowledge, experience and good ideas with you! During the webinar, the presenters will discuss and analyses:
•What are the steps to be taken to effectively design, acquire and implement a digital collaboration and data integration platform in healthcare?
•What are the challenges you may face in an integrated care and tele medicine project?
•What are the effect and clinical outcomes when data sharing is a reality and not just a vision?
The rise of mobile devices and apps, not to mention the involvement of non-medical technology players, is creating a wave of irrevocable digital change for medtech.
It’s transforming how the sector reaches and engages with its stakeholders and customers, and in doing so provides vital opportunities to reshape a company’s commercial model.
But although the sector can lay claim to some key success stories with digital technology, there remain a number of roadblocks impeding real digital progress for medtech.
In this webinar we will discuss key digital lessons for medtech from other healthcare sectors, steps to take for a successful digital transformation and how to ensure ROI from digital technology.
The free webinar will also see our expert panel:
•Explore the practical impacts of the new medtech business model
•Re-think the customer experience for payers and HCPs
•Learn how digital technology enables you to deliver more customer value – while powering commercial success
•Find out how virtual engagement technologies can make it happen
•See best practices and use cases from your peers
The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.
To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.
Attendees will learn:
- Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
- How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
- How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
Identity risk impacts multiple business functions within an organization. Vendor risk, business continuity, compliance, and more all strive to reduce risk exposure with limited regard to the holistic picture. This session discussed how to shape this breadth of exposure and provide guidance and strategy to Identity Risk Management.
Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.
With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.
Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:
- Why Managed Security
- Types of Managed Security Services
- Benefits of Outsourcing Security
- How to Select the right MSSP
VP of Global Channels
Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
Harvesting your cells is an important step in maintaining healthy cultures. Good technique will lead to a healthy single cell suspension. There are many harvesting options depending on the cell line and application. In this video, we will discuss some tips/tricks to harvesting cells.
Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?
Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.
- What threat intelligence is, and how it speeds threat detection and incident response
- Key questions to help you evaluate threat intelligence sources
- How the AlienVault Labs team analyzes threat data, and turns it into actionable information
- How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response
Principal Product Marketing Manager
Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
Threat Engineer, OTX
Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
Your network firewall isn’t being honest with you. According to a recent survey conducted by Sophos that gathered responses from 2,700 IT managers at mid-sized organization, network firewalls can’t disclose what up to 45% of the bandwidth is being consumed by. Additionally, they are failing to protect the organizations they are deployed in and this inefficiency is costing time and money. Why is this happening? What can be done to correct it? Join Sophos and (ISC)2 on June 14, 2018 at 12:00PM Eastern for a wide ranging discussion about this survey, the results and what can be done to get the best information and performance from your network firewall.
In today’s distributed application ecosystems, with various inter-dependencies and dynamic infrastructures, it is extremely challenging to detect and resolve application failures and performance slowdowns. This is especially true in a Microsoft .NET application stack. Developers, IT Operations Staffs and Site Reliability Engineers often get involved in long war room sessions to isolate the root cause of poor customer experience in the digital business service.
Join this webinar “How to Ensure High-Performing Microsoft .NET Applications”, by John Worthington, Director of Product Marketing at eG Innovations, as he explores the various problems that could affect .NET application performance and discusses industry best practices for effective performance monitoring.
Learn how a converged application and infrastructure monitoring strategy can help:
- Detect digital experience issues in real time
- Analyze critical business transactions and diagnose slowdowns
- Get .NET method-level visibility to fix application code issues
- Understand application dependencies with underlying infrastructure (IIS, Hyper-V, SQL, Azure, etc.)
- Auto-correlate alerts and isolate the root cause of performance problems
Join the webinar and become a .NET performance guru
Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
Looking to improve on the standard approaches to risk management? Guidewire has taken a more holistic approach. By using multiple, interwoven workflows within a single Keylight application, Guidewire's Information Security teams are able to deliver more than just tactical value to the organization and subsequently, our customers. See how Guidewire leveraged Keylight's flexible nature to allow for multiple avenues of assessing and mitigating risk.
Love it or hate it, Digital Transformation is at the center of industry leading organizations. Digital Transformation is not simply a list of IT projects, it involves completely rethinking how an organization uses technology to pursue new revenue streams, products, services and business models. In this webinar we will share with you IDC's concept of building a business case around digital transformation, and the broader strategic priorities of organizations connected to digital transformation working together to deliver business objectives. We will share market insight into the regional and industry use cases driving investment in Digital Transformation, providing an in-depth view of the Digital Transformation spending outlook connected to business use cases.
The advancements in scientific computing and healthcare are coming fast—from next generation sequencing onto precision medicine, “big data” and artificial intelligence. We’re embarking on a massive convergence of clinical analysis and information systems, and many are not prepared. With these advancements in technologies, comes higher demand for both compute and storage to degrees difficult to comprehend. An NCBI published study predicts that up to 40 exabytes of storage capacity will be needed by 2025 just to support the growth of sequenced human genomes.
Adapting to this exciting shift in science will require changes in the way we think about IT infrastructure. In this webinar, BioTeam’s Adam Kraut will discuss…
•How science changes faster than IT infrastructure, and what we can do to keep pace.
•Converged infrastructures and their impact on research productivity.
•How machine learning and microservices are changing the way we architect Cloud solutions.
In addition, you’ll hear how companies are already supporting HPC workloads in hybrid cloud environments to increase analytic throughput efficiently. These workloads supply adaptability to changing research needs, integration into existing resources, and scalability to support growing demand for both compute and storage capacity.
Have you ever wondered how to get from point A to point B in the compliance world? This session walked through a complete compliance lifecycle showing you how to go from identifying what security framework to follow to providing reports to management.
Looking for tips using Matrigel matrix before you coat and plate your cells? We’ve got you covered. Watch our short tutorial for best practices on how to coat Matrigel Matrix as a thin gel layer.
In search of more Matrigel matrix user information? We’ve summarized some other great tips and tricks for Matrigel in our newly published "Ultimate Guide to Matrigel Matrix" – download it today: https://goo.gl/9Nq5Td
Trying to use Matrigel matrix for cell attachment? Watch our short video to learn the best way to coat Matrigel matrix in a thin, non-gelled protein layer.
Interested in some more Matrigel matrix best practices? We’ve summarized some other great tips and tricks for Matrigel in our newly published "Ultimate Guide to Matrigel Matrix" – download it today: https://goo.gl/9Nq5Td
Digital therapeutics presents a significant opportunity for traditional pharmaceutical therapeutics and information technology (IT) capabilities to influence a new approach to increase positive patient outcomes while reducing the overall cost of healthcare.
· Gain expert insight into the accurate definition of digital therapeutics and market participants.
· Learn about new solutions from mHealth companies that will combine apps, patient education, professional intervention and peer support to increase patient engagement and medication adherence by augmenting or replacing traditional drug therapeutics.
· Hear opportunities to utilize digital therapeutics to improve medical workflow and patient communications.
· Learn about some of the critical milestones related to digital therapeutics.
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution.
The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:
- 12 ways hackers get around two-factor authentication
- How to defend your two-factor authentication solution
- The role humans play in a blended-defense strategy
Please join us for an in-depth conversation on how the blend of your IP, Dell EMC hardware and VMware software makes your solutions more scalable, available, secure and cloud ready.
VMware on Dell EMC OEM appliances allows your solution to run multiple operating systems on one physical machine. It adds fault and security isolation at the hardware level, and makes it easy to move and copy virtual machines. It also simplifies lifecycle management as there is an easier transition between hardware generation changes.
Additionally, VMware helps your solution to become cloud ready and relevant when your customer is looking for a hosted or cloud solution.
In the session we will be covering:
•Trends in the industry impacting OEMs today and what’s driving the need for virtualized appliances.
•Hear directly from Dell EMC OEM’s CTO and VMware’s embedded architects on how the inherent benefits of virtualization can help both the OEM’s solutions and their customers.
•How solution builders can leverage Dell EMC OEM for a turn-key combined solution that includes support and distribution globally.
We hope you’ll be able to join us for this informative and valuable session.
Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.
* The role of business continuity management on operations
* How to identify risks that could potentially lead to disruptions
* Strategies for modeling the business impact of various disasters
* Importance of mapping plans to risk, controls, processes, and vendors
Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
(ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.
AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.
Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:
- What the shared responsibility model means for the security of your cloud assets
- Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
- How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
- Benefits of an all-in-one security solution for threat detection, incident response and compliance management
Group Product Marketing Manager
Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.
Sr. Technical Manager, Sales Enablement for North America
Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
(ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).
• Challenges and pitfalls with ISO 27001 certification
• Tips on establishing and maturing an ISMS
• Strategies for preparing and passing ISO audits
• Technology's role in earning and maintaining certification
Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security and compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security and compliance.
As a webinar attendee, you'll learn GCI's secret to:
* Finding and training IT and security professionals
* Developing new or streamlining existing processes
* Scaling Keylight to address security and compliance requirements.
Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security and compliance program. Register for this educational webinar today.
Audits provide a vital checks and balances function in an organization. But what if audit's role as the third line of defense was more efficient and strategic? Doing so would enhance the role of the internal auditor. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter audits, including:
• Critical capabilities required for the audit process
• Importance of customizing messaging to stakeholder audiences
• The pros and cons of current audit management strategies
• Strategic, effective audits that can scale with future growth
More strategic and effective audits won't come from current processes. Discover the road to smarter audits by attending this educational webinar. Register now!