Hi [[ session.user.profile.firstName ]]

Health IT

  • 2017 Frost & Sullivan Predictions in Diagnostics
    2017 Frost & Sullivan Predictions in Diagnostics Transformational Health Team, Harry Glorikian, Board Advisor and Eunice Teo, Director, Business Development, QuantuMDx Recorded: Mar 23 2017 64 mins
    The global clinical diagnostics industry is undergoing a transformation propelled by laboratory consolidation and automation, an enormous move toward data-driven healthcare, large investments in unifying technologies, and renewed business models driven by products and value-added services. There is immense pressure on companies to radically improve new product innovation, manufacturing, and distribution of technologies such as point-of-care molecular diagnostics to capture new growth opportunities in the precision medicine market.
  • ExtraHop + ServiceNow = Seamless IT Service Management
    ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop Networks Recorded: Mar 23 2017 3 mins
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • The New Enterprise Security Model: How to Prevent, Detect and Respond
    The New Enterprise Security Model: How to Prevent, Detect and Respond Eric Karlinsky Group Technical Marketing Manager Okta Recorded: Mar 21 2017 35 mins
    In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.

    Join us to:

    - Understand how adopting cloud solutions improves your security posture
    - Learn how single sign-on, multi-factor authentication, and user lifecycle management work together
    - See live demos of Okta MFA and the Contextual Access Policy framework
  • Preventing and Mitigating Ransomware Infections
    Preventing and Mitigating Ransomware Infections Stu Sjouwerman, Founder & CEO of KnowBe4 Recorded: Mar 16 2017 61 mins
    Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials!

    If these powerful entities have been compromised, what chance do you have? Phishing and spear-phishing are real threats, but you can protect your users by making sure you're a hardened target.

    Join KnowBe4's Founder and CEO, Stu Sjouwerman and Baseline Technologies' Microsoft MVP Mike Crowley on this webcast. Stu and Mike will describe today's threat landscape and offer some practical, every-day protections you can take to protect your organization.
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator
    Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Recorded: Mar 16 2017 29 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • Building a Blueprint for an Insider Threat Program
    Building a Blueprint for an Insider Threat Program Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator) Recorded: Mar 16 2017 58 mins
    While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
  • Sanger Arrayed CRISPR Screening in partnership with Evotec
    Sanger Arrayed CRISPR Screening in partnership with Evotec Dr. Hauke Cornils-Res Scientist, Evotec & Shawn Shafer-Dir. Advance Genomics Life Science Business of Merck KGaA, Darmstadt, Recorded: Mar 16 2017 50 mins
    CRISPR Cas9 nucleases have revolutionized the field of gene editing and high-throughput lentiviral screens continue to hold ever-increasing promise for both basic research and development of future therapies to benefit human health. Even with such powerful technologies at hand, researchers new to the field may find the screening of multiple targets to be challenging and time-consuming. This webinar discusses the Evotec partnership with Life Science Business of Merck KGaA, Darmstadt, Germany and the screening services for drug discovery.
  • Get Powerful Threat Detection for the Cloud
    Get Powerful Threat Detection for the Cloud Danielle Russell, Sr. Product Marketing Manager Recorded: Mar 14 2017 48 mins
    Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Viewers will learn how easy is to:
    - Discover all assets across your AWS, Azure and on-premises environments
    - Scan for vulnerabilities across cloud-based and physical assets
    - Detect emerging threats with real-time, integrated threat intelligence
    - Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
    - Respond quickly to incidents & conduct thorough investigations

    About the Presenter:

    Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.
  • To the Cloud and Beyond: Modernizing, Securing & Integrating Healthcare in 2017
    To the Cloud and Beyond: Modernizing, Securing & Integrating Healthcare in 2017 Matt Serna, Healthcare Marketing Manager, MuleSoft; Mohammad Fasihi, Healthcare Strategy Tech Advisory, PwC Recorded: Mar 14 2017 40 mins
    The promise of the cloud computing in healthcare is clear; delivering on that promise, less so. Security and HIPAA compliance challenges, combined with the technical difficulty of configuring on-premise EHR systems to co-exist with modern cloud integration platforms, have delayed cloud adoption in the industry.

    This webinar will share how Anypoint Platform’s unique combination of data integration and API lifecycle management can help power the rapid, secure adoption of Salesforce and other modern healthcare cloud applications. It will also showcase how PwC has leveraged the MuleSoft platform to develop innovative solutions for its healthcare clients, and feature a demo of PwC's Smart Agent.

    Attendees will learn:

    - Common pitfalls healthcare organizations face in migrating to the cloud, and how they can be addressed with a hybrid integration model
    - How APIs can be used to increase the security and governance of health data
    - How PwC leverages MuleSoft’s platform to drive business outcomes in healthcare
  • Approval and access: Overcoming the final hurdle of drug development
    Approval and access: Overcoming the final hurdle of drug development Professor Luca Pani, University of Miami, Angelika Joos,MSD (Europe) Inc. Ana Palma, Sobi, Belgium Recorded: Mar 10 2017 61 mins
    2017 is once again a year of significant change for pharma market access in Europe, with affordability on the agenda for almost every country in the region. There is a move toward greater collaboration in health technology assessment and more transparency between countries for pricing, therapeutic protocols and and details of negotiations with drug manufacturers. We also see member states working to understand the process of enabling cost-effective patient access to personalised and high-cost treatments, such as new oncology combination therapies, antibiotics and stem cell therapies, which offer the promise of efficacy in key disease areas.

    With market access being referred to as the “fourth hurdle” in drug development (beyond efficacy, safety and quality), it is vital that the requirements for both approval and access are addressed early in the process. Parallel scientific advice from HTA bodies and regulators is increasing to deliver tangible and successful strategies, but is the process smooth enough to overcome the challenges from both sides?

    pharmaphorum in partnership with DIA will be hosting an expert panel debating the best way forward for life sciences companies, payers and providers in this emerging European market access paradigm.

    Join our webinar to hear from experts in industry and healthcare discussing the challenges and solutions of access in the changing European market.
    Topics up for discussion include:
    •Integrating HTA and regulatory strategy – the best way forward
    •Regional variation and implication – how to efficiently and effectively navigate EU market access
    •Proving value – how to leverage real world evidence to meet increasing demands for observational data
    •Future proofing market access – how to improve upon evidence generation and use technology effectively and competitively
  • Security Briefings Part 1: Cloud Apps and Protecting Against Malware
    Security Briefings Part 1: Cloud Apps and Protecting Against Malware Karthik Venna, Product Manager, Bitglass; Brandon Dunlap, Moderator Recorded: Mar 9 2017 59 mins
    Cloud applications have garnered widespread adoption from enterprises in part due to their advantages such as ease of deployment, lower TCO, and high scalability. These applications are also popular because end-users can rely on these applications to work and collaborate from anywhere and on any device. But should the enterprise trust cloud app providers to protect their data from malware and ransomware? Currently, there are only a handful of enterprise cloud applications that provide native malware protection which, in almost all the cases, does not include zero-day protection. Join Bitglass and (ISC)2 for the first part of our next Security Briefings series on March 9, 2017 at 1:00PM Eastern when we will discuss malware protection solutions offered by various cloud application providers, how malware can penetrate into cloud applications and how Cloud Access Security Brokers (CASB) can protect enterprise cloud applications from malware.
  • How to Configure your OSSIM Installation: Network IDS and syslog Collection
    How to Configure your OSSIM Installation: Network IDS and syslog Collection Mark Allen VP, Technical Sales Recorded: Mar 7 2017 57 mins
    Network IDS (NIDS) plays an important role in OSSIM by detecting the presence of malware, network attacks, and other malicious network activity. By correlating this information with events collected from other devices, OSSIM helps you connect the dots to detect potential threats.

    Join us for this user training webcast where our OSSIM experts will walk through:

    Configuring OSSIM NIDS including configuring your network interfaces for monitoring
    Enabling an interface for NIDS monitoring using the web interface
    Forwarding syslog events from your networking devices; routers, switches and firewalls to OSSIM
    Enabling appropriate AlienVault plugins to parse network events

    Mark Allen has been engaged in information security and system administration for over 15 plus years. Mark has extensive experience taking complex concepts and making them easier to understand. He has held a variety of technical roles from help desk to litigation support to systems engineer and IT Director for accounting and law firms and large companies such as Epicor, Dell, & Solarwinds.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Damia Gilner, Marketing Manager, DataCore Software Recorded: Mar 7 2017 24 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • How Not to Get Fired as a CISO
    How Not to Get Fired as a CISO Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy Recorded: Mar 2 2017 55 mins
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • Information Overload - Making Sense of Threat Intelligence Sources
    Information Overload - Making Sense of Threat Intelligence Sources John Carnes, Anthem; Mat Gangwer, CTO, Rook Security; Erik Von Geldern, FXCM; Brandon Dunlap (Moderator) Recorded: Mar 2 2017 62 mins
    There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
  • Getting Started with Hyperconverged Infrastructure
    Getting Started with Hyperconverged Infrastructure Sushant Rao, Sr. Director Product & Solutions Marketing, DataCore Software Recorded: Feb 28 2017 47 mins
    Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.

    But, is HCI right for you? What use cases make sense for HCI?

    Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:

    - Use cases suitable for HCI
    - Criteria to evaluate HCI products
    - Pros and cons of different vendors’ HCI
    - Avoiding the missteps of early adopters
  • Unlocking Data and Clinical Applications with APIs: The New Face of Health IT
    Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Matt Serna, Manager, Industry Marketing; Jonathan Ben-Hamou, Enterprise Systems Architect, ICOE Group Recorded: Feb 28 2017 59 mins
    As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.

    Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.

    Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.

    Attendees will learn:

    - What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
    - How to build and manage APIs in a way that improves health data security and increases IT agility.​
    - How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security
    Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Raghu Gadam, Security Analyst (ISC)2; B. Dunlap Recorded: Feb 23 2017 59 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • Surfaces for Organoid Culture
    Surfaces for Organoid Culture Nitin Kulkarni, Ph.D. Recorded: Feb 23 2017 50 mins
    3D culture is gaining pivotal importance for attaining in vivo-like conditions in a dish to study developmental cues as well as therapeutic possibilities. Organoid development promises to be one of the most important research tools in the near future. This presentation will cover:

    • Methodologies used in organoid culture
    • Matrices for growing organoids
    • Recovery of organoids for downstream applications

    Speaker Bio:

    Dr. Nitin Kulkarni is a member of the Scientific Support team at Corning Life Sciences. He has a Ph.D. in Biology and has worked on engineering transgenic mouse models for autoimmune diseases during his post-doctoral research at the Beth Israel Deaconess Medical Center in Boston, MA.
    In his current role, he supports researchers with applications related to cell culture including advanced surfaces and extracellular matrices, genomics, drug discovery and bioprocesses.
  • Detect Ransomware Before it’s Too Late with AlienVault USM
    Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen, VP Product Marketing Recorded: Feb 21 2017 61 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage

    Jim Hansen is the VP of Product Marketing for AlienVault. Jim is responsible for creating and executing the go-to-market strategy for AlienVault’s family of Unified Security Management products. With more than 15 years in the technology and security space, Jim brings a deep passion for creating great products that deliver compelling value for customers. Prior to joining AlienVault in May 2013, Jim led the strategy and delivery to market of products for Splunk, BigFix (now IBM), and others.
  • How do you Decide Whom to Biopsy for Prostate Cancer?
    How do you Decide Whom to Biopsy for Prostate Cancer? Dr. E. David Crawford Recorded: Feb 17 2017 61 mins
    In our webinar, Identifying Men with Prostate Cancer—The Role of phi and Other Biomarkers, Dr. E. David Crawford will discuss key issues that challenge a physician's ability to make informed decisions regarding whom to biopsy for prostate cancer. After the webinar, you will be able to:

    • Understand the historical perspective and controversy regarding prostate-specific antigen (PSA) screening

    • Improve your interpretation of a PSA result

    • Use biomarkers, such as Prostate Health Index (phi), to reduce negative biopsies and have more confidence in the decision to biopsy

    • Understand how the phi score, combined with family and patient history, can determine patient management decisions

    Dr. Crawford is an internationally renowned urologist and distinguished endowed professor of surgery, urology and radiation oncology. He also serves as the head of the section of urologic oncology at the University of Colorado Anschutz Medical Campus in Aurora, Colorado. Dr. Crawford received his medical degree from the University of Cincinnati. His postgraduate training included an internship and residency in urology at the Good Samaritan Hospital in Cincinnati. He subsequently completed a genitourinary cancer fellowship at the University of California Medical Center in Los Angeles.
  • Rescheduled: Multicellular Tumor Spheroids in HTS: New Assays
    Rescheduled: Multicellular Tumor Spheroids in HTS: New Assays Wojciech Senkowski Recorded: Feb 1 2017 50 mins
    Three-dimensional cell cultures, and multicellular tumor spheroids in (MCTS) in particular, have recently become a widely used tool for preclinical anticancer drug testing in high-throughput screening (HTS) setup. However, even though MCTS have been applied for HTS, their use has been limited to simple assays, such as assessing cell viability or inhibition of growth.

    This webinar will cover new approaches to MCTS-based HTS. It will present a new, robust viability assay, well-suited for HTS and based on green fluorescent protein (GFP) used as a surrogate marker of spheroid viability. It will also review a first-ever approach to obtain information-rich transcriptomic data from drug-treated MCTS on a large scale. In addition, the presenter will demonstrate how this novel platform resulted in the identification of previously unrecognized, context-dependent drug responses of cancer cells and in findings with potential clinical relevance.

    In summary, this webinar will demonstrate new ways of how MCTS-based HTS can be used to provide unique insights into context-dependent biology and cellular drug responses.

    About the Presenter:

    Wojciech Senkowski will soon complete his Ph.D. in Medical Sciences at Uppsala University, Sweden. In his work, he looks for applications of various tumor spheroid models in high throughput drug screening. For his work, Wojciech has received the AACR Scholar-in-Training Award. He was also a presenter and expert panelist at the Genetic Engineering & Biotechnology News webinar on 3D cell cultures, sponsored by Corning in February of 2016.
  • 2017 Frost & Sullivan Predictions in Digital Health
    2017 Frost & Sullivan Predictions in Digital Health Digital Health Team: Daniel Ruppar, Nancy Fabozzi and Victor Camlek Recorded: Jan 31 2017 59 mins
    Over the past decade, the adoption of digital solutions has increased significantly throughout the healthcare industry. This exceptionally strong growth trajectory is expected to continue into the foreseeable future as U.S. healthcare organizations transform to meet the demand for more efficient, clinically integrated and decentralized care systems that serve empowered, technologically-savvy consumers who strongly value convenience and personalization.
  • How to Use OTX with OSSIM
    How to Use OTX with OSSIM Jake Mosher, Sr. Product Marketing Manager Recorded: Jan 26 2017 55 mins
    The AlienVault® Open Threat Exchange™ is an open platform for security research that provides a mechanism for updating your OSSIM instance with the latest threat intelligence from AlienVault Labs or other security researchers. By connecting your OSSIM instance to OTX, you will continuously receive updates from the researchers you trust to help detect relevant Indicators of Compromise (IoC's) in your environment. Or, you can use OTX for your own security research and to share your results with the community.

    Join us for this OSSIM training session covering how to:

    Set up an OTX account and link it to your OSSIM instance
    View OTX Pulses to get context on threats
    See how the OSSIM platform alerts you of IoCs from OTX in your environment

    Jake is a Sr. Product Marketing Manager at AlienVault, responsible for go-to-market strategy, product messaging and positioning, and sales enablement. Prior to AlienVault, Jake held various Product Marketing and Strategy roles at Symantec Corporation. Jake has an MBA from the University of Texas at Austin and a BA in Business Economics from UCLA.
  • Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats
    Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Lance Cottrell; Dominique Kilman; Aamir Lakhani; Brandon Dunlap Recorded: Jan 26 2017 60 mins
    Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
  • Analytical Strategies for Comparability in Bioprocess Development
    Analytical Strategies for Comparability in Bioprocess Development Christine P. Chan, Ph.D & Joe Barco, Ph.D. Mar 28 2017 2:00 pm UTC 75 mins
    Comparability exercises are commonly required at certain milestones during drug development as well as after product registration when changes are implemented into the manufacturing process. The goal is to evaluate if the product remains highly similar (not necessarily identical) before and after the change in terms of quality and stability and have no adverse impact on safety and efficacy predicted for the patients. This assessment requires product-specific knowledge gathered through drug development, taking a totality-of-evidence approach. The different levels of information are obtained from analytical studies for characterization of the molecule, animal studies for toxicity, pharmacokinetics and pharmacodynamics for pharmacological activities, and clinical studies for safety/tolerability, immunogenicity and efficacy. This Webinar discusses strategies and considerations for analytical characterization of protein structure and function which forms the foundation of the comparability demonstration.

    Sponsored by Unchained Labs

    Presentation Title: Limber up your lab with better tools for comparing biologics

    There’s no magic bullet when it comes to characterizing a protein by structure or function. Specific tests may work for one molecule but not the next. Instrumentation that provides a high degree of flexibility, balanced with low sample consumption and faster time to result, is crucial to keep up with ever changing laboratory needs. Unchained Labs puts biologics characterization front and center for our instrumentation development. We will discuss how our instruments let researchers be more flexible and efficient, while also providing clear data to help make comparability assessments.
  • What Every Healthcare CIO Needs to Know About Cloud IAM
    What Every Healthcare CIO Needs to Know About Cloud IAM Nadav Benbarak Group Marketing Manager, Vertical Solutions Okta Mar 28 2017 5:00 pm UTC 60 mins
    Okta_March SimulcastYour on-prem IAM is probably slowing you down. Adding new apps is slow and brittle. Patient portals are fragmented. Managing external physician and partner access is expensive.

    The good news is that Cloud IAM is changing the game for healthcare providers, payors, and life sciences companies, by removing obstacles to security, cost reduction, and user experience.

    Join our webinar to:

    - Learn about common Healthcare IAM challenges
    - Understand how Cloud IAM enables healthcare modernization
    - See a live demo of the Okta Identity Cloud in action

    Speaker Bio:

    Nadav is a Group Product Marketing Manager for Vertical Solutions at Okta. Prior to Okta, Nadav worked on Google’s Adwords business as a product manager, product marketer, and data analyst. He started his career as a scientist researching applications of nanomaterials. Nadav earned a BS from UC Berkeley as well as an MBA from Harvard Business School.
  • Unlocking the value of pharmacists to reach the right patients and consumers
    Unlocking the value of pharmacists to reach the right patients and consumers Pierre-Yves Boisvert, Paulien Schul, Nina Felton and Andrew McConaghie Mar 29 2017 12:00 pm UTC 75 mins
    Pharmacists are highly trained healthcare professionals who have a deep understanding of medicines and daily contact with patients and consumers. This puts them in a unique position in terms of being able to maximise the benefits that patients get from their medicines – however, healthcare systems and pharmaceutical companies frequently overlook this potential.
    Pharmacists are especially well placed to help patients with multiple long-term conditions manage their health and medications, and pharmacist-led interventions have been shown to have a very significant impact on compliance and disease management in the community.
    We present a webinar debate in which our expert panel will discuss how pharmaceutical companies can work in collaboration with pharmacists in Europe to help patients make the most of their medicines, help generate data to prove the value of these interventions, and above all get the right medicine to the right patients and consumers.
    Join us and the PHOENIX group as we look at the practical steps needed to make this a reality. Key topics to be discussed include:
    •The challenges of identifying the right patient population across European markets
    •Understanding how pharmacists can play a greater role in patient care, e.g. improved adherence and outcomes
    •How optimum use of pharmacy level information can contribute to providing ‘real world’ evidence of treatments
  • Getting Started with Hyperconverged
    Getting Started with Hyperconverged Sushant Rao, Senior Director of Product Marketing Mar 29 2017 2:00 pm UTC 60 mins
    If you are starting to explore what Hyperconverged adoption could bring your business, then this is the webinar for you. Packed with hints and tips helping you to ascertain if it’s right for you, pitfalls to avoid and a typical, real-life hyperconverged install
  • Accelerating NGS Workloads with Scientific Cloud Computing
    Accelerating NGS Workloads with Scientific Cloud Computing Scott Jeschonek, Director of Cloud Products, Avere Systems Mar 29 2017 6:00 pm UTC 45 mins
    Next-generation sequencing (NGS) technology has brought an influx of large-scale data and ever-growing demands for compute, resulting in a challenge for those in science informatics. To overcome these issues, laboratories need to be able to support researchers while managing data and the infrastructure needed to deliver mission-critical results and ultimately, positive patient outcomes.

    At the NGS Data Analysis and Informatics Conference in February, attendees spoke about these challenges at length. This webinar, built from content shared at the event, will review potential approaches to cost-effective data growth using cloud compute and storage. Moving genomics workloads to the cloud can provide scale and affordability, while optimizing investments in existing resources. Adding that ability to allow researchers to easily collaborate while reducing latencies to these resources is pertinent to usability.

    In this webinar, you’ll learn how to:
    - Increase computation potential
    - Optimize your physical infrastructure
    - Diagram common use cases to meet specific research goals
    - Increase flexibility by limiting data gravity
  • Disruptive forces in technology and the implications for healthcare
    Disruptive forces in technology and the implications for healthcare Fonny Schenck (CEO Across Health) Mar 30 2017 3:00 pm UTC 45 mins
    Life Sciences is an industry full of established, large companies with significant barriers to entry and often long legacies of success. But the weather is changing – and the structures and strategies which have kept these enterprises safe may soon become liabilities. What is only just becoming clear, though, is how fast this is happening. Along all key areas of the value chain, new & nimble competitors are entering the scene - and they are playing a totally different game.

    Find out more about these disruptive trends, get the highlights of our second ‘Healthcare Disruption Tour’, which went to the heart of the action in Jan 2017, and learn why pharma should take note…and how it can best prepare & organize for this tsunami.

    • Key trends in healthcare disruption
    • Impressions from the second healthcare disruption tour
    • Embedding disruption in pharma organisations
  • Enabling CAR-T Screening in 3D Tumor Spheroids
    Enabling CAR-T Screening in 3D Tumor Spheroids Van Dang, D.V.M., Ph.D., Abhi Saharia, Ph. D., and Audrey Bergeron, Applications Scientist Mar 30 2017 4:00 pm UTC 60 mins
    Webinar Date & Time: Mar 30 2017 12:00 p.m. EST

    Chimeric antigen receptor (CAR)-T cells, which are engineered to recognize target cell surface antigens expressed on tumor cells, have shown promise to affect complete remission in patients with B-cell malignancies. However, applying this approach to target solid tumors has resulted in adverse effects in clinical studies. Methods for testing different models of CAR-T cells in vitro can provide further insight into viable antigen targets. Historically, two-dimensional (2D) cell culture models have been used in drug discovery. However, more elaborate, three-dimensional (3D) cell culture models better mimic the in vivo tumor microenvironment and help bridge the gap between in vitro studies and clinical outcomes.

    In this special joint webinar, panelists from ProMab Biotechnologies, DiscoverX, and Corning Life Sciences will present data on a high-throughput, easy-to-use, highly reproducible method for screening CAR-T cells in a 3D cell culture model by combining various technologies.

    Van Dang, D.V.M., Ph.D.
    Scientist and coordinator for CAR-T research
    ProMab Biotechnologies, Inc.

    Abhi Saharia, Ph. D.
    Director, Cell-based Assays and Biologics

    Audrey Bergeron
    Applications Scientist
    Corning Life Sciences
  • Demystifying Statistical Sampling for the Fraud Investigator
    Demystifying Statistical Sampling for the Fraud Investigator Mark Starinsky, Service Delivery Manager, General Dynamics Health Solutions Mar 30 2017 6:00 pm UTC 90 mins
    With attributes, variables and clusters, even the vocabulary of statistical sampling can be challenging to the lay investigator. However, proper understanding and command of these terms is essential to mastering the tools and techniques necessary for preparing statistically-valid random samples. This skills-based webinar will review important sampling terminology, the benefits and applications of sampling to healthcare audits and investigations, and include demonstration of preparing a sampling data set with OIG’s commonly-used RAT-STATS.
  • Security Briefings Part 2: Top 5 Cloud Security Threats
    Security Briefings Part 2: Top 5 Cloud Security Threats Scott Boda, Solutions Engineer, Bitglass; (ISC)2; Brandon Dunlap, Moderator Apr 6 2017 5:00 pm UTC 75 mins
    Cloud apps offer several advantages over premises-based apps, from lower costs to easy deployment. In fact, 59% of organizations have already deployed apps like Office 365, Box, and Salesforce. As data moves to the cloud, security is of utmost importance. On April 6, 2017 at 1:00PM Eastern, join Bitglass and (ISC)2 for Part 2 of our Briefings series where we will discuss security threats such as external sharing, compromised credentials, lost/stolen devices and how you can best mitigate these threats. Learn how Cloud Access Security Brokers (CASBs) can provide end-to-end data protection, in the cloud and on any device.
  • When small becomes big: orphan medicines, advances, access and affordability
    When small becomes big: orphan medicines, advances, access and affordability Alastair Kent OBE, Malcolm Qualie, Sheela Upadhyaya, Sarah Rickwood, Moderated by Paul Tunnah Apr 10 2017 3:00 pm UTC 75 mins
    Over the past few years there has been a shift in the European pharmaceutical market landscape, with a rise in specialty medicines for diseases with narrow patient population. Indeed, QuintilesIMS forecasts that, between 2013 and 2018, 94% of list price value growth will be in specialty medicines – with orphan drugs at the forefront of this trend.
    On 10 April 2017, QuintilesIMS, in partnership with pharmaphorum presents a unique digital debate, bringing together a panel of senior industry experts, including participants from NICE, NHS England and Genetic Alliance UK to explore the pillars of commercial success for orphan drugs in Europe and review the wider implications of Brexit for the rare disease community.
  • Introducing the Lenovo Storage DX8200D Powered by DataCore
    Introducing the Lenovo Storage DX8200D Powered by DataCore Sushant Rao, Sr. Director of Product Marketing, DataCore Software Apr 12 2017 6:00 pm UTC 60 mins
    Lenovo and DataCore have collaborated to create a Software-defined Storage (SDS) appliance. This validated, turnkey appliance provides easy scalability and single pane management at a fraction of the cost of legacy systems—without trade-offs in availability, reliability or functionality.

    Join this webinar to learn more about the Lenovo Storage DX8200D Powered by DataCore.
  • How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere
    How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Apr 18 2017 5:00 pm UTC 60 mins
    A brute force attack is one of the more common types of attack that malicious actors use to try and gain access to your IT servers, applications and data. These attacks are relatively simple for attackers to implement and they can wreak havoc on your organization when successful. However, many IT security teams may not be aware that they are at risk from these attacks, or what to do about them.

    Join us for a live demo where we'll demonstrate how the AlienVault Unified Security Management (USM) approach, delivered as a SaaS solution with our USM Anywhere offering, can help you detect and investigate these types of attacks.

    You'll learn:

    - How attackers can use brute force attacks to gain access to your network
    - Steps you can take BEFORE an attack to identify systems or applications that may be at greater risk
    - How USM Anywhere can alert you immediately of brute force attacks targeting your cloud, hybrid cloud and on-premises environments
    - How to use USM Anywhere to investigate brute force attacks and identify compromised assets

    About the Presenter:
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha currently lives in Seattle, though soon moving to Austin, TX where he is based.
  • AmerisourceBergen: Architecting Enterprise Master Data Hub for One ABC
    AmerisourceBergen: Architecting Enterprise Master Data Hub for One ABC Pete Stormer, Director, Data Mgmt, ABC; David Lyle, VP, Informatica; Prash Chandramohan, Product Marketing Mgr, Informatica Apr 20 2017 5:00 pm UTC 60 mins
    Located at the intersection of pharmaceutical manufacturers and healthcare providers, AmerisourceBergen Corporation (ABC) is a $147B global pharmaceutical services and distribution company. The company’s success rests on knowing its diversified customer mix and serving them with innovative programs and solutions.

    Formed in 2001, AmerisourceBergen had become a group of companies under one banner. Join us to hear how the company designed a data strategy to view business interactions holistically across multiple business groups to serve customers as a single company. Pete Stormer, Director of Data Management at ABC, will talk about their experience, best practices, and lessons learned to support the journey to one ABC.

    The webinar will also cover the following topics:

    • The evolution of MDM as a strategic platform to deliver trusted data to business users
    • Best practices for master data management, data quality, data governance and reference data
    • Defining the enterprise strategy for data management in complex business environments
  • The Digital Imperative: Creating the Secure, and Productive Enterprise
    The Digital Imperative: Creating the Secure, and Productive Enterprise Ali Mazaheri, Chief Technical Architect, Microsoft; Dean Suzuki, Technology Architect, Microsoft Apr 20 2017 5:00 pm UTC 60 mins
    It’s a fact: Digital Transformation is arguably the number one growth opportunity among today’s IT and business leaders. Organizations that embrace advanced technologies are attracting the best talent, optimizing productivity and creating enduring value for customers and shareholders.

    Join us to engage with subject matter experts, network with peers and learn about new innovations that will streamline operational efficiencies and reinvent the way your organization performs with the advanced security you require in the cloud era.

    View this webcast to:
    • Learn about Microsoft’s Vision for Digital transformation
    • Explore Innovations that bridge the gap between intelligence and security
    • Discuss how to Optimize for teams and get the most from your biggest investment: People

    Who Should view this webcast:
    • Business leaders across Finance, Operations, Communications, Sales and Marketing
    • CISOs, and VPs of Information Security
    • CIOs and Innovation Officers
    • IT Managers
  • iGov Survey Results: GDPR Compliance and Creating a 360 Citizen View
    iGov Survey Results: GDPR Compliance and Creating a 360 Citizen View Jason Edge from Entity Group and Informatica May 25 2017 9:30 am UTC 60 mins
    This webinar will present the latest research project from iGov.

    This research considers the challenges and benefits for public sector organisations as they prepare for the EU’s forthcoming General Data Protection Regulation (GDPR).

    This webinar will illuminate:

    The current state of readiness in the light of GDPR’s introduction on May 25th 2018

    How present data management capabilities could be affected by the new regulations

    How GDPR could affect organisations when it comes to collecting and maintaining personal data

    Registrants will also receive a complimentary copy of the survey report - to benchmark against other participating Public Sector organisations.
  • Multichannel Rep
    Multichannel Rep Annelien Van Boxlaer (VP Innovation Strategy, Across Health) & Patrick Vidal (MD, Across Health France) May 30 2017 3:00 pm UTC 60 mins
    The world of the field force is changing. Increased digitalisation, powerful new tools and a growing expectation that they ‘conduct’ multiple channels means new skills, ways of working, and even thinking, are needed.

    This shift will radically change the structure of the traditional Pharma organization. Differences between HQ and local offices will become less pronounced as the field force gains the ability to deploy highly tailored, right-on-time content, in the best possible format for individual physicians.

    Find out more about how the time of the Multichannel Rep is now, how upskilling and reskilling are the buzzwords for new engagement models, and how not to have your field force being left behind in the digital race!

    Topics include:
    •Getting the right digital tools into the hands of reps
    •How to evaluate what the best channels for your situation are
    •Finding out what good looks like
    •How to engage your field force, manage the change, and sustain their motivation
  • Modernizing Biopharmaceutical Manufacturing: From Batch to Continuous Production
    Modernizing Biopharmaceutical Manufacturing: From Batch to Continuous Production Robert Dream Jul 19 2017 2:00 pm UTC 75 mins
    The importance and value of continuous bioprocessing, both upstream and downstream has economic and sustainability advantages and due to the modular nature of continuous bioprocesses means that industry is able to adapt more rapidly to changing market demands. Continuous biopharmaceutical manufacturing in the context of other industries that have already successfully adopted continuous processing. Factor other than scientific ones, are the barriers to change from batch to continuous production. an excellent example of the manufacturing strategies of the steel industry in the 20th century, when this industrial sector incrementally switched from batch to continuous operations. biopharmaceutical industry has reached a stage that requires a change in the production paradigm. For a certain class of biopharmaceutical products upstream continuous manufacturing has always been applied: for example, unstable proteins that rapidly degrade in the culture broth. In order to obtain a high quality product, the residence time in the reactor must be minimized. This can only be achieved with continuous cultivation and preferably with perfusion reactors. a brief overview on the types of cell retention devices currently used in biopharmaceutical industry.
    Furthermore, this is a universal production platform that can be extended to other classes of products, such as antibodies, which are relatively stable molecules. continuous manufacturing is as productive and with a much smaller footprint of the manufacturing plant, avoiding multiple non-value added unit operations. In essence, the investment for a continuous plant is much smaller compared to a batch-operated one.
  • Geisinger Health: Architecting for Data Quality and Governance
    Geisinger Health: Architecting for Data Quality and Governance Patrick Gies, Enterprise Architect, Geisinger Health Plan & Thomas Brence, Director of Product Marketing, Informatica Sep 27 2017 5:00 pm UTC 60 mins
    The Geisinger Health Plan cares for over 500,000 members in Northeast and Central Pennsylvania. During this session, you’ll learn how their team is using the Informatica Platform to build enterprise solutions for data quality and data governance while also broadly supporting the journey to modern data management and enterprise information management. You’ll discover both strategic and tactical considerations for leveraging the Informatica Platform to meet your goals, including discussion of industry best practices, design concepts for governance organizations and the development of core technical competencies. You’ll also hear about lessons learned and innovative approaches directly from the experts at Geisinger.