Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Hyperconverged systems offer a great deal of promise and yet come with a set of limitations.
While they allow enterprises to re-integrate system components into a single enclosure and reduce the physical complexity, floor space and cost of supporting a workload in the data center, they also often will not support existing storage in local SANs or offered by cloud service providers.
However, there are solutions available to address these challenges and allow hyperconverged systems to realize their promise. Sign up to discover:
• What are hyperconverged systems?
• What challenges do they pose?
• What should the ideal solution to those challenges look like?
• A solution that helps integrate hyperconverged systems with existing SANs
Cloud adoption continues to grow with an increasing number of customers choosing this operating model for their data, virtual machines and applications. The traditional appliance must evolve to provide a more cloud like experience for your customers who are experiencing a digital transformation.
In the session we will be covering:
*Overview of the two HCI strategies you can adopt
*Benefits of adopting a modern HCI architecture
*The Dell EMC OEM solutions approach
Artificial Intelligence, Machine Learning, Deep Learning are the buzz words across the globe today. Businesses as well as people are trying to make out if it is hype or not. While there is a hope there is also gloom somewhere, as far as AI is concerned. Lots of work needs to be done to ensure effective and valid deployment of AI solutions. Today’s AI concern is Frameworks and toolsets to manage the entire lifecycle in an integrated way to ensure dependable results is the beckoning need for AI going forward. In this discussion, we will be focussing on some of the important challenges faced with respect to the resources, frameworks, tools and techniques and also the direction AI is trending towards.
Running mission-critical applications and providing continuous access to data are the lifeblood of any healthcare organization. That’s why a business continuity plan is uniquely important to the healthcare sector.
Hear directly from Maimonides Medical Center’s CTO Gabriel Sandu as he shares how their organization uses software-defined storage as a strategic solution to achieve their business continuity plans.
DataCore has been assisting many hospitals and healthcare organizations throughout the world in building upon their continuity planning efforts.
During this webinar, our technical business continuity experts will walk you through real-life healthcare disaster incidents. They will share how major hospitals have survived hurricanes, floods, power outages and building failures by using software-defined storage to provide uninterrupted operations to applications and critical medical data systems during crisis events.
Join this session and learn how DataCore’s software empowers business continuity for healthcare organizations such as New York-Presbyterian, Mount Sinai, Maimonides Medical Center, and Englewood Hospital and Medical Center.
With 91% of data breaches being the result of human error, security leaders, auditors, and regulators increasingly recognize that a more intentional focus on the human side of security is critical to the protection of organizations. However, organizations have been struggling with and debating the effectiveness of traditional security awareness and training.
Join Erich Kron, Security Awareness Advocate at KnowBe4, for this webinar "Making Awareness Stick: Secrets to a Successful Security Awareness Training Program" as he shares results-focused strategies and practical insight on how to build a world-class program.
Key topics covered in this webinar:
- Why awareness and training matters
- Key data points to help make the case for awareness in your organization
- Five secrets to making awareness work in 2018
- How to create your "Human Firewall"
Make this the year that you refuse to settle for mediocrity. Are you ready to go all-in?
Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.
View this on-demand webcast and demo to see how the AlienVault Unified Security Management platform can help with these essential capabilities:
- Discover all assets across your cloud and on-premises environments
- Get alerted when new assets connect to the network
- Schedule vulnerability scans of individual assets, asset groups or entire networks
- Prioritize vulnerabilities by severity and likelihood of exploit
- Quickly identify availability of patches, saving time researching each vulnerability
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
Im Zusammenhang mit der ab 25. Mai 2018 gültigen EU Datenschutzgrundverordnung (DSVGO) ergeben sich für Unternehmen neue Compliance-Verpflichtungen. So müssen sie u.a. die Sicherheit personenbezogener Daten durch ein Informationssicherheitskonzept garantieren.
Patrick Schweichler, Implementation Specialist bei DextraData, zeigt Ihnen in unserem exklusiven Webcast, wie Unternehmen von Cherwell mergeable Apps und einem kostengünstigen, effizienten und gesetzeskonformen Informationssicherheitsmanagement profitieren. Mit mApps von Cherwell können Sie der Wirksamkeit der EU-Datenschutzgrundverordnung (DSGVO) gelassen entgegensehen.
Der Webcast richtet sich insbesondere an IT-Service Verantwortliche, Service Manager, Operations-Verantwortliche und Datenschutzbeauftragte, die sich mit dem Thema Informationssicherheitsmanagement beschäftigen.
Lernen Sie die Vorteile der Cherwell mergeable Applications kennen
Übersichtlich und komfortabel: Die ISMS mApp im Detail
Q & A
In this webinar, Dr. Sautter will discuss the important collaboration efforts between the government and healthcare facilities to stop prevalent and dangerous hospital-acquired infections. After the webinar, you will be able to:
• Explain how the laboratory and the NHSN can work together to lower infection rates in hospitals
• Learn how to lower rates of infections, such as blood culture contamination, MRSA and C. difficile
• Identify how pre-analytic culture collection can affect the results of clean catch and catheter-related infections
• Discuss how laboratories can work together with the NHSN, an infection surveillance program created by the CDC to eliminate HAIs, to identify problem areas and measure the progress of prevention initiatives
P.A.C.E. credit is available for your participation.*
Presenter: Dr. Sautter is a teacher, lecturer and industry consultant. He earned his B.S. and M.S. degrees from Eastern Michigan University in the areas of biology and molecular biology, respectively, and his Ph.D., from Wayne State University, in Detroit, Mich., in microbiology. During his career, he held positions as a medical technologist, director of microbiology and medical director for a number of laboratories, before becoming an esteemed consultant for a variety of industry leaders in the area of microbiology.
*Beckman Coulter Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E.® Program. These credits are recognized by the State of California. Most programs also provide State of Florida credits (with valid license number). At this time, we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
The latest data breach or vulnerability may capture headlines and prompt speculation, but where the rubber meets the road is being smarter about IT risk management (ITRM). In this webinar, you'll learn what being wiser entails, including:
· What IT and security disciplines ITRM encompasses
· How to tailor your ITRM message to different departments
· Strategies for working with cross-functional teams
· Advantages and disadvantages of using spreadsheets
· Quick wins and ideas for sustained growth
Don't wait for a breach or a vulnerability to get smarter about ITRM. Learn what you need to know to get where you're going. Register for this webinar.
This web conference will present the findings from the newly launched Worldwide Smart Cities Spending Guide in which 15 smart cities use cases were sized and forecasted by nine global regions. We will discuss the trends that are impacting investments, the highest areas of spending and growth, and differences between regions. Smart Cities investments will be discussed in the context of global trends in cities, and how these are impacting budget priorities and spending on specific use cases.
HDR skin brachytherapy can bring added value to any brachytherapy program. Join Dr Michael Kasper and physicist Zoubir Ouhib from the Lynn Cancer Institute to learn more about how to start or add a skin program the right way. Topics will include the necessary equipment, key team members and the general considerations critical to program success.
This session will look at the drivers, trends, impacts, and overall market for non-traditional robotics on the modern digitally connected business. The evolution of technology in general has helped to drive the evolution of robots for non-traditional business applications.
John Santagate, Research Director for Service Robotics at IDC, says “We are in a very interesting place relative to robotics. There has been a convergence of technology maturity and market acceptance that is helping to drive new robotic applications in business areas where robots have not typically been deployed”. Join us as we dig into what is driving the market, why this time it's different, and how the market will shake out over the coming several years.
[Webinar] Vulnerability Risk Management - Lessons From the Trenches
One of the largest retailers in the world, top 5 medical insurance firm, largest US electric utilities provider - these are just some of the industry leaders that rely on Brinqa Vulnerability Risk Management to secure their critical assets. How do these cybersecurity organizations - representing some of the most complex, diverse and vast technology ecosystems in the world - tackle the most pressing vulnerability management problems of today?
Join us as we share lessons learned from down in the trenches of vulnerability risk management :
How top risk leaders and organizations approach risk prioritization
How to reduce remediation overhead while improving effectiveness
How you can gain insights into emerging threats like Meltdown and Spectre
How to future-proof your vulnerability risk management program
Flash storage technologies will continue to be a front-runner in 2018 for storage vendors and consumers, however why is it that only 2% of data centers have gone all flash? What are the challenges that storage providers and data center infrastructure managers are still facing with flash, despite it's importance in the marketplace?
In the age of digital transformation, IT Infrastructure must embrace new technologies and software-defined storage systems, while still maintaining server and data center performance.
Join this webinar with Flash gurus Alex Best and Alfons Michels to learn the essential steps to take to ensure the perfect coupling of Flash. Sign up to discover:
• 3 reasons why only 2% of data centres have gone All Flash
• Ideal coupling scenarios where All Flash can help vs Challenging environments for Flash
• 2 essential steps to take before you invest more
Well, to put it simply: Web conferencing tools are being replaced by more modern, feature-rich video conferencing solutions that emphasize true face-to-face connections.
We’ll explain to you why adopting video conferencing tools and bidding farewell to audio- and web-only tools will increase meeting efficiency, employee engagement and overall profitability for your company.
•The evolution of web conferencing
•How to maximize the technologies you already have in place
•Why your company should prioritize video conferencing moving forwarding
•How to video-enable your company without breaking the bank
Join the GRC Pundit, Michael Rasmussen and Lockpath’s Sam Abadir for a 60-minute webinar as we review the capabilities of Lockpath’s Bulk Operations solution, winner of the 2015 GRC 20/20 Award for Innovation in User Experience for IT GRC.
Information security operations often are encumbered by processes that take extensive time to modify and update. When mass changes need to take place, it is time consuming to go into each record and modify and manipulate data. For example, when vulnerability scanners report finding assets that are about to be decommissioned, action items in remediation will be a waste of time. Another example is when a business division splits or is dissolved and IT assets and security records needs to be reassigned to one division or another. Lockpath’s Bulk Operations is an innovative solution that makes it easy and intuitive for organizations to manage bulk changes to IT GRC data. Lockpath clients can now easily identify data that needs some sort of change, whether it’s a change in the value of a single or multiple fields, the addition of new fields, the removal/deletion of existing fields, or shifting workflow and tasks. This saves organizations hours of work because the feature is built into the ad hoc reporting engine, organizations can easily and quickly filter data sets they want to edit.
In this IDC web conference, Stephen Minton will review the latest ICT spending data and leading economic indicators for ICT budget trends and new 3rd Platform technologies, alongside updated market sizing and forecasts from the IDC Worldwide Black Book, answering questions such as:
• How has the technology market performed so far in 2018, and how have forecasts for 2019-2022 changed as a result?
• What impact will economic trends have on IT spending over the next 5 years, and what are the main downside risks to the outlook?
• Which new technologies are experiencing the fastest growth in emerging markets, and which geographies are set to emerge as global leaders beyond 2020?
• How quickly are tech budgets moving from traditional IT deployments to the 3rd Platform of cloud, mobile and new technologies such as IoT and robotics?
• What does the expansion of the ICT industry and the emergence of new categories mean for traditional tech vendors and buyers?
During the webcast, we will analyse:
•What are the steps to be taken to effectively use design thinking in mobile health services
•What are the challenges you may face in a user-centered design process
•How this approach can be more generalised to other service design to deliver better patient experience
The future of blockchain remains promising as enterprises move along their digital transformation journeys. End users will realize the long-term value this new and innovative technology holds, building upon their existing technology infrastructure and also layering on new and emerging technology to create a complete ecosystem. In order to help vendors capitalize on the opportunity, we will share market insights and data on the key blockchain use cases and trends.
Vendors are essential to your company's success; however, they also add a layer of risk. A data breach is often traced to a service provider. A supplier botches a shipment and upsets a key customer. For risk challenges with vendors, the answer is proactive vendor risk management. In this webinar, you'll learn the roadmap to smarter vendor risk management, including:
· Guidance on managing collected vendor data
· Time-saving features with assessments
· Tips on spotting trends and high-risk vendors
· Pros and cons of continuous monitoring
· Impact of vendor risk on operational risk
Don't wait for an incident or a high-level exec questioning your vendor risk management processes to get smarter about vendor risk management. Learn smart strategies for the road ahead in VRM. Register for this webinar.
One of the obstacles to working with 3D cell cultures is how to extract meaningful data from them. To address this problem, Visikol has developed their Visikol® HISTO-M™ tissue clearing reagent that allows for complete 3D cell culture characterization using confocal imaging or a 3-fold increase in cells detected using wide-field microscopy. This tissue clearing approach has been developed to be rapid and compatible with multi-well plates so that it can be conducted using automated pipetting robots and high content confocal imaging systems.
By attending this webinar you will learn about:
• Methods to enable 3D cell culture
• Ways to enhance imaging and characterization of 3D spheroids
Dr. Tom Villani is the CSO and Co-founder of Visikol Inc and is responsible for the companies scientific strategy. Since launching Visikol with Co-Founders Dr. Michael Johnson and Nick Crider, Dr. Villani has led the development of the Visikol HISTO tissue clearing technology for three-dimensional tissue imaging as well as a suite of digital pathology tools. Visikol has leveraged these technologies in its 3Screen service offering where the company is focused on transforming tissues into actionable insights as a service for primarily pharmaceutical companies.
Dr. Ann Rossi graduated from the University of Rochester School of Medicine and Dentistry with a Ph.D. in Pharmacology and received postdoctoral training at the University of Chicago. Prior to joining Corning, Ann worked as a Senior Scientist at ARMGO Pharma, Inc., a small private pharmaceutical company, contributing her expertise in calcium signaling toward developing new assays for the company’s screening cascade. Ann is new to Corning Life Sciences as the Applications Lab Manager in Kennebunk, Maine and is drawing on her strong academic and industry research experience to direct the activities of the applications group.
The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.
Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:
- What is GDPR and who is affected?
- How will GDPR impact organizations outside the EU?
- What is meant by personal data in the context of GDPR?
- What are some of the steps and effective tools you need to comply?
- What should your incident response plan look like in the event of a breach?
- What happens to companies that fail to comply?
We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.
Principal Product Marketing Manager, AlienVault
Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.
The foundation of a successful security architecture in this model requires:
- Rich, trustworthy data covering all aspects of the environment
- Consolidated data sources and analytics processes
- Automated investigation and response capabilities
- Integration between tools and services for total coverage of every critical asset and data set.
In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
Artificial Intelligence, Machine Learning, Deep Learning are the buzz words across the globe today. Businesses, as well as people, are trying to make out if it is simply hype or not. While there is hope there is also gloom somewhere, as far as AI is concerned. There is a lot of work to be done to ensure effective and valid deployment of AI solutions.
Today’s AI concern is Frameworks and toolsets to manage the entire lifecycle in an integrated manner to ensure dependable results - which is the burgeoning need for AI to move forward. In this discussion, we will be focussing on some of the important challenges faced with respect to resources, frameworks, tools, and techniques for implementing AI and also the direction it is trending towards.
How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:
· Common methodologies for interpreting risk
· Status of risk management in your organization
· Frameworks and strategies for seeing risk in a new light
· Keys to success in advancing your risk program
There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
Digital Transformation is powering growth opportunities in Smart R&D, Patient Engagement, and Healthcare eCommerce. The explosion of patient centricity and technological advancement in big data analytics, cloud and artificial intelligence are putting severe pressures on companies to leverage all types of data (clinical, social media, IOT, etc.) in innovative ways. While the industry is decidedly upbeat on this new trajectory, there are heightened concerns about managing data privacy, especially for data flows outside the traditional ecosystem.
• Learn about trends and growth opportunities in the Life sciences IT sector
• Discuss hot topics, including Smart R&D, Digital Manufacturing, Connected patient and IVD eCommerce (B2C models)
• Hear from industry leaders about company growth strategies and best practices for implementing digital solutions
• Gain perspectives on M&A’s and the impact of investments from Big Tech companies