Hi [[ session.user.profile.firstName ]]
Sort by:
    • New Government Experience for Health Co-ops/HIX-Cloud App Dev & Engagement Ctrs
      New Government Experience for Health Co-ops/HIX-Cloud App Dev & Engagement Ctrs Julia Hutchins CEO, Colorado HealthOP & David Abernethy, Director of IT, Colorado HealthOP Recorded: Apr 10 2014 5:00 pm UTC 61 mins
    • Does your agency provide the level of service that the American public wants and deserves when making Health Care Decisions?
      Attend this webinar to understand how leading government innovators in Health Co-ops and State Health Insurance Exchanges are leveraging Salesforce's Cloud Application Development and Engagement Center Solutions to implement their health insurance offerings for individuals and groups as part of the Federal Affordable Care Act in order to serve citizens and partners like never before.
      •Hear about the common set of challenges and issues faced by Health Co-ops, Federal and Local Government Agencies and Departments that are tasked with in providing Health Insurance Options and what is being done to address these challenges.

      •Learn how saleforce.com, CoStratus and the Colorado HealthOP have teamed up to deliver one of the most innovative Health Insurance Solutions integrating key processes and technology with its eMember functionality, broker portal and call center service functions to provide a cohesive, one-stop environment, providing unmatched customer service while helping the consumer obtain Health Insurance.

      •See a demonstration of a Salesforce Cloud Application Development in action via a demo of CoStratusInsure Application and experience 1st-hand, the numerous benefits in being able to unlock your back office systems and integrate them with the power of Salesforce to equip your team and independent Insurance Brokers to serve your community better than ever.
      This salesforce.com Health Co-op Solution will:
      •Provide consumers with an easy and informative way to make important health insurance decisions.
      •Improve Insurance Broker sales close rate by providing immediate access to inquiring customers and collaboration via the Broker Portal.
      •Decrease costs by eliminating paper and manual data entry of customer data.
      •Virtualize the Call Center using the CTI.
      •Retain Customers through the use of the innovative “my eMember” functionality.

      Read more >
    • BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization
      BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization Mark Weatherford, Chief Cybersecurity Strategist at vArmour and Josh Downs, Community Manager at BrightTALK Recorded: Mar 21 2017 9:40 am UTC 10 mins
    • BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

      Topics up for discussion:

      - The rise of Ransomware and where companies are more vulnerable
      - DDoS and why it's still a key threat to businesses
      - The increased vulnerability of the IoT
      - Challenges for Donald Trump and his new cyber team
      - How to boost equality and diversity in the information security industry
      - How cloud and virtualization are changing the security game

      About the Speaker:
      Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.

      Read more >
    • How do you Decide Whom to Biopsy for Prostate Cancer?
      How do you Decide Whom to Biopsy for Prostate Cancer? Dr. E. David Crawford Recorded: Feb 17 2017 12:00 am UTC 61 mins
    • In our webinar, Identifying Men with Prostate Cancer—The Role of phi and Other Biomarkers, Dr. E. David Crawford will discuss key issues that challenge a physician's ability to make informed decisions regarding whom to biopsy for prostate cancer. After the webinar, you will be able to:

      • Understand the historical perspective and controversy regarding prostate-specific antigen (PSA) screening

      • Improve your interpretation of a PSA result

      • Use biomarkers, such as Prostate Health Index (phi), to reduce negative biopsies and have more confidence in the decision to biopsy

      • Understand how the phi score, combined with family and patient history, can determine patient management decisions

      Dr. Crawford is an internationally renowned urologist and distinguished endowed professor of surgery, urology and radiation oncology. He also serves as the head of the section of urologic oncology at the University of Colorado Anschutz Medical Campus in Aurora, Colorado. Dr. Crawford received his medical degree from the University of Cincinnati. His postgraduate training included an internship and residency in urology at the Good Samaritan Hospital in Cincinnati. He subsequently completed a genitourinary cancer fellowship at the University of California Medical Center in Los Angeles.

      Read more >
    • 2017 Webroot Threat Brief
      2017 Webroot Threat Brief Tyler Moffitt | Senior Threat Research Analyst Recorded: Feb 23 2017 6:00 pm UTC 36 mins
    • Get insights into the threat landscape.

      Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.

      Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

      •94% of malware and PUAs were seen only once
      •Approximately 1/3 of URLs were high risk
      •Zero-day phishing URLs doubled
      •And more…

      Get the insights you need to stay ahead of the malware curve in 2017.

      We hope you can join us for this live, educational session!

      Read more >
    • FAKE NEWS – Signatureless! File less! Next Generation! X-Generation!
      FAKE NEWS – Signatureless! File less! Next Generation! X-Generation! Tim Sheahen | Senior Manager Sales Recorded: Apr 18 2017 5:00 pm UTC 29 mins
    • Frankly I’m confused (and I work in endpoint security). In many ways you shouldn’t have to care about the terminology a vendor is using, but when it’s used to confuse and obscure reality, then you do.

      What really matters is how effective is your endpoint security at stopping users and devices from being compromised? How many ways will it prevent attacks and how do they all add up in delivering high performance, multi-vector protection?

      In this BrightTalk webinar we will be calling it as we see it, dispelling the ambiguous words and techno-babble being used and focusing on the core requirements you should ask all endpoint vendors for?

      Finally, this webinar is not going to be a pitch. At Webroot we have never claimed, and are not claiming that we’re a magic ‘silver bullet’, and with five years of cloud-driven endpoint security we’re not the ‘Emperor’s New Clothes’ either.

      What we want you to come away from this webinar with is the ammunition to ask hard questions about your endpoint security that will help you make better endpoint security decisions, when you or your colleagues have to make them.

      We want you to recognize the FAKE NEWS in endpoint security for what it really is – BS.

      Read more >
    • Ransomware (R)evolution
      Ransomware (R)evolution Tyler Moffitt | Senior Threat Research Analyst Recorded: Sep 22 2016 5:00 pm UTC 49 mins
    • Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

      At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.

      Read more >
    • 2016 Webroot Quarterly Threat Update
      2016 Webroot Quarterly Threat Update Tyler Moffitt | Security Threat Research Analyst Recorded: Aug 22 2016 5:00 pm UTC 48 mins
    • According to the latest annual Webroot Threat Brief, 97% of malware is unique to a specific endpoint, rendering static, signature-database security virtually useless. In fact, many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. With the rising popularity of polymorphism and other trends, it is more crucial than ever that organizations strengthen their security postures with next-generation endpoint protection and real-time, highly accurate threat intelligence. Join this webinar for an in-depth discussion of the most recent quarter’s malware stats and trends, and how businesses can leverage this data to keep themselves, their users, and their customers safe from advanced attacks.

      Read more >
    • Cloud security best practices for defending against APTs
      Cloud security best practices for defending against APTs Tyler Moffitt | Senior Threat Research Analyst Recorded: May 31 2016 5:00 pm UTC 43 mins
    • Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms.

      Attendees will leave this presentation with:
      • An overview of the common threats and methods used to perform attacks.
      • A summary of the impact such threats bring to both users and businesses.
      • A better understanding of the challenges and benefits of deploying a cloud-based security solution.

      Read more >