Subscribe to Events Feeds

223 Results Found

What Employers Need To Know About Human Resources
8/21/2014 9:00 AM - 8/22/2014 6:00 PM
DoubleTree by Hilton Hotel Los Angeles Downtown Los Angeles, California United States
Event Listing
Summary:

Overview:

This workshop will provide a comprehensive overview of all the key aspects of Human Resources. It will cover areas of compliance as well as best practices. You will receive a comprehensive workbook for the workshop and you will come away with Human Resource tools that you can start to use immediately upon your return to work that will add value to your organization. You will also come away with "best practices" in key areas such as Hiring, Termination, Discipline and Compensation.

Why should you attend:

Human Resource issues can make or break your business. Employment related laws are constantly changing and the penalties for non-compliance seem to be continually increasing. After this workshop you will have a much better understanding of all the basic employment laws that apply to businesses and be better able to avoid many of the pitfalls and traps that employers fall into that wind up in costly litigation and large amounts of lost time.

Ways to Limit Your HIPAA Vulnerability and Liability Webinar By MentorHealth
8/28/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Although there are many presentations, courses and services now available to help health care organizations to become HIPAA compliant, the real issue for the health care organization is to determine the most cost effective ways to understand their risks and to minimize the vulnerability to a breach and their liability when a breach does occur. This presentation focuses on understanding the responsibilities of the health care organization, the liabilities resulting from those responsibilities and the penalties that can be assessed as a result of a breach of patient protected health information.

The presentation addresses several issues relevant to both the vulnerability and the liability issues. First, the presentation describes how the health care organization can assess its HIPAA breach risk. The presentation discusses what a risk assessment is, why it is important and how to perform the risk assessment.

Based on the results of the risk assessment, the presentation takes the participants through how to mitigate these risks. This includes:

Issues that need to be addressed with the health care organization's software and hardware vendor(s)

The risks of a breach resulting from organizational members using social media, both inside the organization and at home; and,

The risks of a breach resulting from organizational members using mobile devices to access and store patient protected health information

The presentation also provides information regarding how the health care organization can use insurance to share the risk and how to keep insurance premiums to a minimum. At the conclusion of the presentation, the participant will have a checklist of items that can be used to understand and ways to limit the health care organizations HIPAA liabilities.

Why should you attend: There are so many ways a breach can occur - whether by accident, carelessness or or by intended actions. As a result, it is a common axiom that it is not if a health care organization will experience a breach, but when the health care organization will experience a breach.

The penalties for a HIPAA breach of a patient's protected health information can be severe. This includes monetary penalties as well as having to publicize your breach. We have all seen the newspaper articles and TV reports of large unauthorized disclosures of patient health information. If a disclosure includes the health information for 500 or more names, the health care organization must notify the Secretary of the Department of Health and Human Services (and this goes on the Office of Civil Rights web site for all to see) and notify local media (TV, Radio and newspapers).

Based on the Omnibus Rule, all business associates and agents of business associates have the same risk as the health care covered entities. Therefore, it is equally important for all business associates and agents of business associates to be cognizant of their vulnerabilities and liabilities.

This topic can be invaluable for an health care organization trying to understand their HIPAA vulnerability of a breach occurring and their liability when a breach does occur and looking for ways to minimize that vulnerability and liability. In discussing this topic, the presentation addresses opportunities for the health care organization to perform their risk assessments, as directed by the HIPAA regulations, how to mitigate the risks found in the assessment and some of the potential "safe harbors" that can reduce their risk.

The topic also spends considerable time reviewing the risks inherent in the traditional health care environment and provides references for the participant to address newer HIPAA breach risks resulting from the modern use of social media and the use of mobile devices.

Areas Covered in the Session:

Discuss what is a risk assessment and why it is important

Discuss how to assess the health care organization's risk and the vulnerability of a breach occurring

What is health care organization's liability when a breach occurs - including monetary penalties

The impact of the use of social media on the health care organization's HIPAA breach risk

The impact of the use of mobile devices on the health car organization's HIPAA breach risk

HIPAA's description of how to reduce the risk of a breach of electronic health information

The opportunities for acquiring HIPAA breach insurance

Who Will Benefit:

Chief Executive Officer

Chief Operating Officer

Managing Partner

Chief Financial Officer

Office Manager

Chief Risk Manager

IT Manager

Health Care Software Vendors wanting to ensure successful implementation

Jim Wener has over 40 years of experience in assisting health care organizations – both providers and payers- in identifying their automation requirements and helping these organizations select and successfully implement the automation most applicable for their needs. His systems and processes background and his experience in working with health care data has given Mr. Wener a unique perspective regarding the issues related to implementing new health care models and how they affect all of the stakeholders in the health care system.

How FDA Trains its Investigators to Review CAPA and What You Should Do to Prepare
8/27/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing
Summary:

During an inspection, FDA personnel will take a great deal of time reviewing your company's CAPA system. What will they look for? This session will discuss all the documents used by FDA to train their inspectors to review your CAPA system, some of which you may not be familiar with.

Best Practices for Governance of Enterprise Reference Data Management
8/27/2014 10:00 AM - 11:15 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview:

Experience shows that upwards of 80% of reference data may be used by multiple applications. Clearly, common reference data should be considered "enterprise data" and governed through the Data Governance group. Common reference data often crosses subject area lines and therefore difficult to identify which Data Steward may be responsible for managing it. Moreover, reference data can often be seen as an unwanted stepchild and left behind for applications to manage. However, many of the organization’s metrics and regulatory reporting may now depend upon common reference data.

Why should you attend: Reference Data Management is a valuable tool for the Data Governance team to enable quality and consistency across the enterprise. Often reference data is required to be managed consistently across disparate operational applications in order to effectively meet regulatory and governmental reporting. Inconsistencies and inaccurate aggregations can lead to significant fines, poor public publicity, and negative public reactions leading short term stock loses.

Areas Covered in the Session:

Identifying what is "common reference data" & which Data Stewards/SMEs are the trustees when reference data crosses Lines of Business.

Dealing with regulatory bodies & leveraging governmental agencies as sources of reference data

Creating new ways for informal governance of reference data while leveraging "natural entry points" to take advantage of business events in the business

Who Will Benefit:

Chief Data Officer

Director - Data Architecture

Director-Data Governance

Enterprise Solution Architect

Data Architect

Business Analyst

Getting The Most From AgileScrum Building a Great Product Increasing Efficiency And Quality Redu
8/21/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: Agile methodologies promote a project-management process that encourages frequent inspection and adaptation, and a leadership philosophy using teamwork, self-organization and accountability. Implementation of Scrum across industry runs the gamut from organizations that use all of the practices to organizations that only use a few of them. This means that just declaring, "We use Scrum," or "We are Agile," does not guarantee any specific level of Agile usage or quality.

This is a significant concern in a critical system environment (IT and safety-critical applications). However, Scrum can be used to develop critical software systems, but additional engineering and management practices need to be considered to ensure that robust products are developed and risk and inefficiencies are minimized. In this presentation we will explain how Scrum can be used in any organization and additions that can clarify customer needs, manage project risks and reduce inefficiencies while maintaining the benefits of Scrum.

Areas Covered in the Session:

Over-zealous use of the agile manifesto

Having a good enough backlog - quality and review

Do you have end-user involvement?

No release plan, only scoping for one iteration at a time

Embracing change - when is too much?

Ensuring that everything that needs to be done (e.g., design and test) can be done in an iteration

Managing Dependencies

Managing surprises, managing risk

Refactoring and code ownership isn't free

Self-organizing teams - can they self-organize?

Scrum masters don't like the things they have to do

Be careful with the "Pigs and Chickens" terms

What is design and where does it fit?

Who Will Benefit:

Senior Managers wanting to use Scrum and manage quality and risk

Project or program managers leading teams using Scrum

Scrum Masters / Coaches

Internal company Project Management Office (PMO) leaders and members

Internal process improvement coaches tasked with improving the organization's cost, schedule, quality performance and want to implement Scrum.

Holistic Operational Security Bringing Application Server and Network Security Together
8/27/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: This presentation will be An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self-monitoring, alerting and automated security system.

all techniques and tools reviewed are open source and not only freely available but strongly encouraged to use. a short list of technologies that will be reviewed include: rails, nginx, naxsi, rack-attack, brakeman, syslog, fail2ban, ossec and more..

Why should you Attend: Do you have applications on the internet? Have you security the application in addition to the server and network it runs on? Do all components talk together to provide security for the application and your data? This presentation will examine a Ruby on Rails application with integrated security controls and show how to integrate into a holistic operational security system that protects against and responds to threats to the system.

Areas Covered in the Session:

Application security best practices

Server / network security best practices

Integrating server / network and application security into holistic security system

Who Will Benefit:

Application Designers

Application Programmers

Security Engineers

System Administrators

Minimal IT/Security management

Public Clouds Myths and Realities
8/28/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: To correctly understand the benefits and issues surrounding public clouds, we first need to go back to the definition of "cloud." Different organizations (like NIST), vendors, and consultants have produced definitions that are often too verbose or address only one key characteristic of the cloud. It is important to identify the key concepts that differentiate the cloud from prior ways to procure and deliver computing resources.

It is useful to examine the hype surrounding the concept, propagated by a number of public cloud providers. While this is often anecdotal, this discussion helps customers challenge salespeople who recite marketing points without substance. It is also quite educational to see how certain vendors have changed their story as the new model emerged.

The next thing potential adopters need to know is what the categories of issues that cause all the fears about cloud computing are. Some of these fears are exaggerated: for example, availability issues, while they create a lot of adverse publicity, are not in fact as serious as people often fear, and there are good reasons for that. On the other hand, other issues are actually often understated (e.g., the problem of data residency in applications that manipulate data associated with some form of national interest or in highly regulated industry sectors).

After considering both extremes of this ongoing debate, a customer needs to develop a balanced vire - not only of the technology, but also of the sourcing and governance issues that can make a project fail. In support of this evaluation, it helps to understand the evolution of multi-tenant computing solutions from the start of timesharing 50 years ago, to the current types of offerings. There are common principles, but the cloud does bring something genuinely new compared to the initial IBM offerings of the 1960s. It is also important to read or listen to case studies, of which there are now a good number. Some of them are public, while others are shared in conferences and consortia. Vendor-published stories should be considered suspect. Finally, it is also important to understand the full scope of services that can be procured in the cloud: it is not just CRM applications, Web sites, or disk space, but it includes many more types of communication and collaboration capabilities, and this provides an opportunity to "start small" and get familiar with the issues while starting to save some money and decrease cycle times.

Once all this is understood, an organization needs to proceed in a pragmatic manner. Key steps of this journey have been documented in particular by the Cloud Standards Customer Council, which has published them in three successive guides, including a 9-step "Practical Guide to Cloud Computing" and two guides related to Cloud Service Agreements.

Why should you attend: Since the Cloud Computing model started taking off around 2007, the vendors have been promising miraculous benefits, and the naysayers have been raising the specter of major disruptions to performance and security.

Without a neutral source of information and a balanced perspective on the advantages and risks of public clouds, CIOs and IT sourcing managers will easily make the wtong decisions. If you adopt a cloud solution that is not well-suited to your needs, under a Service Level Agreement that is biased toward the vendor, you could indeed be faced with disruptions about which you will have ver little control. On the other hand, if you do not adopt any cloud solutions out of fear, your competitors may become more agile and your customers or users will ultimately find that you cannot deploy new capabilities fast enough. You will also continue to pay upfront for a fixed amount of software or hardware that you need to amortize over several years, instead of taking advantage of the cloud’s elasticity and its ability to replace capital investments with operating expenses.

The emergence of the cloud also changes the relationship between IT and the business. If IT cannot deliver new services fast enough, the business will start procuring those services on its own in the cloud. Ultimately, this can make IT irrelevant, and will lead the business to make poor choices in terms of redundant solutions, lack of integration, uneven security, etc. The business needs to understand what’s at stake, and IT needs to use clouds wisely in order to maintain its role as a partner to the business.

Areas Covered in the Session:

Introduction

Back to Basics: Defining "Cloud"

The Hype

The Fears

The Reality

Cloud Computing Use Cases

Cloud Computing, or "Cloud Whatever"

Pragmatics

Service Level Agreements

Conclusions

Who Will Benefit:

CIO

IT Manager (reports to CIO)

CFO

Sourcing Manager

Cloud Providers

Senior IT Consultants

Public Clouds Myths and Realities
8/28/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: To correctly understand the benefits and issues surrounding public clouds, we first need to go back to the definition of "cloud." Different organizations (like NIST), vendors, and consultants have produced definitions that are often too verbose or address only one key characteristic of the cloud. It is important to identify the key concepts that differentiate the cloud from prior ways to procure and deliver computing resources.

It is useful to examine the hype surrounding the concept, propagated by a number of public cloud providers. While this is often anecdotal, this discussion helps customers challenge salespeople who recite marketing points without substance. It is also quite educational to see how certain vendors have changed their story as the new model emerged.

The next thing potential adopters need to know is what the categories of issues that cause all the fears about cloud computing are. Some of these fears are exaggerated: for example, availability issues, while they create a lot of adverse publicity, are not in fact as serious as people often fear, and there are good reasons for that. On the other hand, other issues are actually often understated (e.g., the problem of data residency in applications that manipulate data associated with some form of national interest or in highly regulated industry sectors).

After considering both extremes of this ongoing debate, a customer needs to develop a balanced vire - not only of the technology, but also of the sourcing and governance issues that can make a project fail. In support of this evaluation, it helps to understand the evolution of multi-tenant computing solutions from the start of timesharing 50 years ago, to the current types of offerings. There are common principles, but the cloud does bring something genuinely new compared to the initial IBM offerings of the 1960s. It is also important to read or listen to case studies, of which there are now a good number. Some of them are public, while others are shared in conferences and consortia. Vendor-published stories should be considered suspect. Finally, it is also important to understand the full scope of services that can be procured in the cloud: it is not just CRM applications, Web sites, or disk space, but it includes many more types of communication and collaboration capabilities, and this provides an opportunity to "start small" and get familiar with the issues while starting to save some money and decrease cycle times.

Once all this is understood, an organization needs to proceed in a pragmatic manner. Key steps of this journey have been documented in particular by the Cloud Standards Customer Council, which has published them in three successive guides, including a 9-step "Practical Guide to Cloud Computing" and two guides related to Cloud Service Agreements.

Why should you attend: Since the Cloud Computing model started taking off around 2007, the vendors have been promising miraculous benefits, and the naysayers have been raising the specter of major disruptions to performance and security.

Without a neutral source of information and a balanced perspective on the advantages and risks of public clouds, CIOs and IT sourcing managers will easily make the wtong decisions. If you adopt a cloud solution that is not well-suited to your needs, under a Service Level Agreement that is biased toward the vendor, you could indeed be faced with disruptions about which you will have ver little control. On the other hand, if you do not adopt any cloud solutions out of fear, your competitors may become more agile and your customers or users will ultimately find that you cannot deploy new capabilities fast enough. You will also continue to pay upfront for a fixed amount of software or hardware that you need to amortize over several years, instead of taking advantage of the cloud’s elasticity and its ability to replace capital investments with operating expenses.

The emergence of the cloud also changes the relationship between IT and the business. If IT cannot deliver new services fast enough, the business will start procuring those services on its own in the cloud. Ultimately, this can make IT irrelevant, and will lead the business to make poor choices in terms of redundant solutions, lack of integration, uneven security, etc. The business needs to understand what’s at stake, and IT needs to use clouds wisely in order to maintain its role as a partner to the business.

Areas Covered in the Session:

Introduction

Back to Basics: Defining "Cloud"

The Hype

The Fears

The Reality

Cloud Computing Use Cases

Cloud Computing, or "Cloud Whatever"

Pragmatics

Service Level Agreements

Conclusions

Who Will Benefit:

CIO

IT Manager (reports to CIO)

CFO

Sourcing Manager

Cloud Providers

Senior IT Consultants

Understanding Your Data Before Building Predictive Models
8/26/2014 10:00 AM - 11:15 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: Data-driven decisions from big data, data science, and predictive analytics has quickly become among the most important areas of growth in organizations. Skills in these areas are specialized and often lacking in traditional education.

Effective predictive modeling does not require a PhD in mathematics, statistics, or hard science fields to do well. Many effective and even famous data miners and predictive modelers have BS or BA degrees in non-technical fields. However, it does require a qualitative understanding of what the predictive modeling process s about, what algorithms do, what their limitations are, how to change their behavior, and what kind of data is necessary for building predictive models.

Even individuals with experience in analytics understand that predictive modeling requires not only an understand of the science, but also decisions throughout a modeling project that are not (indeed cannot be) governed fully by the science; there is "art" and tradeoffs we as analysts make at every stage. These aren’t guesses, but are rather governed by the principles of predictive modeling: sampling, data distributions and their effects on summary statistics and the modeling algorithms, and how to determine if a model is good or not.

Areas Covered in the Session:

CRISP-DM - what are the main steps in the predictive modeling process

Key steps in defining modeling objectives

The most important principles in setting up data for modeling

Brief overview of key modeling algorithms

Matching model accuracy to business objectives

Who Will Benefit:

Data Scientists

Big Data Analysts

IT Professionals

Project Leaders

Business Analysts

Functional Analytic Practitioners

Anyone Overwhelmed with Data

6 Hour Virtual Seminar on Business Architecture Webinar By EITAGlobal
9/11/2014 8:00 AM - 11:00 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: This workshop provides participants with a toolset for developing a business architecture that goes well beyond the technology-oriented approaches typically employed by EA. Instead participants are shown how to apply a 5-level framework for modeling any organization, from the top down to the user and enabling technology.

This multi-layered approach makes visible all of the key processing sub-systems and shows how critical business drivers, such as profitability, cost, and quality can be linked to drive performance at all levels. This course expounds on the core concepts described in the book Rediscovering Value: Leading the 3-D Enterprise to Sustainable Success, co-authored by the presenter

Why should you attend: Enterprise Architecture (EA) is an entire discipline within IT, devoted to defining the major components of organizations to which technology is a supporting set of products and services. But EA experts are confused and disagreed about what an enterprise architecture is, how to depict one, and what purpose it serves in guiding technology development.

There is no one model or approach to EA. The Zachman Framework has been referenced again and again in numerous models but it’s never clear what the relationship is to a given EA and Zachman’s original work, nor is there any reason to consider the Zachman model to be correct or superior to anything else. EA is a discipline without any clear standards.

Areas Covered in the Session:

Distinguish between levels of business architecture

Apply a hierarchical structure to the depiction of business processing sub-systems and their linkages between business objectives and work objectives

Identify and practice with modeling tools proven to be most effective for each level of a business architecture

Distinguish between approaches to work system boundary setting that do and don’t support an effective business architecture model

Who Will Benefit:

Business architects

BPM practitioners

Enterprise Architects

Business process modelers

Measurement specialists

Speaker Profile:

Alan Ramias is a Partner of the Performance Design Lab (PDL). PDL is a consulting and training organization with decades of experience in applying BPM and performance improvement. The founder of PDL was the late Dr. Geary Rummler who co-authored the book Improving Performance: How to Manage the White Space on the Organization Chart, which helped trigger the process improvement/reengineering movement. Alan and his partners continue to evolve and expand the theory base and methodologies introduced in Improving Performance to include breakthrough approaches to management systems, measurement, strategy, and organization structure design and implementation. Alan has consulted with dozens of companies on performance management and measurement, helping to install effective, practical process management and measurement systems.

Events Map