Subscribe to Events Feeds

223 Results Found

The Idea Hub
7/23/2014 1:00 AM - 9/1/2014
London London United Kingdom
Event Listing
Summary:

Idea Hub connects innovators and entrepreneurs with big established companies

We are now running a call for some great new ideas so please check our website

The International Conference on Education Psychology and Society
4/23/2015 8:00 AM - 4/25/2015 4:00 PM
The Qube Pudong Shanghai China
Event Listing
Summary:

2015 International Conference on Education, Psychology and Society (ICEPAS 2015) is scheduled to take place in Shanghai, China, from April 23-25, 2015.

Third Annual SciTech Hookup Where Ideas are Promiscuous
10/30/2014 5:00 AM - 9:00 AM
MEET Las Vegas, Nevada United States
Event Listing
Summary:

Third Annual SciTech Hookup: Where Ideas are Promiscuous . . . Greg Horowitt, author of innovation community phenomenon book, The Rainforest, to keynote science and technology event in Las Vegas

Thriving Local Business Training Series
9/11/2014 6:00 PM - 12/11/2014 9:00 PM
FVTC-Oshkosh Riverside Campus Oshkosh, Wisconsin United States
Event Listing
Summary:

A business training series for growers, processors & purveyors of local food. This training series targets entrepreneurs who have started or are thinking about starting a food-related venture that is not tied to large-scale, commodity-style production or sales.

Total Founder 2014
9/3/2014 9:00 AM - 11/18/2014 5:00 AM
Total Founder - Cookeville,TN
Event Listing
Summary:

Total founder is a 12-week immersive experience pairing a dynamic entrepreneurial curriculum with personalized leadership training and technical mentorship. Total Founder equips participants with the leadership, entrepreneurial skills, and technical knowledge needed to start and lead successful high-growth companies.

Understanding Your Data Before Building Predictive Models
8/26/2014 10:00 AM - 11:15 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: Data-driven decisions from big data, data science, and predictive analytics has quickly become among the most important areas of growth in organizations. Skills in these areas are specialized and often lacking in traditional education.

Effective predictive modeling does not require a PhD in mathematics, statistics, or hard science fields to do well. Many effective and even famous data miners and predictive modelers have BS or BA degrees in non-technical fields. However, it does require a qualitative understanding of what the predictive modeling process s about, what algorithms do, what their limitations are, how to change their behavior, and what kind of data is necessary for building predictive models.

Even individuals with experience in analytics understand that predictive modeling requires not only an understand of the science, but also decisions throughout a modeling project that are not (indeed cannot be) governed fully by the science; there is "art" and tradeoffs we as analysts make at every stage. These aren’t guesses, but are rather governed by the principles of predictive modeling: sampling, data distributions and their effects on summary statistics and the modeling algorithms, and how to determine if a model is good or not.

Areas Covered in the Session:

CRISP-DM - what are the main steps in the predictive modeling process

Key steps in defining modeling objectives

The most important principles in setting up data for modeling

Brief overview of key modeling algorithms

Matching model accuracy to business objectives

Who Will Benefit:

Data Scientists

Big Data Analysts

IT Professionals

Project Leaders

Business Analysts

Functional Analytic Practitioners

Anyone Overwhelmed with Data

Validation and 21 CFR 11 Compliance of Computer Systems Intermediate to Advanced
9/11/2014 9:00 AM - 9/12/2014 6:00 PM
Hilton Garden Inn Washington DC Downtown Washington, District of Columbia United States
Event Listing
Summary:

This course will build on the Validation and 21 CFR 11 Compliance Basic Course, to give hands on experience on executing on the computer systems validation of a system, and to discuss related activities such as Validation Master Plan, Infrastructure Qualification, Project Management for Validation and Validation of Test Tools

Ways to Limit Your HIPAA Vulnerability and Liability Webinar By MentorHealth
8/28/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Although there are many presentations, courses and services now available to help health care organizations to become HIPAA compliant, the real issue for the health care organization is to determine the most cost effective ways to understand their risks and to minimize the vulnerability to a breach and their liability when a breach does occur. This presentation focuses on understanding the responsibilities of the health care organization, the liabilities resulting from those responsibilities and the penalties that can be assessed as a result of a breach of patient protected health information.

The presentation addresses several issues relevant to both the vulnerability and the liability issues. First, the presentation describes how the health care organization can assess its HIPAA breach risk. The presentation discusses what a risk assessment is, why it is important and how to perform the risk assessment.

Based on the results of the risk assessment, the presentation takes the participants through how to mitigate these risks. This includes:

Issues that need to be addressed with the health care organization's software and hardware vendor(s)

The risks of a breach resulting from organizational members using social media, both inside the organization and at home; and,

The risks of a breach resulting from organizational members using mobile devices to access and store patient protected health information

The presentation also provides information regarding how the health care organization can use insurance to share the risk and how to keep insurance premiums to a minimum. At the conclusion of the presentation, the participant will have a checklist of items that can be used to understand and ways to limit the health care organizations HIPAA liabilities.

Why should you attend: There are so many ways a breach can occur - whether by accident, carelessness or or by intended actions. As a result, it is a common axiom that it is not if a health care organization will experience a breach, but when the health care organization will experience a breach.

The penalties for a HIPAA breach of a patient's protected health information can be severe. This includes monetary penalties as well as having to publicize your breach. We have all seen the newspaper articles and TV reports of large unauthorized disclosures of patient health information. If a disclosure includes the health information for 500 or more names, the health care organization must notify the Secretary of the Department of Health and Human Services (and this goes on the Office of Civil Rights web site for all to see) and notify local media (TV, Radio and newspapers).

Based on the Omnibus Rule, all business associates and agents of business associates have the same risk as the health care covered entities. Therefore, it is equally important for all business associates and agents of business associates to be cognizant of their vulnerabilities and liabilities.

This topic can be invaluable for an health care organization trying to understand their HIPAA vulnerability of a breach occurring and their liability when a breach does occur and looking for ways to minimize that vulnerability and liability. In discussing this topic, the presentation addresses opportunities for the health care organization to perform their risk assessments, as directed by the HIPAA regulations, how to mitigate the risks found in the assessment and some of the potential "safe harbors" that can reduce their risk.

The topic also spends considerable time reviewing the risks inherent in the traditional health care environment and provides references for the participant to address newer HIPAA breach risks resulting from the modern use of social media and the use of mobile devices.

Areas Covered in the Session:

Discuss what is a risk assessment and why it is important

Discuss how to assess the health care organization's risk and the vulnerability of a breach occurring

What is health care organization's liability when a breach occurs - including monetary penalties

The impact of the use of social media on the health care organization's HIPAA breach risk

The impact of the use of mobile devices on the health car organization's HIPAA breach risk

HIPAA's description of how to reduce the risk of a breach of electronic health information

The opportunities for acquiring HIPAA breach insurance

Who Will Benefit:

Chief Executive Officer

Chief Operating Officer

Managing Partner

Chief Financial Officer

Office Manager

Chief Risk Manager

IT Manager

Health Care Software Vendors wanting to ensure successful implementation

Jim Wener has over 40 years of experience in assisting health care organizations – both providers and payers- in identifying their automation requirements and helping these organizations select and successfully implement the automation most applicable for their needs. His systems and processes background and his experience in working with health care data has given Mr. Wener a unique perspective regarding the issues related to implementing new health care models and how they affect all of the stakeholders in the health care system.

Webinar On User Acceptance Testing
8/25/2014 1:00 PM - 2:00 PM
Online Mississauga, Ohio Canada
Event Listing
Summary:

Current regulations expect that all users are appropriately trained and that must include being trained how to effectively perform UAT.

Webinar On Prevention of Sexual Harassment
8/21/2014 1:00 PM - 2:00 PM
Online Mississauga, Ohio Canada
Event Listing
Summary:

This course is designed to create a positive work environment, free from harassment and retaliation.This course provides you with a clear understanding of appropriate steps to enforce the policy and reporting harassment which is not limited to sexual misconduct or behavior.

Events Map