Subscribe to Events Feeds

205 Results Found

Hack Night
8/26/2014 6:00 PM - 10:00 PM
Assembly Coworking Space Calgary Canada
Event Listing

Every Tuesday night from 6pm to 10pm, “Hack Nights” come alive with hustlers, hackers and hipsters coming together to work on their start-up ideas. If you are working on something tech related, and are in the pre-investment stage, this event is for you!

Weekly Open Make Night
8/26/2014 6:00 PM - 9:00 PM
Tampa Hackerspace Tampa, Florida United States
Event Listing

Lets get together to build some cool projects and meet some very cool people. Join us to work on your stuff, bounce ideas off of members and socialize.

Occasionally, we'll throw in a small class.

Morning Startup
8/27/2014 7:30 AM - 8:30 AM
Spacecubed Perth Australia
Event Listing

The early riser's information injection. Morning Startup is the most popular of Perth's startup meetups. An excellent networking opportunity and a good selection of speakers.

How FDA Trains its Investigators to Review CAPA and What You Should Do to Prepare
8/27/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing

During an inspection, FDA personnel will take a great deal of time reviewing your company's CAPA system. What will they look for? This session will discuss all the documents used by FDA to train their inspectors to review your CAPA system, some of which you may not be familiar with.

Best Practices for Governance of Enterprise Reference Data Management
8/27/2014 10:00 AM - 11:15 AM
Online seminar Fremont, California United States
Event Listing


Experience shows that upwards of 80% of reference data may be used by multiple applications. Clearly, common reference data should be considered "enterprise data" and governed through the Data Governance group. Common reference data often crosses subject area lines and therefore difficult to identify which Data Steward may be responsible for managing it. Moreover, reference data can often be seen as an unwanted stepchild and left behind for applications to manage. However, many of the organization’s metrics and regulatory reporting may now depend upon common reference data.

Why should you attend: Reference Data Management is a valuable tool for the Data Governance team to enable quality and consistency across the enterprise. Often reference data is required to be managed consistently across disparate operational applications in order to effectively meet regulatory and governmental reporting. Inconsistencies and inaccurate aggregations can lead to significant fines, poor public publicity, and negative public reactions leading short term stock loses.

Areas Covered in the Session:

Identifying what is "common reference data" & which Data Stewards/SMEs are the trustees when reference data crosses Lines of Business.

Dealing with regulatory bodies & leveraging governmental agencies as sources of reference data

Creating new ways for informal governance of reference data while leveraging "natural entry points" to take advantage of business events in the business

Who Will Benefit:

Chief Data Officer

Director - Data Architecture

Director-Data Governance

Enterprise Solution Architect

Data Architect

Business Analyst

Holistic Operational Security Bringing Application Server and Network Security Together
8/27/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing

Overview: This presentation will be An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self-monitoring, alerting and automated security system.

all techniques and tools reviewed are open source and not only freely available but strongly encouraged to use. a short list of technologies that will be reviewed include: rails, nginx, naxsi, rack-attack, brakeman, syslog, fail2ban, ossec and more..

Why should you Attend: Do you have applications on the internet? Have you security the application in addition to the server and network it runs on? Do all components talk together to provide security for the application and your data? This presentation will examine a Ruby on Rails application with integrated security controls and show how to integrate into a holistic operational security system that protects against and responds to threats to the system.

Areas Covered in the Session:

Application security best practices

Server / network security best practices

Integrating server / network and application security into holistic security system

Who Will Benefit:

Application Designers

Application Programmers

Security Engineers

System Administrators

Minimal IT/Security management

Live Webinar on FDA Adverse Event Reporting for Drugs and Medical Devices
8/27/2014 1:00 PM - 3:00 PM
Online Mississauga, Ohio Canada
Event Listing

This web seminar presents an overview of FDA’s Adverse Event Reporting Systems for Drugs and Medical Devices. Adverse Event Reporting for Investigational Drugs/Medical Devices and post-approval Adverse Event reporting will be covered.

Seminar on Using Statistics in Compensation By David Wudyka
8/28/2014 9:00 AM - 8/29/2014 6:00 PM
Hilton Grand Vacations Suites at the Flamingo Las Vegas, Nevada United States
Event Listing


Compensation professionals use "descriptive statistics" to convey the characteristics of data used in the development and management of pay programs. In this webinar, David J. Wudyka will describe a series of statistical concepts used by Compensation practitioners. The concepts to be covered include ideas such as pay structure development; "control points" in pay ranges, including minimums, midpoints and maximums; weighted and unweighted averages; means, medians and modes; weighted and unweighted averages; regression and correlation analysis; standard deviations, variance and data ranges; compa-ratios, and independent and dependent variables; and more.

All of these concepts will be explained in the context of their application in pay programs, including building a pay structure (i.e. sets of pay ranges), analyzing pay survey data, predicting

Executive base pay rates and total compensation from one or more independent variables, making associations in pay data between independent and dependent variables, and using comp ratios in merit pay programs and their budgeting.

Ways to Limit Your HIPAA Vulnerability and Liability Webinar By MentorHealth
8/28/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing

Overview: Although there are many presentations, courses and services now available to help health care organizations to become HIPAA compliant, the real issue for the health care organization is to determine the most cost effective ways to understand their risks and to minimize the vulnerability to a breach and their liability when a breach does occur. This presentation focuses on understanding the responsibilities of the health care organization, the liabilities resulting from those responsibilities and the penalties that can be assessed as a result of a breach of patient protected health information.

The presentation addresses several issues relevant to both the vulnerability and the liability issues. First, the presentation describes how the health care organization can assess its HIPAA breach risk. The presentation discusses what a risk assessment is, why it is important and how to perform the risk assessment.

Based on the results of the risk assessment, the presentation takes the participants through how to mitigate these risks. This includes:

Issues that need to be addressed with the health care organization's software and hardware vendor(s)

The risks of a breach resulting from organizational members using social media, both inside the organization and at home; and,

The risks of a breach resulting from organizational members using mobile devices to access and store patient protected health information

The presentation also provides information regarding how the health care organization can use insurance to share the risk and how to keep insurance premiums to a minimum. At the conclusion of the presentation, the participant will have a checklist of items that can be used to understand and ways to limit the health care organizations HIPAA liabilities.

Why should you attend: There are so many ways a breach can occur - whether by accident, carelessness or or by intended actions. As a result, it is a common axiom that it is not if a health care organization will experience a breach, but when the health care organization will experience a breach.

The penalties for a HIPAA breach of a patient's protected health information can be severe. This includes monetary penalties as well as having to publicize your breach. We have all seen the newspaper articles and TV reports of large unauthorized disclosures of patient health information. If a disclosure includes the health information for 500 or more names, the health care organization must notify the Secretary of the Department of Health and Human Services (and this goes on the Office of Civil Rights web site for all to see) and notify local media (TV, Radio and newspapers).

Based on the Omnibus Rule, all business associates and agents of business associates have the same risk as the health care covered entities. Therefore, it is equally important for all business associates and agents of business associates to be cognizant of their vulnerabilities and liabilities.

This topic can be invaluable for an health care organization trying to understand their HIPAA vulnerability of a breach occurring and their liability when a breach does occur and looking for ways to minimize that vulnerability and liability. In discussing this topic, the presentation addresses opportunities for the health care organization to perform their risk assessments, as directed by the HIPAA regulations, how to mitigate the risks found in the assessment and some of the potential "safe harbors" that can reduce their risk.

The topic also spends considerable time reviewing the risks inherent in the traditional health care environment and provides references for the participant to address newer HIPAA breach risks resulting from the modern use of social media and the use of mobile devices.

Areas Covered in the Session:

Discuss what is a risk assessment and why it is important

Discuss how to assess the health care organization's risk and the vulnerability of a breach occurring

What is health care organization's liability when a breach occurs - including monetary penalties

The impact of the use of social media on the health care organization's HIPAA breach risk

The impact of the use of mobile devices on the health car organization's HIPAA breach risk

HIPAA's description of how to reduce the risk of a breach of electronic health information

The opportunities for acquiring HIPAA breach insurance

Who Will Benefit:

Chief Executive Officer

Chief Operating Officer

Managing Partner

Chief Financial Officer

Office Manager

Chief Risk Manager

IT Manager

Health Care Software Vendors wanting to ensure successful implementation

Jim Wener has over 40 years of experience in assisting health care organizations – both providers and payers- in identifying their automation requirements and helping these organizations select and successfully implement the automation most applicable for their needs. His systems and processes background and his experience in working with health care data has given Mr. Wener a unique perspective regarding the issues related to implementing new health care models and how they affect all of the stakeholders in the health care system.

Public Clouds Myths and Realities
8/28/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing

Overview: To correctly understand the benefits and issues surrounding public clouds, we first need to go back to the definition of "cloud." Different organizations (like NIST), vendors, and consultants have produced definitions that are often too verbose or address only one key characteristic of the cloud. It is important to identify the key concepts that differentiate the cloud from prior ways to procure and deliver computing resources.

It is useful to examine the hype surrounding the concept, propagated by a number of public cloud providers. While this is often anecdotal, this discussion helps customers challenge salespeople who recite marketing points without substance. It is also quite educational to see how certain vendors have changed their story as the new model emerged.

The next thing potential adopters need to know is what the categories of issues that cause all the fears about cloud computing are. Some of these fears are exaggerated: for example, availability issues, while they create a lot of adverse publicity, are not in fact as serious as people often fear, and there are good reasons for that. On the other hand, other issues are actually often understated (e.g., the problem of data residency in applications that manipulate data associated with some form of national interest or in highly regulated industry sectors).

After considering both extremes of this ongoing debate, a customer needs to develop a balanced vire - not only of the technology, but also of the sourcing and governance issues that can make a project fail. In support of this evaluation, it helps to understand the evolution of multi-tenant computing solutions from the start of timesharing 50 years ago, to the current types of offerings. There are common principles, but the cloud does bring something genuinely new compared to the initial IBM offerings of the 1960s. It is also important to read or listen to case studies, of which there are now a good number. Some of them are public, while others are shared in conferences and consortia. Vendor-published stories should be considered suspect. Finally, it is also important to understand the full scope of services that can be procured in the cloud: it is not just CRM applications, Web sites, or disk space, but it includes many more types of communication and collaboration capabilities, and this provides an opportunity to "start small" and get familiar with the issues while starting to save some money and decrease cycle times.

Once all this is understood, an organization needs to proceed in a pragmatic manner. Key steps of this journey have been documented in particular by the Cloud Standards Customer Council, which has published them in three successive guides, including a 9-step "Practical Guide to Cloud Computing" and two guides related to Cloud Service Agreements.

Why should you attend: Since the Cloud Computing model started taking off around 2007, the vendors have been promising miraculous benefits, and the naysayers have been raising the specter of major disruptions to performance and security.

Without a neutral source of information and a balanced perspective on the advantages and risks of public clouds, CIOs and IT sourcing managers will easily make the wtong decisions. If you adopt a cloud solution that is not well-suited to your needs, under a Service Level Agreement that is biased toward the vendor, you could indeed be faced with disruptions about which you will have ver little control. On the other hand, if you do not adopt any cloud solutions out of fear, your competitors may become more agile and your customers or users will ultimately find that you cannot deploy new capabilities fast enough. You will also continue to pay upfront for a fixed amount of software or hardware that you need to amortize over several years, instead of taking advantage of the cloud’s elasticity and its ability to replace capital investments with operating expenses.

The emergence of the cloud also changes the relationship between IT and the business. If IT cannot deliver new services fast enough, the business will start procuring those services on its own in the cloud. Ultimately, this can make IT irrelevant, and will lead the business to make poor choices in terms of redundant solutions, lack of integration, uneven security, etc. The business needs to understand what’s at stake, and IT needs to use clouds wisely in order to maintain its role as a partner to the business.

Areas Covered in the Session:


Back to Basics: Defining "Cloud"

The Hype

The Fears

The Reality

Cloud Computing Use Cases

Cloud Computing, or "Cloud Whatever"


Service Level Agreements


Who Will Benefit:


IT Manager (reports to CIO)


Sourcing Manager

Cloud Providers

Senior IT Consultants

Events Map