- Time:
- 12:30am-2:00am
- Description:
- Globalskywatch.com is a website documenting news and information about stratospheric geoengineering. there is a guest speaker and then open mike to discuss problems and concerns about the climate mitigation program.
- Time:
- 12:00am-1:00am
- Description:
- On the second Thursday of every month at 8 pm Eastern, Elizabeth Scala hosts a live, interactive, online workshop centered on a different topic each month to speak to the truth that there are many parts that make up the entire well being. Join this energizing, experiential, and fun webinar setting to learn health tips, tools, and techniques you can take and immediately implement into your busy life. Some previous topics include: Create Nutrition for Self, Passion & Purpose for Healthy Career, A World of Positive for Self, Create Energy for Self, and many more. This workshop is free so come join Coach Scala and the group to uplift, enhance, and improve your total well-being. To register visit http://elizabethscala.com/biggest-challenge/wellness-webinars/. Contact Coach Scala with any questions at support@elizabethscala.com.
If you need to fill in any particulars, here are some fast-facts for you:
Date: 2nd Thursday of each month
Time: 8 pm Eastern
Price: Free
Website: http://elizabethscala.com/biggest-challenge/wellness-webinars/
Email: support@elizabethscala.com
Phone: (410) 929-0081
- Time:
- 1:30pm-9:30pm
- Description:
- Course Description:
This interactive two day seminar will cover the various licensing methods (for Drugs, Biologics & Combination Products) by which applicants can file for product licenses (Marketing Authorizations) in one or multiple Member States, as well as fully across all Member States of the European Union. This course specifically outlines and discusses the structure of the regulatory agencies at the EU-level and across specific Member States. Course content will explain which procedures are available for which products and then will follow the license processing steps for each pathway.
This two day interactive course on European Clinical Trial Directive will cover:
Requirements for conducting Clinical Studies across the EU via the requirements of the EU Clinical Trial Directive (for Drugs, Biologics & Combination Products);
Recent updates on EU-GCP associated with the Directive;
Highlights of the new EU Pharmacovigilance Directive, as it relates to studies and helpful tips into working with the European regulators;
Changes to the Clinical Trial Directive that are being contemplated and may receive modification.
Learning Objectives:
Attendees will leave the Course clearly understanding the requirements under the current Directive. This course is designed to provide an overview of the regulatory environment throughout Europe and will provide training in:
-How the EU and individual countries within Europe interact
-Which registration procedure to use
-How regulations effect product development strategies
-Pricing issues – Coordinated filing vs. Individual filing
-Understanding the concerns/issues of European Regulatory Personnel
-How to negotiate with the regulators
-Information necessary for effective submissions
-Strategies for streamlining the registration application process for faster approval
-The advantages and disadvantages of various registration procedures
-How to efficiently initiate trials…..first patient, first visit
-How to link the strategy of Country Selection to an ultimate EU Licensing Plan
-Efficiently implementing studies via project teams and CROs at the National and multi-state level
-How to stay compliant…..What can make the difference in your data passing Regulatory scrutiny
-Related area-GCP and PV-reporting updates
-EUCTD vs. FDA Regulations
- Time:
- 3:00pm-4:30pm
- Description:
- Overview: Most, if not all, of you have probably heard about the 10 Immutable Laws of Security. Unfortunately, a lot of organizations don't take security very seriously. They don't believe anything bad can happen to them, until it does. Securing servers in general is important, whether they are file and print servers or database servers, but securing Active Directory Domain Controllers is even more important. Why? Because Active Directory Domain Controllers allow you to centrally manage and secure your Windows network. You can decide who has access to certain resources, how long should the access be granted, and from which computer can the user access the resources.
If we don't secure our Active Directory servers properly we are at risk. If we secure them too much it can potentially be difficult to get our job done. Somehow we need to find a good balance to make sure that our security settings aren't impeding our work. In other words, we need some Best Practices for Securing Active Directory.
Why should you attend: This Webinar is helpful for Active Directory administrators. It teaches them how to properly secure the Active Directory Domain Controllers. A vast majority of servers in the world are running Microsoft Windows operating system. This makes them a favorite target of bad guys. In this Webinar you will learn some of the best practices for securing your Active Directory environment.
Active Directory controls access to the network resources. It only makes sense to ensure Active Directory are properly secured. Some administrators feel that because Active Directory servers run on their internal network, they are safe from the bad guys. According to researchers, the majority of attack on an average network are from inside the network. When the manager hires you as an Active Directory administrator, he/she counts on you as being the expert and relies on your expertise to protect the business data and assets. If the servers are hacked, it's your job that's on the line and the management won't listen to any excuses.
Securing your Active Directory environment using best practices is key to securing your Windows network infrastructure. Among other things, this Webinar will teach you how to better secure your Active Directory Domain Controllers by reducing the attack surface, how to look for signs of compromise, and how to secure the administrative accounts.
Areas Covered in the Session:
10 immutable laws of security
Minimizing known security threats to Active Directory
Identifying sources of threat
Securing various administrative accounts
Minimizing attacks on Domain Controllers from 16-bit apps
Deciding which services are necessary to run on Domain Controllers
Reducing Active Directory attack surface
Dealing with local administrator accounts
Understanding the protected accounts and groups in Active Directory
Group Policy settings for securing Active Directory
Who Will Benefit:
Network Administrator
Systems Administrator
Active Directory Administrator
Network Engineer
Security Architect
Network Security Engineer
Information Systems Security Manager
Speaker Profile:
Zubair Alexander is a Microsoft MVP, a Microsoft Certified Trainer, and the founder of SeattlePro Enterprises, LLC, an IT training and consulting company. He holds more than 25 industry certifications including MCT, MCSE, MCSA, MCDST, MCITP, MCTS, MCP+I, MCSA 2000/2003: Security, MCSE 2000/2003: Security, CNA, A+, Network+, Security+, CTT+ and CIW. His experience covers a wide range of spectrum: trainer, consultant, systems administrator, security architect, network engineer, author, technical editor, college instructor and public speaker.
Zubair is known worldwide for his articles on Microsoft technologies, written as a contributing editor and online columnist for Windows IT Pro Magazine and Microsoft Certified Professional (MCP) magazine. He teaches various Microsoft products and has written extensively on Microsoft technologies for several years. His specialties include network security, Active Directory, SharePoint, IIS, Terminal Services, and Virtualization. As a Microsoft-endorsed trainer, he has trained Microsoft Consulting Services (MCS) and Microsoft Product Support Services (PSS) technicians for years. In addition to writing Professor Windows columns for Microsoft TechNet, he has been involved in writing certification exam questions for Microsoft. Some of his other activities for the past decade at Microsoft include working as a Subject Matter Expert on various projects, teaching train-the-trainer courses, consulting for MCS, writing for TechNet Magazine, speaking at seminars and Webinars, working with ISA Server group, writing white papers and case studies, doing technical reviews of Microsoft Learning courses, etc.
Zubair was awarded a Bachelor of Science (B.S.) in Aeronautics and Astronautics Engineering from the University of Washington in Seattle. He also holds a B.S. in Mathematics. He taught at North Seattle Community College after he earned his Computer Information Systems (CIS) degree. He serves on the Windows Server International Customer Advisory Board (ICAB) and is the founder of the Seattle IT Pro User Group.
- Time:
- 3:00pm-3:30pm
- Description:
- This training on financial transactions risk management will highlight a myriad of issues that can exist in a company’s payment process. The reasons may be simple, but the outcome can be expensive.
Why Should You Attend:
How many times has your AP staff gotten a call from a supplier asking for a payment status? Received a duplicate Invoice? Invoice from an unknown supplier? Approved invoice after payment is due? The list goes on.
This webinar will discuss the many ways that a routine process of accounts payable can be flipped around and become a source of pain. This can be from an administrative standpoint or even worse a negative monetary situation. Proper checks and balances and possibly the introduction of software are the best ways to combat these exceptions from occurring or at least minimize the impact when they do occur. It is important to understand the differences that exist in various solutions so that you can make an educated decision on what works best for you. Not only are there savings from a monetary perspective but this will also give you visibility into cash flow and better prepare for month end and year end closes and audits.
This session will equip attendees with many of the answers to determine a better course of action. There are many things to consider such as regulatory compliance, cost, savings, IT resources, etc.
Areas Covered in the Webinar:
-What are the common payment issues?
-What will these solutions do for me?
-Who else can benefit from these solutions?
-What are some best practices?
-What will this cost?
Who Will Benefit:
-Accounts Payable Professionals
-Accountants
-Financial Officers
-Risk Officers
-Internal Auditors
- Time:
- 3:00pm-4:30pm
- Description:
- Overview: Join noted author and agile project management expert Kevin Aguanno as he explains the misconceptions and the underlying truths about faster software delivery using agile methods and uncovers the preconditions to achieving speed. Along the way he will discuss the more easily achievable benefits of agile and how speed comes with higher levels of agile maturity.
Why Should You Attend : When asking people why they want to use agile delivery methods, one of the most common reasons I hear is that they want to "deliver faster." It seems that there is a widespread frustration with the way administrative bureaucracy, inefficient development processes, and overburdening governance processes impede project performance. In many cases, an apparently simple, short development project cannot be delivered quickly because of the process and governance overheads that stretch the project out across the calendar and act as a multiplier on the estimated project budget.
Of course, project sponsors are frustrated with this situation - I'd be frustrated too. Needless red tape slowing down a project is a liability that should be rooted out and eradicated within our organizations. The problem, however, is that agile methods are not about delivering faster; rather, their benefits are in other areas.
Areas Covered in the Session:
What is driving our need for speed
Agile benefits achievable at LOW maturity levels
Agile benefits achievable at HIGH maturity levels
Preconditions for faster agile software delivery
Case studies
Q&A
Who Will Benefit:
Project Managers
Delivery Managers
Development Leads
Software Developers
Portfolio Managers
Software Testers
Speaker Profile:
Kevin Aguanno With over 25 years of managing complex systems integration and software development projects, Kevin Aguanno is known in the industry for his innovative approaches to solving common project management problems. He focuses on two project management specialty areas: agile project management and troubled project recovery. As a well-known keynote speaker, trainer, and coach in agile management methods, Aguanno has taught thousands of people how to better manage high-change projects by using techniques from Scrum, Extreme Programming, Feature-Driven Development, OpenUP and other agile methods. He is a frequent presenter at conferences and private corporate events where he delights audiences with practical advice peppered with fascinating stories from his own experiences in the trenches practicing agile project management.
He has taught for several years at the University of Waterloo and the University of Toronto where he won the coveted SCS Excellence in Teaching Award, and is a regular guest lecturer in software engineering and project management classes at several other universities. Kevin Aguanno holds a B.A. from the University of Western Ontario, and a Master's in Project Management from the School of Business and Public Management at George Washington University. He is a PMI-certified Project Management Professional (PMP), and his competency is certified by IBM as a Certified Executive Project Manager and by the International Project Management Association (IPMA) as a Certified Senior Project Manager (IPMA Level B). He is certified by the Scrum Alliance as both a Certified ScrumMaster (CSM) and Certified Scrum Professional (CSP), by the Project Management Association of Canada as a Certified Agile Project Manager (Cert.APM), and the Project Management Institute has awarded him its PMI Agile-Certified Practitioner (PMI-ACP) designation.
Aguanno is an active member of the Project Management Institute (U.S.A.) including the Information Systems SIG, the Association for Project Management (U.K.), the Project Management Association of Canada where he is a founding director and the current President, the Agile Alliance, and the Scrum Alliance. He is accredited by the International Project Management Association (founded in Switzerland) as a project management competency assessor, and he performs IPMA assessments for the ASAPM in the U.S.A. and the PMAC in Canada. In 2013, the PMAC formally recognized Aguanno with its highest honor by naming him a Fellow of the Project Management Association of Canada (FPMAC). Kevin Aguanno is the author of over thirty books, audiobooks, DVDs, and CD-ROMs in addition to a number of articles published in magazines and journals worldwide.
Price List:
Live : $239.00
Corporate live : $479.00
Recorded : $289.00
- Time:
- 6:00pm-7:00pm
- Description:
Your Invited...
Learn how to bring your body to the Party, Eat, and be Merry
This one-hour teleclass is for those of you who want to learn two techniques that will carry you through fabulously during the Holiday Season and Beyond.
• Get control of your eating patterns during any event.
• Envision your body and you having joy plus control when in new environments or away from home.
• Ready to bring your body to the Party with out going home guilty?
• Discover how to defeat your stress patterns during the holidays.
No need to ever worry about sabotaging you and your body...this is a time to rejoice and enjoy...bringing your body along for the ride with confidence and lightness.
ENJOY the Holidays with a Smile, and be in control of your eating habits. Bring in the New Year with a healthy lifestyle that is easy to maintain.
Don't forget to RSVP by clicking the "Join US" button.
- Time:
- 8:00pm-8:40pm
- Description:
- Steps Your Business Can Take to Mitigate the Risks and Ensure a Smooth Transition to The Cloud
This webinar is for executives who are serious about cloud computing, but are unsure of how to securely and efficiently make the transition.
We've done the reseach for you.
When researching cloud options, it's important to understand the risks, bottlenecks, and productivity traps of moving to a cloud computing provider.
During this webinar, you'll learn:
1.The Signs It’s Time To Migrate To The Cloud
2.Steps To Managing Cloud Expectations
3.How to Identify & Mitigate the Cloud Risks
4.How to Ensure a Smooth Transition To The Cloud
(If you're a cloud computing beginner, you may want to start with our 'Cloud Computing 101' webinar)
- Time:
- 1:00am-4:00am
- Description:
- Shalonda 'Treasure' Williams is honored to invite you to the Motivation For Today Empowerment Call. Every Wednesday night at 9 p.m. EST, you will join Coach Treasure, as she is affectionately called, as she equips, inspires, motivates, encourages and even challenges you to live out your best life yet! The life where you know just who you are and what you have to offer! Each week there will be a different topic fir to empower You to T.A.P. into your true worth... Spirit! Soul! & Body! Join us on facebook for a daily dose of motivation and for call updates!
- Time:
- 3:00pm-4:00pm
- Description:
- This training on trade compliance will provide the attendees best practices for performing due diligence reviews relative to both import and export laws and regulations to avoid fines and penalties.
Why Should You Attend:
If your company is contemplating a merger, acquisition or any other business activities with international implications you must be mindful of United States import and export laws and regulations. Even the mere purchase of assets of another corporation may lead to the acquisition of significant trade related risks and liability. Violations of US import regulations and export controls can lead to severe fines and penalties.
Under the doctrine of successor liability, the successors of an acquired company may be held liable for that company’s import or export violations even if they occurred prior to the acquisition. Similarly, if a company acquires another company with compliance problems and these problems continue even after the acquisition, the continuing operation can create new and independent liability on the part of the successor company. Further, in the past few years the U.S. Government has increased its scrutiny and sometimes prevented proposed business combinations potentially affecting "national security." As a result, it is essential that the acquiring company conduct a thorough due diligence review and identify any possible issues including: import, export, deemed exports, FCPA, or anti-boycott issues.
This webinar will provide detailed information on conducting a due diligence review.
Areas Covered in the Webinar:
This webinar will focus on:
-U.S. export controls under the Export Administration Regulations (EAR) and the International Traffic in Arms Regulations (ITAR)
-Economic sanctions and embargoes
-Customs issues
-Foreign Corrupt Practices Act
-CFIUS national security reviews of foreign acquisitions
-Foreign ownership, control, or influence (FOCI) of cleared companies
Who Will Benefit:
-Export Compliance Personnel
-Transportation and Logistics Personnel
-Inside Counsel
-International Customer Service
-Sales & Marketing Personnel
-Freight Forwarders who have export responsibility
-Warehousing, Inventory and Security Personnel
-IT Personnel
- Time:
- 5:00pm-5:30pm
- Description:
- Many organizations today are making good use of SharePoint 2010 for collaboration with internal resources and external parties, taking advantage of features within the tool that allow SharePoint to be able to use multiple directories to provide for user authentication. In the most recent versions of SharePoint (2010-2013), federation and claims are the foundation for access. However for medium to large enterprises, while deployment of claims on the SharePoint side seems like a no-brainer, multiple domains, forests, and various non-AD directories can turn authentication ,authorization, group management, and profile management into mine fields.
This session focuses on best practices for architecting SharePoint with claims for authentication, authorization, and profile management in environments with multiple directories. Lisa Grady from Radiant Logic will discuss how federating identity is key to turning a complicated heterogeneous identity environment into a trusted Identity provider that can deliver the claims needed by SharePoint.
- Description:
- Overview: This webinar illustrates that we all deal more or less effectively-implicitly and explicitly-with multiple deadline-constrained activities in our daily lives. Despite that, when people must deal with developing and managing products and services that have deadlines, they disregard their intuition and instead think in very limited and generally inaccurate terms about deadlines and deadline-based resource management. Because almost no computer systems support deadlines, it is necessary to convert the natural deadlines of systems and applications to priorities.
This conversion is inherently lossey, and is made worse by the misunderstandings about deadlines. This webinar next explains deadlines and shows how the common view by computer systems practitioners is a simple, special, and limiting, case. Then, the webinar reveals deadlines as a special case in a powerful comprehensive time constraint framework. The webinar ends with a brief glimpse of how these insights have been successfully applied to create more effective time-constrained systems and services.
Why Should you Attend: Deadlines are part of everyone's personal and professional lives. We deal with them-and concurrent tasks contending for resources-in a combination of more or less effective implicit and explicit ways. Deadlines are also a fundamental timeliness concept in many computer systems and other types of products and services. There is a vast body of theory and practice in the field of deadline-based resource management. But ironically, most people who automate resource management for deadline-based products and services have and explicitly use only a limited understanding of deadlines, and of deadline-based resource management algorithms. A conspicuous example is that for real-time computing systems, people imagine that deadlines are only either met or missed, and that missed deadlines are a failure-which is usually incorrect in their lives and in most systems.
One reason is insufficient technical knowledge about deadlines and deadline-based resource management algorithms. Another reason is that almost no computing systems support the specification and use of deadlines, although many other kinds of products and services use them for managing timeliness. Instead, virtually every computer system provides priorities, which are only a simple small scale ordering mechanism without inherent semantics (e.g., urgency). So the inherent deadlines of applications and systems have to be converted into the artifact of priorities, which is a common source of design errors.
The conversion is especially tricky in distributed systems. This conversion is inherently lossey, and is made worse by the misunderstandings about deadlines. Most embedded and other computing system practitioners have no formal training in the concepts and techniques of deadline-based resource management and concomitant priority mapping. Instead they rely on their own and others' experience by being clever using ad hoc but generally weak schemes that are not amenable to assurance for non-trivial systems. The formal deadline-based methods (e.g., rate monotonic) that real-time researchers focus on are applicable only to simple static niche cases. This webinar offers an easily understood novel insight to the ways people intuitively manage tasks with deadlines (that they sometimes don't recognize as such) in their lives which can lead to better products and services using a comprehensive understanding of deadlines and priorities.
Areas Covered in the Session:
Casual and informal use of deadlines in peoples' personal and professional lives
Synchronization of concurrent activities having deadlines
Shared resources among deadline-constrained activities
Dynamic uncertainties that potentially affect activity completion times with respect to deadlines
Earliness, tardiness, lateness, and why missing a deadline is not necessarily a failure
Deadline-based scheduling algorithms known and not known in the computing community but used elsewhere for products and services
Deadlines as a special case in a general framework of completion time constraints
Priorities, urgency, importance
Mapping deadlines to priorities
Deadlines in distributed systems
Who Will Benefit:
System Engineers
Software Engineers
Programmers
Managers at any level of system or Software Development Organizations
Speaker Profile:
E. Douglas Jensen is internationally recognized as one of the original pioneers, leading visionaries, and accomplished engineers of real-time and distributed real-time systems. His seminal work led to what is believed to be the world’s first deployed commercial product for distributed real-time computer control systems in 1975, and shortly thereafter he made important contributions to the first commercial distributed computing product for industrial process control. For eight years he was on the faculty of the Computer Science Department, and the Electrical and Computer Engineering Department, at Carnegie Mellon University. There he created and directed the one of the world's largest academic real-time research group, as well as teaching both software and hardware graduate level courses. Before and after CMU, he held senior technology leadership positions in several major computer companies. He continues to advance both the principles and the best practices of real-time systems by contributing to both research and product development. He publishes scholarly papers in prestigious professional society journals and conferences, over 150 as of 2013. He is also active in real-time standards organizations – e.g., he was a member of the team that wrote Sun's Real-Time Specification for Java (and wrote the Foreword for the book), began the Distributed Real-Time Specification for Java, and was the co-architect and co-author of the OMG Real-Time CORBA specification.
He is the founder of Time-Critical Technologies, Inc., which provides premiere consulting and related services for corporations and government agencies world-wide on real-time embedded systems. His services include architecture, engineering, design, implementation, technical and business development advise to corporate executives and Boards of Directors, courses, meeting organization and management, technical audits, proposal and report writing, expert witnessing, and more.
Price List:
Live : $239.00
Corporate live : $479.00
Recorded : $289.00
- Description:
- Overview: This webinar Online Research Tools covers an extremely comprehensive portal of online research tool resources and sites that are available on the Internet. These resources and sources will allow you to discover the many pathways available through the Internet to find the most effective and timely online research tool to manage and collaborate with members of your team.
Understanding all the latest Internet resources available for finding that specifically needed research tool opens new and exciting doors to becoming more experienced in business innovation and creation for you personally and for your company entity. You will learn how to discover, understand and implement these research tool resources for your existing or new business start up.
Why should you attend: You will learn how to access a plethora of online research tools from the Internet that have been preselected and filtered for you. These online research tools will give you the ability to understand and implement many methods, resources and applications to discover more efficient ways to obtain key research results that can manage and collaborate with your team on and off the Internet in an efficient and non techie manner. Being prepared with quality and effective research tools and web resources will take away the fear, uncertainty and doubt associated in today’s dynamic changing and fast paced management and New Economy environment.
Areas Covered in the Session:
Online Research Tools
Finding the Exact Research Tool On the Internet for Your Requirements
Discovering Relevant Online Research Tools
Understanding the Latest Online Research Tools and Their Importance
Open Source or Proprietary - Which Research Tool Best Fits Your Needs
Who Will Benefit:
Marketing Directors
Marketing Assistants
IT Department Supervisors
Administrative Assistants
Research Directors and Assistants
Speaker Profile:
Marcus P. Zillman M.S., A.M.H.A.; eSolutions Architect and Executive Director of the Virtual Private Library™, Creator/Founder BotSpot.com and Executive Producer of BOT2000 and BOT2001 conferences for internet.com; has designed, developed and created online databases and information retrieval access scripts for the last thirty years.
He is a benefactor member of the Internet Society, participant in the IETF Users Services Working Group and was selected to participate in the U.S. Government's Open Meeting Electronic Forum as a non governmental expert on information retrieval and access. He is the Creator/Founder of BotSpot.com® "The Spot for all Bots and Intelligent Agents on the Net" one of the Internet's most awarded sites (over 400 awards) and is considered the definitive resource for Bots, Intelligent Agents and Artificial Intelligence on the Internet. PC Magazine selected it as one of the Top 100 Best Web Sites on the Internet in 1998 as well as selected by NetGuide as the Top 10 of all Internet sites during all of 1998. BotSpot® was acquired by internet.com LLC in January 1999. Currently Mr. Zillman is Executive Director of the Virtual Private LibraryTM creators of 53 Subject Tracer™ Information Blogs, writes, consults, tutors and delivers keynote speeches on The Future of the Internet: eCommerce Security, Cloud Computing, HTML5 and IPV6.
He is also a member of American Society for Information Science & Technology, Association of Computing Machinery, IEEE Computer Society, The Society for the Study of Artificial Intelligence and the Simulation of Behaviour, American Association for Artificial Intelligence, P2P Working Group and the gPulp Working Group. He has also authored over 80 professional Internet MiniGuides and Manuals on subject specific resources, hosted and produced over 160 Internet-101 weekly television shows, writes a monthly column on the latest Internet Resources as well as publishes a monthly newsletter titled Awareness Watch™. His white papers have been downloaded over two million times.
Price List:
Live : $239.00
Corporate live : $479.00
Recorded : $289.00
- Description:
- Overview: You can outsource services but you cannot outsource liability and responsibility. This webinar will discuss techniques that firms which outsource their IT environments can utilize to maximize their relationships with IT outsourcing vendors while exercising strong management control over the vendors. From a strategic point of view, this webinar will examine the internal organizational changes that may be required when an IT domain is handed over to a third party.
In this webinar we will take a close look at the major components that make up an end-to-end outsourcing event:
Onboarding
Compliance management
Risk management
Incident management
Auditing
Another word for outsourcing is ‘partnership'. However, it is a partnership where both participants must know their roles and have the ability to execute their duties flawlessly. It is not an equal partnership; the customer is ultimately responsible for all outcomes. The customer cannot ‘give away the farm' and let the vendor be in full control, but the vendor needs a substantial control do their job properly. However, both parties need to be accountable to one-another and keep each other in check as their relationship evolves. This Webinar will address the interface between the vendor and the customer and discuss ways to maximize its effectiveness.
Why Should you Attend: It is very expensive to migrate an existing IT environment into a third-party datacenter or even to set up a new IT system from scratch. Therefore, making sure you have the internal capabilities and organization to work with the people, processes and technology used by a third-party outsourcing provider will ensure that you build a successful partnership. This full vendor-lifecycle approach is often overlooked until problems or conflicts arise and then both the vendor and the client are in a difficult and costly situation.
Areas Covered in the Session:
Overview of procurement-centric model and why it became the dominant model
Discussion of vendor management-centric model and why it is becoming the preferred approach
Managing Vendors as they adapt to far reaching changes in the industry: cloud computing, mobility, Big Data, and social information systems
Vendor performance reviews that will improve relationships and improve outcomes
What IT roles should never be outsourced
What can happen when an outsourcing partnership goes bad?
What companies are doing it right?
Developing vendor standards and objectives to align with business objectives and mitigate risk
Managing to individual clauses within the Service Level Agreement
Who Will Benefit:
CIOs
CTOs
Vendor Management Personnel
Technical Staff Responsible for business outcomes
IT Director
VP IT
ERP Manager
Infrastructure Manager
Technical Architect
Application Support Staff
Analyst IT operations
Manager Systems Operations
Network Manager
Network Engineer
IT Project Manager
Speaker Profile:
John Ripma is an independent consultant and the founder of Technical Ink, LLC, a consulting firm specializing in content marketing for technology-based companies. With Technical Ink, John helps companies produce high quality written materials for a wide variety of purposes (whitepapers, webinars, blog posts, brochures, technical manuals, training/educational documents, and other purposes).
John started in the field of Information Technology in 1981 when he co-founded Applied Personnel Technology, one of the first PC-based software development and consulting firms in the country. Since then, John has been closely involved with technology in a number of roles such as project manager, business development manager, senior consultant, vice president, and CEO. Over the years, John’s focus has been on helping organizations analyze, select, install and maintain complex enterprise class systems. He has worked on many large and mission critical projects that involved PeopleSoft, JD Edwards, or SAP. He also was an instructor at the SAP Academy. Additionally, with the resurgence in infrastructure outsourcing and cloud computing, John has been working closely with a number of international firms to help them migrate their enterprise systems into hosted environments.
The world of technology continues to grow at a dizzying pace and, to help his clients keep pace, John keeps up-to-date on the latest developments such as in-memory computing, Big Data, mobility, data security, software defined data centers, infrastructure architecture, technology enabled business processes, and system integration.
Price List:
Live : $239.00
Corporate live : $479.00
Recorded : $289.00
- Time:
- 1:00pm-7:00pm
- Description:
- This comprehensive webinar will include classes from recognized ethics & compliance industry experts discussing different aspects of a well-rounded compliance program.
The one-day agenda will include:
• Conducting Lawful and Effective Global Investigations
• Modernizing Your Code of Conduct
• GSK: Early Lessons Learned from the Chinese Bribery Scandal
• Managing compliance/quality in Healthcare
• And 10 additional sessions!
Register today! You’ll receive the detailed agenda with session descriptions and full speaker bios in the near future.
If you have questions, please contact Rob Walton
rwalton@navexglobal.com 208-359-8123 x455.
Learn more about Navex Global Here: www.NAVEXGlobal.com
- Time:
- 3:00pm-4:30pm
- Description:
- This webinar on the use of social media by covered entities will discuss the risks, compliance requirements, the effective policies and procedures that you should have in place when using social media.
Why Should You Attend:
-Can you pay loyal patients a fee for posting positive comments?
-What about a frequent patient discount?
-Are you prepared for the fallout from your workforce members posting of unflattering comments about you, other workforce members and even patients?
-What can you appropriately do about unhappy patients who generate ugly or possibly defamatory posts?
-Do you know what your written policies and procedures should say about social media use?
-What should you add to your sanctions policy?
-How to use social media effectively during a community-wide disaster?
This 90-minute webinar will discuss the numerous legal and compliance risks that surround a covered entity’s creation and use of social media to attract and retain patients.
Areas Covered in the Webinar:
-Why use social media at all?
-Why are the dangers of using social media to carry out professional functions with patients?
-What are the common sense limits of promoting the practice on social media?
-Why prohibit workforce members’ references to the practice -when posting to their own or others’ social media pages?
-What should be covered in an effective workforce social media use policy?
-Gaining by-in and building workforce support for effective social media policies and procedures
-Trust but verify compliance
-Preparing for the worst: responding to vicious or even defamatory patient social media posts
Who Will Benefit:
This webinar will provide valuable assistance to any covered entity or business associate including medical offices, group practices, hospitals, academic medical centers, insurers, law firms, accounting firms, shredding companies, data storage facilities, systems vendors, and billing services. Workforce personnel who should attend include:
-Compliance director
-CEO
-CFO
-Privacy Officer
-Security Officer
-Information Systems Manager
-HIPAA Officer
-Chief Information Officer
-Health Information Manager
-Healthcare Counsel/lawyer
-Office Manager
-Contracts Manager
Instructor Profile:
Paul Frisch, served as the General Counsel to a physician trade association for almost 25 years, until 2009. He is the Compliance Services Director for Apgar and Associates, where he counsels covered entity and business associate clients nationally on issues related to HIPAA Privacy and Security Rules, including compliance strategic planning, breach investigation, risk analysis, compliance audits, and Health Information Exchange implementation.
- Time:
- 3:00pm-4:00pm
- Description:
- The webinar will discuss the do’s and don’ts for using social media in marketing FDA-regulated products. Common issues, misconceptions, perceptions, and possible solutions will be discussed. The presentation will to familiarize you with the current FDA rules and help you plan for developments expected in the near future.
Why Should You Attend:
The FDA recently held hearings addressing drug companies' use of social media and other online platforms to advertise. FDA also released a guidance document about manufacturers’ obligation regarding off-label information available about their products. Another guidance document about use of social media in marketing is expected soon. In addition, FDA issued several letters to manufacturers indicating the rules for using social media.
But there is still much confusion among FDA regulated companies how to use social media for marketing effectively and still be compliant with regulations. How can medical device, pharmaceutical and other FDA regulated industries use social media channels like Facebook, Twitter, YouTube and LinkedIn to get their message out in a way that is compliant with advertising and promotion regulations found in the Food Drug & Cosmetic Act? This 60-minute webinar will present ways to use social media that are compliant with FDA regulations. Practical regulatory strategies will be suggested to ensure compliance and balanced social media activity.
Learning Objectives:
-At the end of the seminar, the attendees will be familiar with the following
-Recent FDA guidance on controlling dissemination of information via social media.
-Common practices for using social media such as Facebook, YouTube, and Twitter.
-Meeting with FDA to discuss social media submissions.
-Trends in FDA review of social media information.
-Do's and Don'ts for managing social media for marketing your product.
Areas Covered in the Seminar:
-How Direct-to-consumer-advertising (“DTCA”) guidance impacts the use of social media.
-Common ways companies are currently using social media.
-FDA advertising and promotion issues related to social media.
-A structure for analysis of responsibility for promotion in social media.
-Handling unsolicited requests for off-label information.
-Recent trends in FDA enforcement actions involving social media.
-Recent discussions about social media in marketing of FDA-regulated products.
Who Will Benefit:
The following individuals or disciplines will benefit from attending this Webinar:
-Compliance Management
-Regulatory Vice Presidents, Directors and Managers
-Attorneys – In-house or Outside Counsel
-Senior executives of pharmaceutical and device firms
-Marketing Management
-Sales Vice presidents, Directors and Managers
-Clinical Management
- Time:
- 3:00pm-4:00pm
- Description:
- This HR compliance session will help the attendees to develop skills to plan, develop, and deliver training programs; to overcome presentation anxiety & learn how to customize training for the needs of diverse groups.
Why Should You Attend:
Does your organization utilize in-house trainers? Do these trainers lack the program development and delivery skills they need to be successful?
Being a part of this webinar, attendees will learn:
-How to gear training to their trainees’ needs and develop appropriate training objectives, curricula, and materials.
-How to utilize creative ideas to ensure trainee participation and involvement.
-How to handle difficult situations in the classroom and turn challenges into learning opportunities.
-How to transfer learning from the classroom to the workplace.
Areas Covered in the Webinar:
Program Development
Learn how to:
-Prepare program objectives
-Turn objectives into learning activities & materials
- Factor-in varied learning styles
-Develop participative activities, discussions, and question & answer sessions
-Develop ways to transfer learning from the classroom to on-the-job.
Program Delivery
Learn how to:
-Improve presentation skills & overcome nervousness
-Develop & utilize a training agenda
-Handle difficult classroom situations
Who Will Benefit:
-Managers
-Supervisors
-Leaders
-Human Resource Professionals
-Shift Leaders
-Executives
-Development Directors
-Office Managers
Instructor Profile:
Judi Clements, President of Judi Clements Training & Development, in Clifton Park, NY, is a veteran training professional who offers training, coaching and keynotes in the areas of management, communication, customer service, & staff development. Judi is a frequently sought after conference speaker and workshop presenter who offers cutting-edge programs with a “laugh-while-you-learn” approach. She is a NYS certified teacher, trained mediator, and qualified Myers Briggs ® Personality Type facilitator. She is a past recipient of the American Society of Training & Development’s “Corporate Trainer of the Year” award and the Girl Scouts’ “Outstanding Community Leader” award. Visit her on www.judiclements.com, You Tube, Facebook, LinkedIn, Tumblr, and Twitter.
- Time:
- 8:00pm-9:30pm
- Description:
- Ramp Up Your Revenues! Insider Secrets to Increasing Your ROI
Are you too crazy busy between marketing and serving clients, and yet your cash flow situation isn't where you want? Did you think you'd be MUCH better off by now, and you're really frustrated - and puzzled, and frankly a little at a loss as to exactly how to increase your revenues.
What seems to be the hold-up?
Join us for a special training webinar where I'll reveal specific strategies to help you increase your revenues... without working like a dog!
This webinar is for you if you...
* Are working like crazy while still not making enough money
* Feel your earnings are limited because you're selling your time for money
* Are afraid to increase your rates and don't know how to go about it
Ready to sign up? Visit us at http://sueclement.com/rev2.php
OK... Let's Increase Your ROI!
First of all, you should know that you're not alone! As it turns out, a lot of entrepreneurs fall into the "busy trap" of working hard but not making enough and chances are you may too.
Join us on November 14th at Noon PT (3:00pm ET, 8:00pm GMT) for an eye-opening training Webinar!
Here's what you'll discover...
* Three easy ways to increase your revenues this week... Yes! THIS week.
* The main reason why most entrepreneurs are spinning their wheels while not making
enough money.
* They key to being able to charge more money and getting clients who are glad to pay it.
* Why you must act NOW to supercharge your revenues!
Imagine getting a big increase in your revenues! Impossible? Not at all. Go ahead and sign up now for our training webinar and get ready to gain insightful information and start making the money you deserve!
Get ready to Ramp Up Your Revenues!
http://sueclement.com/rev2.php
But who am I and why should you listen to me?
Hi, I'm Sue Clement, and I must admit that I too have struggled to break through earning blockages in the past. Often I felt like I was haunted by some kind of invisible barrier that kept me from earning what I deserved and desired. But then I discovered 5 strategies that quickly shifted my situation and opened me up to immediate revenue growth. Working with hundreds of clients for the past 13 years I've accelerated my clients' success with these same strategies. They work for me AND my clients… and they'll work for you too!
Join us for Ramp Up Your Revenues! Then use what you learn and get ready for an immediate increase in your cash flow!
http://sueclement.com/rev2.php
- Time:
- 3:00pm-4:30pm
- Description:
- This HR compliance training will cover auditing human resources practices for compliance and liability to help identify and correct any areas that may not comply with applicable laws and/or do not comply with company policy.
Why Should You Attend:
Auditing the Human Resources of a company is not only a means to perform "due diligence" for your company, but is a measuring tool to determine what needs to be improved to achieve a higher standard of excellence within your company and fair and consistent handling of human resource issues leading to a more content and productive workforce.
In this ComplianceOnline Webinar our expert panelist Marna Hayden will discuss how to audit the human resource for compliance and liability and for helping to identify and correct areas that may not comply with applicable laws and /or do not comply with company policy.
Learning Objectives:
Understand importance of an HR Audit
Determine responsibility for a Human Resources Audit
Learn key areas of an HR Audit: what should be covered
Understand how to use information to build a stronger, safer and better organization
Areas Covered in the Seminar:
-Staffing the Organization.
-Legal Postings.
-Equal Employment Opportunity.
-Salary Administration
-Employment.
-Payroll and Taxes.
-Orientation.
-Terminations.
-Training and Development.
-Employee Relations and Communications.
-Record Maintenance.
Who Will Benefit:
-Vice Presidents, Directors, & Managers of Human Resources
-Employment Managers
-Employee Relations Professionals
-Chief Talent Officers
-HR Coordinators/Supervisors
-Recruiters
-HR Administrators
-HR Analysts
-Auditors
Instructor Profile:
Marna Hayden, is founder and president of Hayden Resources Inc. She has 30+ years in the field of human resource management and is certified as a senior professional in human resources (SPHR). Hayden Resources Inc. provides management and human resources consulting and outsourcing services to small businesses and nonprofits, and specialized services and training to larger organizations. Hayden has held senior offices in the banking, retail, and service industries and is an adjunct faculty member for DeSales University.