Rethinking Your Approach to Computer Software Assurance and Validation

Join us at KENX Computer Systems Validation & Software Assurance University
December 6th - 8th | Philadelphia, PA

We are headed to Philadelphia and we want you there!

Interested in learning the keys to cybersecurity and data integrity in order to not be overwhelmed by challenges in this ever-changing industry? Join Scott Cady and Mariano Mattei for their presentations at KENX Computer Systems Validation & Software Assurance University

Mark Your Agenda!

Scott Cady

Scott CadySenior Consultant
Understand the Intersection of Data Integrity Compliance and CSA
Tuesday, December 6th at 4:00 PM - 4:30 PM ET




What You’ll Learn: 

  •  Define Data Integrity as resulting from well-documented, validated GxP computerized systems based on risk to patient safety
  • Understand the importance of a lifecycle approach to data and the value of business processes in relation to the data lifecycle
  • Data Integrity integration and maintenance throughout the lifecycle phases of GxP computerized systems
  • Transitioning from traditional validation to Computer Software Assurance based on critical thinking and providing a value-based approach to testing
  • Using risk-based testing combined with good software engineering principles to right-size the testing of GxP Systems
  • A look at Maturity as it relates to Data Integrity, Process

Takeaway Tools: 

  • Data Integrity & Computer Software Assurance Aligned Framework Model
  • Definitions, & references to GAMP and regulatory
  • Consolidated ISPE GAMP Data Integrity Maturity Model


Mariano Mattei

Mariano MatteiVice President of Cybersecurity Solutions
Cybersecurity – Addressing Malicious Threats in a Highly Regulated Industry
Wednesday, December 7th at 2:25 PM - 3:05 PM ET



What You’ll Learn: 

  • Cybersecurity landscape
  • Regulation awareness
  • Important standards
  • Malicious threats defined
  • Common attack methods
  • How to protect against malicious threats
  • The importance of cybersecurity assessments

Takeaway Tools: 

  • Malicious threat protection checklist
  • Cybersecurity methodology flow chart
  • Cybersecurity self-assessment

Make sure to catch our speakers not only up on stage, but afterwards at our booth to meet them and our other Azzurians attending the event. See you soon!

Register Today! 

Life Science Moves FAST

Stay in the know by signing up for our newsletter. We’ll share company successes, industry must-know information, and keep you updated on the latest events you don’t want to miss.