News
Entertainment
Science & Technology
Life
Culture & Art
Hobbies
News
Entertainment
Science & Technology
Culture & Art
Hobbies
There is no doubt that virtual care must be a key element of every health system’s strategy going forward. In this column, AvaSure CEO Adam McMullin offers a four-point blueprint for CIOs looking to demonstrate its value and begin the journey.
Whereas AI has some excessive enthusiasm around it (especially in the clinical realm), automation is a no-brainer. Well, not exactly. That's because -- though automation may work magic when done on the right workflow, at the right time, and in the right way -- getting all three right (without understanding some nuances) is a long shot. In this practical and timely webinar, we'll speak to leaders about those nuances to give others the best chance of success. With staffing shortages (due to burnout and other issues) on the rise and patient satisfaction all-important, this is one webinar you can't afford to miss.
In recent years, artificial intelligence has been making significant inroads in sepsis management. And although these digital tools certainly have their flaws, they’re moving the industry in the right direction, according to John Halamka, MD, and Paul Cerrato of Mayo Clinic Platform. In recent years, artificial intelligence has been making significant inroads in sepsis management. And although these digital tools certainly have their flaws, they’re moving the industry in the right direction, according to John Halamka, MD, and Paul Cerrato of Mayo Clinic Platform.
With breaches becoming increasingly common, it’s important to have a set of standards to help healthcare organizations safeguard data, according to Joey Meneses, CTO at Akron Children’s Hospital. In this guest blog, he provides guidance covering a number of areas, from access controls to breach notifications to patch management. With breaches becoming increasingly common, it’s important to have a set of standards to help healthcare organizations safeguard data, according to Joey Meneses, CTO at Akron Children’s Hospital.
One of the most difficult aspects of the Change Healthcare breach? The fact that it “could have easily been addressed with proper hygiene.” During a recent discussion, our cybersecurity experts discussed the key aspects of a solid cybersecurity strategy, from maintaining visibility to detecting (and reacting to) red flags. One of the most difficult aspects of the Change Healthcare breach? The fact that it “could have easily been addressed with proper hygiene,” said Chris Bowen of ClearData during a recent discussion, which also included Chris Akeroyd and Vince Fitzpatrick.
NIST’s Cybersecurity Framework provides a solid structure for managing threats and vulnerabilities; however, there is still “a paramount need to enhance the skillsets of cybersecurity practitioners, particularly in the functions of Respond and Recover,” according to Dennis Leber, PhD. In this piece, he talks about what it will take to close the gap. There’s a need for more adequate skills and knowledge among cybersecurity practitioners in managing and recovering from cybersecurity incidents, according to Dennis Leber, PhD. In this piece, he discusses what it will take to bridge the gaps in NIST’s Cybersecurity Framework and strengthen the overall cyber infrastructure.
Having access to all of the images relating to a patient’s care isn’t merely a benefit for physicians – “It changes my ability to make a diagnosis,” said Alex Towbin, MD, Associate CMIO at Cincinnati Children’s. During a recent webinar, he and co-panelists Joseph Marion and Lenny Reznik discussed the critical role of enterprise imaging, and what it takes to device a sound strategy. With a solid enterprise imaging strategy, providers can more easily capture, distribute, view, and exchange images, which can result in more effective diagnoses, said our panelists in a recent discussion.
With organizations heavily focused on EHR rollouts and optimizations, the “critically important” administrative systems took a back seat, said Craig Kwiatkowski. In this interview, he talks about the “major overhaul” Cedar-Sinai has undergone to centralize services, the keys to success with its Accelerator program, and his interesting career background. In this interview, CIO Craig Kwiatkowski talks about the “major overhaul” Cedar-Sinai has undergone to centralize services, the keys to success with its Accelerator program, and his interesting career background.
Recent industry-shaking events have made it clear that serious points of risk lurk throughout healthcare. They’ve also revealed that operational risk and IT security risk are deeply intertwined, making it incumbent for CISOs and CIOs to work with others in their health systems – from the chief risk officers, to clinical leaders, to emergency management – to help develop a joint picture of third-party risk that analyzes the implications of losing services not only from a cyber outage, but for any reason. In this timely webinar, we’ll speak to leaders who are committed to going back and reviewing key third-party service providers through the lens of recent learnings so appropriate levels of total risk can be assigned, and plan Bs can be developed.
Given the rapid advancements in technology, mounting cybersecurity threats, and the increasing importance of data-driven decision making, the CIO’s responsibilities have grown both in scope and complexity, according to Jigar Shah. In this piece, he provides practice advice on how leaders can successfully navigate this changing environment. “The CIO has a big job, and it is getting even bigger,” according to Jigar Shah. In this piece, he talks about the dramatic shift in healthcare leadership roles, and how CIOs and others can successfully navigate the myriad challenges, from cybersecurity threats to budget cuts.
Enterprise imaging is similar in scope to the EHR, and it allows clinical users to properly identify, acquire, store, manage and visualize imaging studies from across their enterprise, regardless of device, modality, department, service line or location. Historically, each imaging department made its own decisions and purchases regarding these services, often resulting in siloes with significant storage and software duplication, inefficient routing, perilous database synchronization and user frustration (or worse, apathy). With major potential upside when done right, health systems can adopt a true enterprise imaging strategy, led by executive IT members with proportional governance oversight and clinical buy-in from leaders in key domains, such as Radiology, Cardiology, Endoscopy, PoCUS and more. Join us as we speak to leaders and have them share their experiences and opinions on how a true enterprise imaging strategy can be executed.
When it comes to protecting ePHI, the current technology stack doesn’t quite stack up, according to Larry Ponemon and David Ting. During a recent discussion, they shared findings from a recent study and provided insights into how increasing visibility can help decrease security vulnerabilities. Without visibility into where sensitive data lives and how it’s being used, “you have nowhere to start,” said Tausight CTO and Co-Founder David Ting during a discussion with Larry Ponemon.
Despite the myriad benefits, including increased patient engagement, telehealth remains an option, not an imperative. As a result, “we are still underperforming as an industry compared to the promises made and the vision we’ve spun,” said Joseph Kvedar, MD. In this piece he examines why that’s the case and how healthcare can turn the tide. When it comes to telehealth, "we are still underperforming as an industry compared to the promises made and the vision we’ve spun, especially in the case of traditional healthcare providers," said Dr. Joseph Kvedar.
As cyberattacks continue to mount – and place healthcare organizations under the spotlight – the CISO role has becoming increasingly important, according to Nick Giannas and Zachary Durst of WittKeiffer. In this piece, they share findings from a recent report on the most significant challenges facing cybersecurity leaders and how they can be overcome. As cyberattacks continue to mount – and place healthcare organizations under the spotlight – the CISO role has becoming increasingly important, according to Nick Giannas and Zachary Durst of WittKeiffer.
As healthcare organizations become increasingly reliant on third parties – and subsequently, take on more risk – cybersecurity leaders find themselves in a difficult spot, according to Adam Zoller and Sanjeev Sah. During a recent webinar, they talked about the CISO’s role in improving business continuity and why ownership doesn’t always matter. As healthcare organizations become increasingly reliant on third parties – and subsequently, take on more risk – cybersecurity leaders find themselves in a difficult spot, said CISOs Adam Zoller and Sanjeev Sah during a recent webinar.
Integrating threat intelligence into the cybersecurity strategy can strengthen defenses, but it can also contribute to a broader understanding of the threat landscape, said CISO Jason Alexander. In this piece, he discusses the foundations of threat intelligence and how to weave it into the fabric of security programs. Integrating threat intelligence into the cybersecurity strategy can strengthen defenses, but it can also contribute to a broader understanding of the threat landscape, said CISO Jason Alexander.
“We don’t have a nursing shortage. We have a shortage of nurses who want to work at the beside,” said Trish Gallagher. In a recent interview, she talked about why she walked away from a CNIO role, how technology (and the pace of adoption) has contributed to burnout, and the cultural change that’s needed to create a better environment.
Patients don’t view their experience as “a series of encounters,” and therefore, neither should health systems, said Dick Taylor, MD, of BJC Healthcare. “They need a continuous, consistent experience.” During a recent webinar, he and co-panelists Zafar Chaudry and Aditya Bansod talked about what leaders on the provider and vendor sides can do to make that happen. As patient experiences continue to evolve, one this is for sure: there isn’t one core system that can meet every need. For leaders, this can result in a host of challenges, said our panelists during a recent webinar.
As AI continues to build momentum, a group of health systems, government agencies and tech companies are banding together to develop “a set of guidelines for safe, secure and trustworthy AI algorithms,” according to John Halamka, MD. In this blog, he outlines the five main objectives of the network. As AI continues to build momentum, a group of health systems, government agencies and tech companies are banding together to develop “a set of guidelines for safe, secure and trustworthy AI algorithms,” according to John Halamka, MD.
It's the dirty little secret among healthcare cyber professionals -- they don't know where all their ePHI is; not even close. And while those professionals are not to blame (healthcare workflows and, thus, data flows are messy business); they do have to get their arms around the problem. The first step? Understand it. In this unique webinar, we'll explore the results of a Ponemon study on the state of ePHI in healthcare to learn just how bad the problem is and where the data might be. Then, we'll explore ways to secure it and, in the process, hopefully give cyber professionals one less reason to be up at night.
With the right strategy and partnerships in place, there’s a way to “address the health system’s key challenges around capacity constraints while emphasizing patient comfort and privacy,” said Heather O’Sullivan, President of the Healthcare at Home Division at Mass General Brigham. In a recent interview, she talked about what it takes to break with tradition and establish a new model for care delivery.
As digital tools continue to revolutionize sectors, an AI-focused skillset “is increasingly becoming a core asset,” according to Joey Meneses, CTO at Akron Children’s Hospital. In this piece, he shares thoughts on how to “future-proof your career path while shaping how this transformative technology evolves.” As digital tools continue to revolutionize sectors, an AI-focused skillset “is increasingly becoming a core asset,” according to Joey Meneses, CTO at Akron Children’s Hospital.
Savvy healthcare IT security professionals are as focused on an efficient recovery if something goes down as they are on keeping the enterprise up. And to be positioned for success around recovery, it's imperative business continuity plans are right sized to address the large amounts of data that health systems are amassing every day. In this timely webinar, we'll speak to leaders who know that -- with such growth -- the data-protection approach of yesterday may not work for today, let alone tomorrow. We'll explore the policies, procedures, governance and technologies they are putting in place so that if things go down, they can be back up and running as soon as possible.
Although cyberattacks have become increasingly “sophisticated,” one key fact remains: obtaining credentials is “the nirvana state,” according to our cybersecurity experts. During a recent webinar, they outlined the keys to devising a solid defense-in-depth strategy. One of the most effective ways to guard against cybersecurity attacks is to get inside the minds of bad actors, according to our panelists during a recent discussion.
For a whole host of reasons -- security, cost and interoperability to name a few -- heath systems are looking to shrink the number of vendor/partners they work with. To that end, hospitals have launched application rationalization efforts seeking to retire one-offs or little used apps, along with raising the bar to bring in new ones. One area where this effort has run into challenges is around patient engagement, where point solution vendors seek to address the many tasks that fall under its large umbrella; such as access, communication, and readiness. In this timely webinar, we'll speak to leaders who have thought through their patient engagement journey so -- as they move from here to there -- they don't pick up an excessive number of isolated vendor/partners along the way.
For healthcare organizations, engaging with other facilities to share resources is no longer taboo; in fact, in some areas, “it’s becoming a matter of survival.” During a recent panel discussion, CIOs Brian Sterud and James Wellman spoke with Lindsey Jarrell about the nontraditional avenues they’re leveraging to more effectively contain costs. For healthcare organizations, engaging with other facilities to share resources is no longer taboo; in fact, in some areas, “it’s becoming a matter of survival.” During a recent panel discussion, Brian Sterud, James Wellman, and Lindsey Jarrell discussed the nontraditional avenues they’re leveraging to contain costs.
The divide between the demand for cybersecurity talent and the supply of qualified individuals is big – and only growing, said Dennis Leber, Director of Cybersecurity at Honest Medical Group. Bridging that gap “requires a multi-faceted approach that involves investment in education, training, mentorship, diversity, technology, and collaboration,” he wrote in this blog. The “significant gap” that exists between the demand for cybersecurity talent and the supply of qualified individuals poses a serious risk to the safety and resiliency of organizations, says Dennis Leber.
They represent the crown jewels for cybercriminals -- legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible -- such as extensive training and phishing tests -- to guard against compromise, it's not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it's possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that's no longer the case. In this timely webinar, we'll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.
All the fancy apps in the world won’t do users a bit of good if the network is down. And, in fact, sometimes having a bunch of fancy apps from different
The ability to pin down assets is a critical component of RTLS, but the true benefit is in leveraging the technology to provide visibility that’s “key to operational excellence,” said our panelists during a recent discussion. “You need to know where everything in your organization is moving.” “You need to know where everything in your organization is moving,” said Joel Vengco, CIO at Hartford HealthCare, during a discussion about the benefits of RTLS, which also included leaders from Sonitor and KLAS.
Like any cost center, IT departments are continually asked to spend less, without reducing either the quantity or quality of services they provide. If it sounds like a tall order, it is. That's why many health systems, though they've tried mightily over the past few years, have seen limited success in doing more with less. But, believe it or not, there are ways to drive down spend that can leave an organization well positioned for the future, perhaps even more so than if they didn't cut at all. In this timely webinar, we'll speak to leaders who have made strides with -- and have a fresh perspective on -- cost-cutting to learn how they look at the problem, where they go first, and how to ensure any proposed changes are both actionable and sustainable.