Tuesday, August 7, 2018
7:30 AM
Networking
8:00 AM
8:15 AM
Keynote Presentation
Value Based Care
 
Value-based and accountable care organizations rely on accurate data, analysis and reporting to provide the critical information the organization needs to understand how it’s providers are performing to meet risk-based contract agreements. The extreme challenge is how difficult it is to accurately capture and report on the numerous and disparate performance metrics individual to each risk-contract across commercial, Medicare and Medicaid markets. The lack of standardization across payers is further complicated by a lack of standardization across EHR vendor systems and quality measures for the healthcare industry overall. This is layered on top of the foundational challenge that much of the information health care organizations collect and store for data analysis is incomplete or imprecise.
 
In this session, Bill Gillis, Chief Information Officer of Beth Israel Deaconess Care Organization, will share how the organization has achieved exceptional performance in risk-arrangements from their many years of data quality initiatives and present a blueprint to help other organizations overcome interoperability and quality challenges to successfully meet increasingly complex quality requirements.
 
 
 
 
9:00 AM
Panel Discussion
Patient Engagement, Clinical Transformation
 
Health and the patient experience has gone digital. It is an undeniable fact of today's healthcare landscape that the emergence of eHealth initiatives has driven better care, showing true value to provider organizations. According to a 2017 HIMSS Analytics survey, telemedicine has risen to an adoption rate of 71 percent, up from approximately 54 percent in a 2014 survey, and that number promises to rise even further as providers continue to see immense value in these efforts. In this engaging panel, visit with top changemakers as they illuminate the technologies and initiatives that are monitoring, engaging, and delivering value to patients of all kinds. Attend this session and:
 
  • Discover the latest telehealth, tele-ICU, remote patient monitoring, and patient-facing mobile apps that are empowering and engaging patients
  • Outline a strategic vision for launch and growth of eHealth programs
  • Illustrate the next wave of telehealth innovations around population health and wellness, to continue growing patient value offering
10:00 AM
Networking
 
Join your fellow attendees to discuss what you've learned in the morning sessions and make new connections.
10:45 AM
T2 Talk
 
In the midst of an alarming opioid epidemic, drug diversion is playing a contributing role. As much as 10 to 15% of all healthcare professionals will misuse drugs or alcohol at some point during their careers, and hospital leaders are beginning to utilize big data analytics and artificial intelligence platforms to combat addiction inside their systems.
 
 
11:15 AM
Panel Discussion
Cybersecurity, Clinical Transformation, Cloud Computing
 
The digital revolution in healthcare is driving more interest in and adoption of cloud solutions by many healthcare organizations. However, many organizations are still hesitant to take the leap into public, private or hybrid cloud services. In this engaging panel, our panelists will discuss how cloud technologies and initiatives are working behind the scenes and allowing clinicians to deliver better care. Session topics include: 
 
  • How you can apply cloud services to your healthcare enterprise today and how it can support rapidly advancing technologies including machine learning and artificial intelligence
  • Justifying the value of the cloud to executives, key stakeholders and board members in your organization
  • Combating security myths and realizing security benefits of the cloud How transitioning to the cloud can change your IT governance models
12:15 PM
Networking
1:00 PM
Keynote Presentation
Cybersecurity
 
Jim Routh, Global Chief Security Officer for Aetna, is a transformational security leader focused on applying risk management discipline to the converged security function for global enterprises. He'll share his experience aligning the security strategy with the business strategy at Aetna and delivering world-class level security capabilities that drive positive business results.
 
 
 
1:45 PM
T2 Talk
 
Trauma. Angina. Heart attacks. No, this isn't just another day in your Emergency Department, it's the newest threat to patient safety - cybercrime. From crippling ransomware attacks that leave computers and EMRs inaccessible, to sophisticated social engineering schemes that drain payroll accounts, healthcare has been devastated by wave after wave of criminal activity. For the first time in history - cybersecurity has become life or death. But just like healthcare, there's hope. The very same issues that make our hospitals, clinics and networks vulnerable may also be our greatest assets - but only if you know how to respond effectively. Thriving in this digital age of cybercrime doesn't require a brain surgeon, it only requires determination and hard work. Join GreyCastle Security as we define corrective incident response procedures and the cybersecurity tactics that will save patients' lives in the years to come.
 
 
 
2:15 PM
Networking
 
Join your fellow attendees to discuss what you've learned in the afternoon sessions and make new connections.
2:45 PM
Provider Spotlight
Data Analytics, Population Health
 
In the value-based driven healthcare, it has become extremely important for the providers to understand patients beyond the normal ways and track performances to bring in the scope of improvements. The prerequisite here is to have the right IT engagement model to gain a better understanding of network, but more importantly, that engagement should be staff-friendly. Every organization will have its separate need, and these needs change roughly within two years. Therefore, it is crucial that the model of IT collaboration is - build, operate and reiterate. It cannot be one size fits all or “a turnkey solution.” As in the case of Mercy ACO, the legacy vendor was not ready to adopt the already established workflows of Mercy and was proposing to introduce its own workflows. This presentation is about addressing challenges of multiple vendors and separate platforms to achieve a winning outcome.
 
3:15 PM
Data Analytics
 
OR administrators used to spend an inordinate amount of time sifting through a mountain of data to find insights upon which to make block allocation decisions: Block utilization, room utilization, number of cases, first case on-time starts, turnover, and other key performance indicators. This session will detail – from a surgeon’s perspective – a new metric adopted by leading health systems that more accurately and efficiently uncovers opportunities for improvement in perioperative performance.
 
 

 
3:45 PM
Provider Spotlight
 
The foundation of value-based success is a strong population health management (PHM) program that supports the entire organization. PHM programs built on data and technology and supported by robust operations can scale up to meet organization-wide needs. UMass Memorial has built a PHM program that scales. They created a department known as the office of clinical integration that supports system-level PHM functions. The group gathered a multi-disciplinary team to build governance models, secure senior executive and physician buy-in, and increase excitement using targeted communications and education outreach. Attendees will learn how UMass Memorial collects data from diverse sources, integrates it, then analyzes it to create a clear picture of population health needs and value-based care performance. They will also learn how UMass Memorial’s office of clinical integration managed the cultural change necessary to move from fee-for-service medicine to value-based care. Learning objectives:
  • Define the investment categories needed to scale a system-wide population health management program
  • List the elements of developing and managing a system-wide PHM program, including financial planning and ROI reporting to drive greater executive and physician buy-in
  • Describe logistical barriers to a system-wide PHM program, including disparate data sources, physician push back and educational/training needs
  • Discuss the role of education and communication in meeting system-level PHM goals
 
4:15 PM
Networking
Join your fellow attendees at the end of the day to toast what you've learned and the new connections you've made.
Wednesday, August 8, 2018
7:15 AM
Networking
7:45 AM
Networking
8:00 AM
Keynote Presentation
8:45 AM
Provider Spotlight
 
Healthcare providers’ response to the opioid crisis has been hampered in part by the lack of information sharing between organizations. Opioid treatment centers and primary care providers often have no idea that their patients have had multiple recent emergency room visits. A dashboard tool created for nurse care managers by the Rhode Island Quality Institute (RIQI) is changing that dynamic. Users of its Care Management Dashboard have seen their patients’ emergency department return visits within 30 days reduced by 16 percent. For this effort, RIQI has been named a winner of one of Healthcare Informatics’ Innovator Awards for 2018, Providers Division. The RIQI team will join us to discuss their journey in creating their program, how it's improved team communication, information sharing and improved outcomes.
9:15 AM
Panel Discussion
 
Health IT executives from pediatric will discuss health it challenges unique to them and how their lessons learned can help non-pediatric focused healthcare organizations. Discussion topics will include privacy and compliacne, information sharing, consent frameworks and best practices for extracting valuable data from your EMR system.
 
10:15 AM
Networking
10:45 AM
T2 Talk
 
Use of Artificial Intelligence is recognized as the only practical approach to staying ahead of the modern cyber threats. The steps used by AI are not unlike that of a physician. First, understand the patient (or device), assess if all organs (or components) are behaving as intended, and proactively treat (or remediate) viruses and other harm. In this session, Dr. May Wang will explore the latest advancements in AI in the field of cyber security specifically for connected medical devices.
 
 
 
11:15 AM
Panel Discussion
 
The May 2017 cybersecurity attack dubbed “WannaCry” grabbed storylines internationally and across the healthcare landscape as tens of thousands of hospitals, organizations, and agencies across 153 countries had their data held hostage. The enhanced crypto-locking worm spread quickly, with a headliner target of the National Health Service (NHS) in Britain, which resulted in extended downtime, rescheduling of procedures, and in numerous cases preventing access to care for patients. The worm propagated and spread using a Microsoft platform vulnerability related to the Server Message Block protocol, which revealed many healthcare organizations’ weak points in the areas of security standards compliance, network structures, and disaster recovery protocols. In this special panel discussion, Healthcare Informatics welcomes a panel of top security experts, as they recall and summarize the top lessons learned in security compliance and organizational frameworks behind the WannaCry attack. Listen in as our panelists provide their perspectives, and delve into the nature of the attack—diagramming how this threat was uniquely dangerous for healthcare organizations, and why security compliance and protocols for disaster recovery allowed his organization and others to manage the situation quickly and effectively.
 
12:15 PM
T2 Talk
 
Explore why Quantum Computing is the next big security risk for your Enterprise. Learn from Certified Security Solutions, the team that brought the first Quantum-Safe, full stack PKI to market. Discover the importance of identifying and seamlessly replacing outdated or compromised cryptographic algorithms.  The need is critical for continuous updates to both your Enterprise and IoT. Join Chris Hickman, VP of Managed Services, of Certified Security Solutions, as he delivers his knowledge on the new but very serious security threat of Quantum Computing.  
 
 
 
 
12:45 PM