Tuesday, July 18, 2017
7:30 AM
Join your fellow attendees for a coffee and light breakfast before our opening keynote.
8:00 AM
8:05 AM
8:45 AM
Panel Discussion
The Chief Information Officer (CIO) and Chief Medical Information Officer (CMIO) work best as a team. Typically, the CMIO is involved in all facets of the clinical implementations and best practices and the CIO is focused on budget, IT infrastructure, including security and regulations. However, the CIO and CMIO roles continue to overlap in many areas as technology implementation continue to grow in institutions across the country. Join our panelists to discuss:
  • How CMIOs and CIOs identify medical informatics trends and develop implementation strategies to improve patient care
  • How CMIOs and CIOs effectively develop governance structures that serve as a foundation for the implementation of clinical information systems
  • How CMIOs and CIOs can effectively manage risk, compliance and security challenges in their organizations
9:45 AM
10:30 AM
T2 Talk
In today’s digital healthcare world, the ways of doing business and delivering care have fundamentally changed, yet we still need to do more. Join our speaker to learn how your organization can correlate patient data to increase patient safety and reduce sentinel events. Topics include:
  • How to effectively harness meaningful data and draw conclusions that streamline workflows and positively impact the delivery of care the benefits of integrating information in the EHR with medical device alarms
  • pairing contextual information about the patient with a physiological event to inform the caregiver in preparation for response to the event at the point of care
  • techniques to reduce alert fatigue and increase patient safety delivering only the most important information to a caregiver when alerts are generated
10:50 AM
Panel Discussion
Telehealth solutions are rapidly advancing and provide tremendous opportunities for providers to deliver care in a way they never have before. As legislative hurdles are crossed and new technology emerges more providers are using telehealth solutions in their population health strategies, to create new lines of service, provide value-based care and increase the number of patients they are able to serve. 
Panelists will share how they use telehealth solutions in their systems, how they implemented the solutions, the opportunities they see for growth and what you need to know to improve your telehealth strategy. Topics include:
  • How to overcome reimbursement, legislative and technological barriers to telehealth adoption
  • Tips for building a care culture that maintains positive patient/provider relationships and creates better quality of life for patients
  • How they are using telehealth solutions to fulfill value-based care initiatives and create opportunities for physicians to care for more patients
  • Investment strategies for telehealth technology and how investment in telehealth solutions allow providers to meet the consumerization demands of healthcare
11:45 AM
T2 Talk
Brian Wells has a long standing passion for engaging patients in their own healthcare as a means of significantly improving outcomes and reducing risks. Whether focused on preparation for surgery or compliance with chronic disease management, making it easy for providers to supply patients with simple to use mobile applications that are tailored to their needs is becoming a new requirement. Brian will discuss the challenges related to building meaningful patient engagement tools and briefly review several solutions. 
12:05 PM
1:30 PM
2:00 PM
Provider Spotlight
Prime ACO improves the populations health by helping doctors and hospitals work together to prepare for future value-based reimbursement models. The Prime ACO leadership team will share their journey in assembling ACOs throughout the country.
2:30 PM
Panel Discussion
Analytics tools provide us with unlimited potential to generate insights in the health of our populations and create more opportunities to deliver value-based care. The true winners of the population health movement will be those providers who clearly aggregate their data to improve medical knowledge at the point of care, but also contribute to revolutionary research-driven breakthroughs. Don't miss this engaging presentation on the use of informatics and expansive data sets to propel us into the golden age of research, as healthcare shifts from evidence-based practice to practice-based medicine. Panelists will discuss tools and techniques they are using to collect data, create actionable intelligence to identify at-risk populations and improve patient outcomes. Topics include:
  • How to make better use of data and analytics to lower cost, improve quality, assess risk, and better manage patient populations
  • Real-world success stories being applied in the field of analytics and the infrastructure blueprints that are empowering healthcare organizations
  • Management tools to deliver positive ROI and develop a strategy to coordinate care with patient data across acute and ambulatory care settings
3:30 PM
Featured Presentation
The State of Colorado is a leader in healthcare innovation at the state and local level. Join our Innovation Power Hour speakers to learn about technology and innovation initiatives from the Governor's office, a local health system and from the physician’s perspective. Each panelist will give a brief presentation on innovation from their organization's perspective and join in a group Q&A after the presentations.
4:15 PM
Join your fellow attendees at the end of the day to toast what you've learned and the new connections you've made.
Wednesday, July 19 - Cybersecurity Forum
The Cybersecurity Forum, at the Health IT Summit, brings together experts in healthcare IT security and privacy issues to discuss key trends in the IT security/privacy sphere, and the top challenges facing the leaders of patient care organizations in this critical area.
Among the many topics our forums will cover are: the latest updates on new IT security threats emerging in healthcare; strategies that have proven effective in patient care organizations on the leading edge; and case studies of pioneering hospitals, medical groups, and health systems, in IT security and privacy.
Wednesday, July 19, 2017
7:30 AM
8:00 AM
8:15 AM
Keynote Presentation
This session will feature insights on the current threat landscape from our nation's top healthcare focused threat data sharing organization. The NH-ISAC is the official healthcare information sharing and analysis center, offering non-profit and for-profit healthcare stakeholders a community and forum for sharing cyber and physical security threat indicators, best practices and mitigation strategies.
9:00 AM
Panel Discussion
All hospital systems and networks - large and small - can be targets of cybercrime, yet, financial resources are declining and the pressures to increase efficiencies are top of mind. Creating a culture of cybersecurity in the workplace enables hospitals and medical centers to be resistant and resilient, and manage and mitigate cybersecurity risk across the enterprise. Experts will discuss:
  • how to effectively reach and communicate with every employee from the break room to the boardroom and to cultivate a culture of cybersecurity.
  • how to Identify the driving factors that impact behavior and how to effectively reach and communicate with diverse audiences about cybersecurity
  • how to access and best utilize community resources and implement effective cybersecurity awareness programs Developing communication processes and programs to engage your board of directors, peers and the workforce
  • engaging your board, leadership and peers in creating a cybersecurity culture that is critical to the success of your governance structure and frameworks
10:00 AM
10:30 AM
Provider Spotlight
Many healthcare organizations have continued to approach cybersecurity as they always have. As a result, many organizations lack personnel and budget to have effective cybersecurity programs. This session describes how you can transform your organization’s cybersecurity program with a "whole of organization” approach. Our speaker will:
  • Explain how to talk to your board of directors and senior management about prioritizing cybersecurity and allocating sufficient resources
  • Describe effective change management processes and policies to transform your organization’s cybersecurity program
  • Illustrate how to effectively manage risks even in the face of new technologies
11:15 AM
T2 Talk
It is difficult to protect what you cannot see.  Connected medical devices pose a great safety and reputational threat to healthcare organizations, yet few have visibility into all of the devices on their own networks. With more than 30% of all medical devices now connected to the network, new cyber attack entry points emerge every day. 
This session will:
  • Provide a foundational understanding of the issues surrounding network connected medical devices
  • Identify threats and their potential impact
  • Outline growing regulatory demands and HIPAA compliance mandates
  • Offer best practices for securing the networked healthcare organization of today and beyond
11:35 AM
T2 Talk
The healthcare industry’s demand for cost efficiency, proliferation of healthcare data and concerns about security and ransomware paint a bleak picture for healthcare IT departments. How can they protect patient data, comply with regulations and keep costs down? It starts with IT Resilience. This session will address the five pain points of the healthcare IT department, and present how a resilient IT infrastructure can help avoid some of the most common pain points.
12:15 PM
12:45 PM
Provider Spotlight
1:30 PM
Panel Discussion
The growing number of serious attacks on essential cyber networks is one of the most serious economic and national security threats our nation faces. When providers are attacked they often don’t know what breach data has to be reported, when it has to be reported and how they could have engaged law enforcement and other entities pre-attack to better prepare for their response. Panelists will address how they have overcome barriers in information sharing and successfully shared threat data internally, how they have engaged law enforcement before attacks and how they have improved their incident response strategies by doing so. Topics include:
  • Implementing security practices that can be deployed to reduce fraud and cyber incidents
  • Drafting risk assessments aligned with business functions Developing best practices for security monitoring and incident response with the goal of minimizing the impact of a data breach and the impact when a breach occurs
  • Developing internal and external incident response plans with input from key stake holders including the board of directors, your fellow c-suite executives, your IT infrastructure team, privacy officers and your legal advisors
  • Working with law enforcement when developing your incident response plans to ensure you have tools in place they may need to help you in the event of an incident