|Thursday, February 1, 2018|
In it's path to becoming the first academic health system in the country to deploy Epic across all settings, the University of Pennsylvania Health System (UPenn) faced several monumental challenges in their efforts. As part of a staggering, multi-year, enterprise wide initiative, UPenn has pursued a strategy of integration at scale, bringing together one of the most intuitive, interoperable, and data-friendly infrastructures in the country.
In this keynote address, join Michael Restuccia, Vice President and Chief Information Officer of UPenn, as he shares the unique challenges encountered through UPenn's initiatives, blending data warehouse approaches to support both medical research and the day-to-day operations of a large-scale health system.
The evolution of the role of Chief Information Officer and senior IT executive has been undeniable, transitioning from the guiding the IT HelpDesk, to becoming an integral strategic business partner across silos and lines of care. Health IT Executives continue to be engaged in these conversations, and now are thinking more and more like a venture capitalist.
According to a Harvard Business Review report, 57 percent of respondents (Business and Technology Executives) see IT as an investment for future innovation and growth. However, a Gartner report based on a survey of CIOs indicates that the overwhelming disruption of technology advances and digital opportunities threatens business success and their organization's credibility. So how do senior IT executives integrate these moving parts and pieces?
In this engaging panel, hear from senior health IT executives as they delve into the evolution of senior IT roles, where their long-term roadmap is heading, and which technology approaches will assist them in delivering value as an integrator.
Mark Hagland , Editor-in-Chief, Healthcare Informatics
Clark Kegley CHCIO, MBA, Assistant Vice President, Information Services, Scripps Health
Chris Longhurst MD, Chief Information Officer, UCSD Health
Audrius Polikaitis PhD, Assistant Vice President of Health Information Technology and CIO, University of Illinois Hospital Health Sciences System (Chicago)
Michael Restuccia MBA, Senior Vice President and Chief Information Officer, University of Pennsylvania Health System
Provider Spotlight Presentation
The state of Connecticut, much like California, is in a state of distress. With Medicaid payment reform on the horizon and both states posing massive increases for 2018 budgets, the complexities of taking on risk have never been more difficult to navigate.
In a landmark effort, St. Vincent's Health has worked dilligently to redefine the ACO model, embracing a revolutionary concept around medical management and taking on risk for their population. By forging unique partnerships with hospitals and physician groups in their region, with over 200 care transitions available among the partners, and unique organization-wide data exchange efforts, St. Vincent's Health Partners has remained financially viable in a state where Medicaid-based commercial revenue for hospitals and providers is falling.
In this session, hear from physician pioneer Michael Hunt, CEO of St. Vincent's Health Partners, as he shares the unique organizational paradigm that has saved his organization, and delivered value for patients across the state of Connecticut.
Hyper-convergence is a oft-used buzzword now within health IT circles, especially as the advent of new technologies around flexible infrastructure continue to disrupt the marketplace. However, hyper-converged computing represents a unique area of opportunity for healthcare IT teams, especially in the face of demands from leadership for greater flexibility, and lower time-to-market for new built or merged facilities or locations. So what exactly is hyper-convergence and how does it fit into the IT roadmap?
In this engaging talk, we will define the term of hyper-convergence, explore the modern healthcare CIO's roadmap, and outline realistic expectations as well as real-world examples of organizations that are revisiting their infrastructure in this manner.
Governing the Ungoverned - Building Your Enterprise Foundation Through Project Prioritization and Strategic Portfolio Management
An enterprise roadmap for strategic healthcare IT investment goes well beyond a budget-- prioritization of projects and governing the ungoverned mass of resources is step one to fostering the effectiveness of an enterprise IT team. At scale, this philosophy can serve as a means to deliver value beyond the electronic health record and data analytics, and influence every aspect of a health system business plan.
Join Audrius Polikaitis, Chief Information Officer of University of Illinois Hospital and Health Sciences System to discuss significant challenges to healthcare IT organizations and how to combat them by reimaging your IT roadmap and leveraging unique approaches to the project prioritization process for your organization.
At the US Department of Defense, staff training paradigms and personal development programs represent a unique opportunity. By evaluating the data behind a staff training program, and engaging new staff in gamification of training modules, the US Army's Defense Health Agency Medical Education has delivered on value in an especially unique way.
In this session, we visit with 2017 US Army Health IT Professional of the Year, Major Chandi Cordero, as she outlines the strategy for success with the Department of Defense's (DoD) latest updates to the their staff training protocols. Discover how Cordero's approach to gamification, data analytics and deep learning around the educational process are reducing training time, improving staff knowledge baselines, and reducing cost across the organization.
Networking Lunch and Presentation
Since 2006, San Diego-based Sharp Healthcare has been a employing home-based technologies, remote patient monitoring and a variety of telemedicine approaches to reduce readmissions. Now in 2018, Sharp has advanced these efforts to expand services for Telepsychiatry, chronic disease management, rural health, and a host of other patient offerings.
In this session, visit with the Sharp Healthcare telemedicine team, led by Vice President of Information Systems Kara Marx, as they share their model and strategic advances over the past few years, along with their plan for future growth of offerings and the technology used to support these efforts.
As healthcare increasingly embraces the "retail reality" of the future, the level of access to patient information and one's health has never been more individualized or available. In two touches on a smartphone, a patient can now access lab tests, radiology images, and schedule appointments with their physician-- providing an "instant" access and support to the healthcare experience. But what are providers doing to take this a step further, and incorporate an "Amazon-like" experience for the patient?
In this panel, we sit down with a diverse group of experts to discuss the latest trends and national approaches to "consumerizing" the care experience. Hear about top consumer mobile applications from a cardiovacular AI advisor that recommends heart-healthy options nearby, to the OpenNotes movement which is engaging patients to better understand ailments and treatments. Our panel will also discuss telehealth trends for psychiatry and behavioral health, in addition to educating at-risk populations and unique incentives for them to pursue their health on a daily basis.
Clark Kegley CHCIO, MBA, Assistant Vice President, Information Services, Scripps Health
Tommy Korn MD, FACS, Opthalmologist, Sharp Healthcare
Vicki DeBaca , VP, Health/Provider Services, Sharp Healthcare
Joseph Garcia , Chief Operating Officer, Community Health Group
Marc Sylwestrzak , Director, IS Experience and Development, UC San Diego Health
PatientSafe Solutions partnered with HIMSS Analytics for an industry-wide benchmarking survey on the state of clinical communications. Responses from 300 IT, clinical and clinical informatics leaders revealed that while we all share the vision of patient-centered communication across the continuum of care, the reality is that few know quite how we’re going to get there.
Join our expert for a practical look at the current state of clinical communications and the critical steps needed to implement a unified communications and workflow platform that impacts ROI and clinical outcomes – today and into the future.
The Accountable Care Organizations (ACOs) of today must be continuously learning. This comes at every level of the organization, from evaluation of patient data to discover new treatments and best practices, to business operations forecasting to better understand patient throughput in the emergency department.
In this panel discussion, we visit with key stakeholders from across the continuum of care to better understand how data analytics and ultimately machine learning concepts will improve the quality of care. Organizations big and small can operate as an ACO, and in this panel we will explore deep and insightful data analytics approaches, key areas to consider when working to improve quality scores, and the empowerment of physicians to access care data at larger scales to drive better treatments and outcomes.
Mark Hagland , Editor-in-Chief, Healthcare Informatics
Mike Hogarth MD, FACMI, FACP, Chief Research Information Officer, UC San Diego Health
Rick Lemoine MD, FACP, Chief Medical Information Officer, Sharp Healthcare
Chuck Podesta , Chief Information Officer, UC Irvine Health
Anthony D'Angelo , Manager Enterprise Data Warehouse, Knowledge Management, Scripps Health
How do we reach the cardiac patient with high blood pressure to change their decision making? Which data sets can be analyzed to succeed? Why does this matter to IT?
Provider care coordination and marketing teams nationwide are working tirelessly to answer these questions. Many national providers have already shown notable and tangible results. Cleveland Clinic's Health Essentials blog has gone from minor outreach avenue to major online resource, growing from 200,000 visits per month in 2013, to 3.2 million monthly visits by 2015. Intermountain Healthcare's Health Hub mobile app, which received 24,000 downloads in its opening months during 2015, now is pushing specialized content for users including GermWatch which is a consolidated list of diseases, symptoms, and other resources for disease prevention. What data practices are driving this level of engagement?
In this session, we will explore IT's integral role in the marketing and community awareness relationship. We will take a deep dive into the data analysis and correlations that are being seen with users, and how to drive a meaningful message through the power of information.
Converging Technologies Transform Clinical Communication and Present Tremendous Opportunities for the Future
When electronic medical records, lab information systems and revenue cycle services emerged in the healthcare space decades ago, they were separate entities with individual functions. EMR platforms came along and changed that by merging multiple technologies into one integral system based on a main repository of information.
In this session, Trey Lauderdale, Founder and CEO of Voalte, the first company to introduce smartphones into hospitals for clinical communication, takes a historical view of the industry and forecasts the tremendous opportunities ahead. Hear how the convergence of the EMR with secure texting, alarms and alerts, barcode scanning, physician scheduling and more will play a major role in transforming the delivery of care.
The massive influence of social determinants of health on managing populations and taking on risk has taken center stage for Loma Linda University Health. In an ambitious effort, the team at Loma Linda is leveraging this data to create wellness maps and to geo-code areas for analysis--the initial results and subsequent care management follow up have made a positive impact among several patient population types.
In this session, hear from Chief Information Officer Mark Zirkelbach, as he delves into the particulars of this ambitious and forward-thinking population health project. Join Mark for a project overview, highlighting everything from data capture, to data analysis, to care management team follow up procedures that are improving readmission rates and HCAHPS scores alike.
Care providers are rapidly consolidating across specialties and increasingly sharing risk with health systems. The push to integrate care and adhere to performance metrics is increasing. Financial pressures are moving providers to create greater patient flow efficiencies. IT can play a critical role in supporting the evolution of care. Yet, the push to adopt new technologies is sometimes seen as a burden vs. a benefit. This presentation focuses on the structure and culture of physician care provider groups and how IT companies can negotiate that environment to create winning partnerships.
Through this presentation, attendees will learn
In this special keynote address Dr. Prentice Tom of CEP America, one of the largest physician organizations in the country, provides insight into the practitioner practice environment at a granular level, highlighting the barriers and drivers to creating a successful relationship, while forging a meaningful roadmap for the future.
Friday, February 2 - Cybersecurity Forum
The Cybersecurity Forum, at the Health IT Summit, brings together experts in healthcare IT security and privacy issues to discuss key trends in the IT security/privacy sphere, and the top challenges facing the leaders of patient care organizations in this critical area.
Among the many topics our forums will cover are: the latest updates on new IT security threats emerging in healthcare; strategies that have proven effective in patient care organizations on the leading edge; and case studies of pioneering hospitals, medical groups, and health systems, in IT security and privacy.
|Friday, February 2, 2018|
As one of the most misunderstood technologies in 2017, Blockchain continues to be an exciting enigma to many healthcare organizations. This is especially interesting and exciting in the field of security, where blockchain's secure peer-to-peer ledger systems could completely disrupt core application development in clinical transformation efforts, claims adjusting and billing management, and especially cybersecurity.
In this presentation, we will review Blockchain technology and debunk the myths or conjecture around it's use in healthcare. Listen in as we outline how Blockchain can be implemented to secure Health IT infrastructure, secure IoT connected devices, improve security interoperability, and reduce the ability of ransomware to propogate within a network.
Blockchain has slowly gone from buzzword, to reality. Longtime collaborative partners in the Virginia marketplace, Old Dominion University and Integrated Delivery System Sentara Health, have come together in an ambitious pilot to prove the merits of blockchain within cybersecurity. But ultimately, what did this mean, and what does such a pilot really look like in terms of day-to-day influence and effectiveness.
In this presentation, we hear from cybersecurity researcher and technologist, Dr. Sachin Shetty, who will reveal the critical elements behind this pilot, and why blockchain's potential can expand to identity management, effective access controls and much more-- while also having realistic limitations.
The May 2017 cybersecurity attack dubbed “WannaCry” grabbed storylines internationally and across the healthcare landscape as tens of thousands of hospitals, organizations, and agencies across 153 countries had their data held hostage.
The enhanced crypto-locking worm spread quickly, with a headliner target of the National Health Service (NHS) in Britain, which resulted in extended downtime, rescheduling of procedures, and in numerous cases preventing access to care for patients. The worm propagated and spread using a Microsoft platform vulnerability related to the Server Message Block protocol, which revealed many healthcare organizations’ weak points in the areas of security standards compliance, network structures, and disaster recovery protocols.
In this special panel discussion, Healthcare Informatics welcomes a panel of top security experts, as they recall and summarize the top lessons learned in security compliance and organizational frameworks behind the WannaCry attack. Listen in as our panelists provide their perspectives, and delve into the nature of the attack—diagramming how this threat was uniquely dangerous for healthcare organizations, and why security compliance and protocols for disaster recovery allowed his organization and others to manage the situation quickly and effectively.
Sri Bharadwaj CISSP, PMP, Director, Information Services and CISO, UC Irvine Health
Stan Banash , Chief Information Security Officer, Children's Hospital of Orange County
Chris Convey CISA, CISSP, MS, Vice President, IT Risk Management and CISO, Sharp Healthcare
Jason Johnson CISSP, Information Security Officer, Marin General Hospital
Christian Abou Jaoude , Director of Enterprise Architecture, Scripps Health
The rapid adoption of connected IoT medical devices has both enhanced the quality of care and increased the vulnerability of healthcare organizations. Although almost 10 months have passed since WannaCry first disrupted the industry, many organizations continue to struggle to implement a comprehensive security plan against such attacks. Reliable real-world data of Connected Medical Devices from the perspective of cyber security, simply did not exist.
In this session, we will share the exclusive details and statistics based on analysis of tens of thousands connected medical devices deployed in real-world environments. Learn how your organizations compare with the studies that outline the types of devices in-service, devices with most security issues and the most common cause of security issues in connected medical devices. Most importantly, learn how to plan your security implementations based on concrete research data not previously available.
Medical devices are increasing in software and network connectivity dependency at a rapid pace --- and with the benefits of software and connectivity come vulnerabilities and exposure. From default passwords, to outdated software, to wireless issues, many connected medical devices are not worthy of the trust we or patients put in them. How can we all move forward, together, to ensure patient safety?
In this interactive session, Adam Brand, a medical device security specialist and volunteer with a grassroots organization called I Am The Cavalry, will review medical device security past, potential future, and current state. Learn about the past five years of security research into medical device vulnerabilities, including the results of a honeypot experiment where devices simulating medical devices were placed on the Internet. Consider what the future may hold should we not act now, through a review of potential risk areas and the results of some recent medical simulations and wargames. Finally, learn what concrete steps healthcare organizations are taking today to address this risk.
Boost your Cybersecurity Immunity with a Security Immune System- Extend it by putting the 'Cog' in the Cognitive SOC
According to a recent Market Pulse survey, one out of every five employees would sell their corporate credentials, up from one in seven a year ago. Traditional perimeter approaches to security are increasingly ineffective. With new Delivery Channels including cloud and mobile, new sources of information via medical and wearable devices and the use of analytics and cognitive computing, information has become much more pervasive, porous, and shared, making it more difficult to secure. What does this all mean for an organization? It means taking a new approach to security. Think of security as an immune system. a system of capabilities that work together to protect the entire organism regardless of where the threat is coming from.
In this T2 Talk session, we will discuss recent security and industry trends and research, discuss the Immune System approach, how cognitive and AI can enhance a Security Immune System, plus provide practical advice for getting started building your own Security Immune System. We’ll cap off our session with a demonstration of a Security Immune System built in the Cloud.
Cindy Compert CIPT/M, Chief Technology Officer, Healthcare and Life Sciences Industry, IBM Security and Privacy
Networking Lunch and Presentation
All hospital systems and networks - large and small - can be targets of cybercrime, yet, financial resources are declining and the pressures to increase efficiencies are top of mind. Creating a culture of cybersecurity in the workplace enables hospitals and medical centers to be resistant and resilient, and manage and mitigate cybersecurity risk across the enterprise. Our speaker will discuss:
This session will feature insights on the current threat landscape from our nation's top healthcare focused threat data sharing organization. The NH-ISAC is the official healthcare information sharing and analysis center, offering non-profit and for-profit healthcare stakeholders a community and forum for sharing cyber and physical security threat indicators, best practices and mitigation strategies.
Legacy systems, from medical devices, to electronic health records, to billing platforms, each pose a unique security threat if left untested as a potential threat for breach. There are the obvious security risks like Wired Equivalent Privacy (WEP) internet access, but what about additional legacy systems that will be unsupported is patched or upgraded beyond a certain point? One of the biggest influencing factors of the WannaCry ransomware outbreak of May 2017, was this concept of legacy systems remaining unpatched past Windows XP, which opened the door for an exploit and propagation of the virus on a grand scale.
In this engaging panel discussion, we visit with a panel of top security experts as they explore the commonalities and risks among legacy systems. Listen in as our panel defined which legacy systems are most at risk, which systems are commonly overlooked in evaluation, and what patching protocols are covered by existing vendor relationships.