Enterprise imaging is similar in scope to the EHR, and it allows clinical users to properly identify, acquire, store, manage and visualize imaging studies from across their enterprise, regardless of device, modality, department, service line or location. Historically, each imaging department made its own decisions and purchases regarding these services, often resulting in siloes with significant storage and software duplication, inefficient routing, perilous database synchronization and user frustration (or worse, apathy). With major potential upside when done right, health systems can adopt a true enterprise imaging strategy, led by executive IT members with proportional governance oversight and clinical buy-in from leaders in key domains, such as Radiology, Cardiology, Endoscopy, PoCUS and more. Join us as we speak to leaders and have them share their experiences and opinions on how a true enterprise imaging strategy can be executed.
healthsystemCIO.com
Q&A with Franciscan Missionaries of Our Lady Health System SVP/CIO Will Landry: “Investing in Agility is Worth the Cost”
The IT stack of the past cannot service the health system of the future. That’s one of the main sentiments that runs through the following thoughts offered by Franciscan Missionaries of Our Lady Health System (FMOLHS) SVP/CIO Will Landry. For example, legacy and on-prem technology cannot provide the business continuity and disaster recovery capabilities that […]
Exploring the ePHI Cyber Crisis & How to Fix It
It’s the dirty little secret among healthcare cyber professionals — they don’t know where all their ePHI is; not even close. And while those professionals are not to blame (healthcare workflows and, thus, data flows are messy business); they do have to get their arms around the problem. The first step? Understand it. In this unique webinar, we’ll explore the results of a Ponemon study on the state of ePHI in healthcare to learn just how bad the problem is and where the data might be. Then, we’ll explore ways to secure it and, in the process, hopefully give cyber professionals one less reason to be up at night.
Breaking from Tradition: Q&A with Heather O’Sullivan, President, Healthcare at Home, Mass General Brigham
With the right strategy and partnerships in place, there’s a way to “address the health system’s key challenges around capacity constraints while emphasizing patient comfort and privacy,” said Heather O’Sullivan, President of the Healthcare at Home Division at Mass General Brigham. In a recent interview, she talked about what it takes to break with tradition and establish a new model for care delivery.
Designing Cyber Recovery Strategies for Today’s Data-Heavy Enterprise
Savvy healthcare IT security professionals are as focused on an efficient recovery if something goes down as they are on keeping the enterprise up. And to be positioned for success around recovery, it’s imperative business continuity plans are right sized to address the large amounts of data that health systems are amassing every day. In this timely webinar, we’ll speak to leaders who know that — with such growth — the data-protection approach of yesterday may not work for today, let alone tomorrow. We’ll explore the policies, procedures, governance and technologies they are putting in place so that if things go down, they can be back up and running as soon as possible.
Developing a Patient Engagement Strategy that Avoids Vendor Sprawl
For a whole host of reasons — security, cost and interoperability to name a few — heath systems are looking to shrink the number of vendor/partners they work with. To that end, hospitals have launched application rationalization efforts seeking to retire one-offs or little used apps, along with raising the bar to bring in new ones. One area where this effort has run into challenges is around patient engagement, where point solution vendors seek to address the many tasks that fall under its large umbrella; such as access, communication, and readiness. In this timely webinar, we’ll speak to leaders who have thought through their patient engagement journey so — as they move from here to there — they don’t pick up an excessive number of isolated vendor/partners along the way.
Delivering Defense in Depth: Best Practices for Preventing & Addressing Credential Compromise
They represent the crown jewels for cybercriminals — legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible — such as extensive training and phishing tests — to guard against compromise, it’s not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it’s possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that’s no longer the case. In this timely webinar, we’ll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.
HIMSS24 Conference Wrap: Keith Duemling Says Recent Events Prove Cyber Warrants Main Stage Billing
There’s an old parenting saying, “Do as I say, not as I do.” Of course, it’s meant to get parents off the hook for not demonstrating the behavior they want emulated. Unfortunately, it rarely works, as the disconnect between talk and action isn’t lost on the little ones. When it comes to recent conferences, some […]
HIMSS24 Conference Wrap: Mike Mistretta Says, as Conferences Evolve, CIOs Must Adjust Accordingly
Then only thing that’s constant is change, which means the key is being observant. At least that seems to be the key when navigating the industry’s changing mega-conference dynamic. In the spring, there used to be just HIMSS, with the CHIME Spring Forum affixed to the front-end. Now, CHIME partners with HLTH on ViVE. With […]