HIMSS TV
By using data, analytics and outreach to get to know its consumer, Renown Health increased Medicare Advantage membership 4 percent.
Users are no longer the weakest link in the security chain, claims Adrien Gendre, chief solutions architect at Vade Secure, who discusses the biggest threats to email security and AI-originated phishing attacks.
Jim Douglas, former Vermont governor and co-chair of HIMSS State Advisory Roundtable, and Cynthia Green-Edwards, chief compliance officer with the state of Michigan, discuss the challenges and progress of digital health on the state level.
Health 2.0 Conference cofounders Matthew Holt and Indu Subaiya look at notable digital health funding developments and give their predictions of what will come next.
Ursula Hübner with the University of Applied Sciences Osnabrück and Beth Elias with University of Scranton discuss the Technology Informatics Guiding Education Reform and strategic approaches to seamlessly delivering health informatics education.
Kaiser looks at innovations that align with its focus on high-value care, putting patients first and thinking about clinicians, according to Liz Rockett, director at Kaiser Permanente Ventures.
Revenue cycle management, patient and physician engagement, business intelligence and analytics, pop health and a clinically oriented supply chain are key pieces to patient-centered care, says KLAS VP of Business Development Doug Tolley.
There are unique security challenges of the healthcare industry, including a skills shortage and regulatory landscape, according to Mimecast’s Josh Douglas and Dino DiMarino, who share how to meet those challenges.
Anne Snowdon, with the World Health Innovation Network, and Blain Newton with HIMSS, discuss H-SIMM – the new maturity model for supply chain – and how it can help improve patient safety as well as potentially save health systems billions of dollars.
Joyce Brocaglia, CEO of Alta Associates and founder of Executive Women's Forum, details the need to fill board of director seats with people with security skills as well as diversifying cybersecurity teams.