HIMSS25
When health systems upgrade their IT infrastructure, they should also train staff to use AI and other new technologies, says Dr. Guido Giunti, chief data officer at Dublin, Ireland's St James's Hospital.
Ever since financial institutions have significantly increased their security preparedness, bad actors have turned to healthcare organizations, seeing them as more vulnerable – and lucrative – targets, says Dr. Eric Liederman, CEO of CyberSolutionsMD.
A predictive analytics tool at Piedmont Healthcare helps identify and engage with patients at risk for medication non-adherence. Melissa Robinson, the health system's population health pharmacy program manager, explains.
Health systems, historically wary of making patient data available to payers, have gradually overcome that hesitation due to the positive impact data sharing has had on patient care and outcomes, says PointClickCare's Brian Drozdowicz.
It improves efficiency too, says Scott Wilson, AVP of HHS enterprise care solutions. Amid labor shortages, health systems can optimize staffing and manage costs through nursing telehealth and hospital at home programs.
For Davies Awardee Dr. Robert Jarve and his team from Corewell Health, studying data from a clinic serving high-risk Medicaid patients helped them understand what's driving most of the clinic's ED utilization.
Involving each department across an organization can help healthcare leaders build stronger cyberdefense strategies, says Michael Gross, Cleveland Clinic's manager of cybersecurity intelligence.
The program provides education and support to new CIOs seeking to drive change in their organizations, says Lateefah Agunbiade of Roanoke Chowan Community Health Center and a recent CIO Connect graduate.
The University of Toledo is building and piloting AI models to assist in clinical decision support and to accurately answer patients' and clinicians' questions. Dr. R. Ryan Sadeghian, CMIO and a pediatrician, explains.
Cybersecurity In Focus
Healthcare organizations can stave off ransomware attacks with highly gated permissions that lock out common intrusions, say Intermountain cybersecurity leaders, who have found success with the approach.