Tuesday

Track Session #1 – Nov 5, 10:45 – 11:30 am

Getting a Grip on IoT Operational Assurance in Healthcare

As more and more wireless-connected IoT devices find their way onto healthcare access networks, IT staff are challenged with managing their performance and security.  Because these devices operate differently from traditional computers, obtaining actionable insights into their operation and behavior has been elusive.  This session deals with how recent advances in big data network analytics and AI technology are being applied to address these concerns.

Learning Objectives:

  • Understanding the new challenges created with the introduction of purpose-built BioMed IoT devices
  • Quantifying the impact of IoT performance problems on clinical productivity
  • Identifying workflow to manage the IoT operational life cycle

Speakers:

  Anand Srinivas MIT, Ph.D
Co-founder and CTO, Nyansa
    

 

 

 

Get a “Yes” from the C-Suite in 7 minutes

This presentation suggests a framework that may be leveraged as a template for proposing project requests to executive teams.  From an IT perspective, we typically place far too much emphasis on why the project is important vs. why it will be successful.

We propose four steps for project request presentations beginning with introducing an idea, followed by deriving an economic value model, showing how and when the return on investment occurs, and finishing with realizing the value creation through organizational change management.

We demonstrate this process through a mobile strategy for text-based patient engagement.

Learning Objectives:

  • Messaging for your intended audience
  • Technology as a business strategy
  • Economic value modeling
  • The importance of organizational change management

Speakers:

 

TBA

    

 

 

 


Track Session #2 – Nov 5, 12:45 – 1:30 pm

Cybersecurity Threats: Don’t be Fighting the Wrong Battle

Attracting, training, and retaining top cybersecurity talent may well be the biggest battle facing healthcare organizations today as it pertains to building out their security programs.  Faced with tight budgets and dwindling candidate resources, executing security fundamentals tends to take a backseat while security leadership focuses on solving the human capital problem. This increases risk and leaves healthcare organizations more vulnerable to attacks.  The presenters will share their first hand experiences in developing an alternative approach to the traditional, full-time hiring model and the unique benefits of partnering with a healthcare exclusive managed security service provider using a Virtual Security Information Program.

Learning Objectives:

  • Explain how HR issues can negatively impact the ability of an IT team to efficiently and effectively protect the security of a healthcare organization
  • Discuss how and why staffing instability is a strategic cybersecurity priority for healthcare organizations
  • Discover the unique value in the using a VISP model that has visibility into multiple variations of current cyberattacks
  • Demonstrate the improvements to the cybersecurity posture of a healthcare organization that uses a VISP model
  • Explore cost implications, potential returns on investment, and workflow improvements opportunities when implementing an effective VISP solution

 

Speakers:

  Tanya Townsend, Senior Vice President and CIO, Louisiana Childrens Medical Center (LCMC)  Dan Dodson, 
President, Fortified Health Security
 

 

 

 

Healthcare Interoperability Using Blockchain Technology

The healthcare industry needs a secure data-sharing framework that consistently applies security access and controls for every connection and participant. Each participant or provider should be allowed to manage a patient’s records, while the patient retains control over who can access their data. It should also limit data replication within hospital records and provide direct access to electronic health record data where needed.

Blockchain technology can revolutionize how protected health information is shared, simplifying, enhancing, and securing collaboration between partner providers and patients. With increased focus on quality and continuity of care, access to patient records seamlessly across providers is a significant opportunity

Learning Objectives:

  • Learn how blockchain technology can significantly improve interoperability.
  • Hear a successful case study implementing blockchain technology for an information exchange framework within health systems
  • Understand how blockchain technology can improve trust, contract governance, and shared control with patient consent in a data-sharing model.

Speakers:

   Ed Ricks, CHCIO,
Director of Healthcare,
Sirius Healthcare
 Shariq Ata, Director, Enterprise Architecture University of Chicago Medicine    

 


Track Session #3 – Nov 5, 1:45 – 2:30 pm

The IoMT Security Conundrum: Ensuring Clinical Efficiency When Implementing Security Measures for Network Connected

IT teams are facing new security and compliance concerns as the Internet of Medical Things (IoMT) continues to proliferate healthcare environments. Robust devices, designed to streamline clinical workflows are increasingly valuable resources in the delivery of patient care, enabling data to be captured, aggregated, transmitted, and analyzed in real time. However, with these advanced capabilities come new security threats as each device represents a potential point of exposure for patient information.

Learning Objectives:

  • Deep understanding of the most pressing security concerns facing network connected devices today
  • Foundational security practices best suited for network connected devices such as medical and mobile devices
  • Understanding common security and compliance risks faced when security measures are not designed with clinical workflows in mind
  • Critical clinical workflow considerations to factor into security protocols

Speakers:

   Anthony Guerra, CHCIO, HealthSystemCIO Magazine  Nader Mherabi, Senior Vice President and Vice Dean, Chief Information Officer, NYU Langone Medical Centere    

 

Adapting through the Evolution of Cloud Technologies

The cloud has proven to be an enduring aspect of the tech-driven business. But for all its ubiquity, there is no “one size fits all” for any organization; with as many cloud strategies as there are for businesses, skepticism and enthusiasm often share the same office. If you want answers to clouds’ most fundamental questions, you need this interactive conversation with peers.

  • Determine how to get substantial ROI on your cloud initiatives
  • Discuss security and loss of control concerns
  • Share lessons learned across the cloud spectrum, from cloud-native solutions to hybrid adherents to cloud opportunities
  • Together we can strategize on which solution are the right fit for your organization now and in the future.

 

Speakers:

  Brian Barnes,
CTO,
Coretek  
   

 

 

 

 

 

 


AEHIS Breakout: Medical Devices: Security Leadership in a New World  Nov 5, 4:00 – 4:45 pm

With the rapid growth of medical devices in the interconnected healthcare landscape, CISOs face the challenge of providing security for devices which look and act differently from traditional IT devices. The need to extend an IT security management program to medical devices is paramount to secure the HIT computing environment.

This presentation will help the CISO understand:

– what a medical device is, technically and regulatorily

– the differences between a medical device and a traditional IT device that requires special consideration of tactics, toolsets and people

– a framework for what a practical medical device security program might look like

– advice for how a security leader can implement such a program in their organization

Learning Objectives:

  • From a regulatory perspective, be able to describe what a medical device is and how that impacts how to manage them.
  • Be able to describe the “IT” differences between medical devices and typical IT assets/systems and the impact on security management.
  • Be able to describe what programmatic elements are needed for a successful medical device security management program.

 

Speakers:

  Kristopher Kusche M.Eng., CISSP, CPHIMS, FHIMSS, HCISPP
Vice President and System CISO, Albany Medical Center
   

 

 

 

 

 

 

AEHIT/AEHIA Breakout: Sharp HealthCare’s Advanced Analytics Nov 5, 4:00 – 4:45 pm

Learn about Sharp HealthCare’s Enterprise Analytics strategy, the necessary components of that strategy, and how they are implementing technologies such as a logical data warehouse, data virtualization, predictive analytics and an analytics hub. Sharp HealthCare CIO Ken Lawonn will also discuss IT’s role in a Data Governance Program as well as creating data literacy as a key organization capability.

Speakers:

  Ken Lawonn, SVP and CIO, Sharp Healthcare