Status of CPOE in Community Hospitals
Dr. David Classen, Vice President, FCG, and advisor to the IOM, Leapfrog Group and JCAHO, reviews his research and his personal observations on the status of this initiative in non-academic, research settings.
Dr. David Classen, Vice President, FCG, and advisor to the IOM, Leapfrog Group and JCAHO, reviews his research and his personal observations on the status of this initiative in non-academic, research settings.
Bob Gross, HIPAA Program Manager, University of Chicago Hospitals, and Suzi Birz, Principal, HiQAnalytics, conduct an open forum around key issues currently being addressed at the UCH. Even though the deadline to comply with the HIPAA Security Rule has passed, health care organizations still struggle with how to address security issues for which there are […]
Mark Ford, Principal; and Russell L. Jones, Partner, Deloitte Consulting, LLP. Â The Internet of Things (IoT) and how IoT devices can be secured in the current cyber landscape is a hot issue. Â An even more critical issue is how network connected medical devices (IoT Medical) can be hacked, whether patients can be harmed, and more […]
Karl J. West, CISO and Assistant Vice President, Intermountain Healthcare. Â Karl has spent four years developing a Cybersecurity Operations Center. Â He discusses the evolving threat landscape in healthcare and how and why to develop a Cybersecurity Operations Center. Â The teleconference reviews the people, process, technology and cost challenges, along with the compelling message needed to […]
John Fowler, Deputy Information Security Officer, Henry Ford Health System. Today, security is in the forefront of everyone's mind; however, mostly for the wrong reasons. Organizations are too focused on regulatory requirements and the "what if" or "what did happen" as reported in the press. As such, security is seen as a necessary evil or […]
Jigar Kadakia, CISO and Chief Privacy Officer, Partners HealthCare. Until recently, many health care organizations haven't had the resources to stand up dedicated information security teams. However, with the changing regulatory and threat landscapes, many are now trying to create information security offices to provide focused effort on these critical functions. But even after securing […]