Opening Plenary Session: Digital Disruption: Will You be the Disruptor or the Disrupted? (Monday 8:30-9:30 am)
If you aren’t racing to develop digital business capabilities as quickly as you can, you’re facing an imminent competitive threat and missing a major financial opportunity to capture the digital value at stake around patient experience, clinical workflow productivity, asset utilization and more. The threat is very real: low investment in IT and a general complacency with the status quo has put healthcare at a high risk of disruption by technology-savvy incumbents and digital-native startups. Now is the time to embrace digital transformation fully—and pull ahead of the competition. While most of the market waits for someone else to make the first move, your organization can take the lead and create sustainable competitive advantage.
Barbara Casey (Cisco)
Lightning Talks (Monday 1:00-2:30 am)
This interactive session will feature five-minute presentations followed by an audience Q&A session.
Moderator: Helen Pak-Harvey
Topics & Presenters:
- Transformation to a Patient-Centered Network (Donn Heffner, Brocade)
- Data, eMeasures & the Shift to Fee-for-Value (Randy Thomas, Encore Health)
- Nutanix: A New Way to Solve Healthcare Challenges (Jim Lorenz, Nutanix)
- Healthcare IT Trends (Christina Kyriazi, Peak 10)
- Targeted Threat Hunting (Cliff Kittle, SecureWorks)
- CDW Healthcare: How Our Focus on Mobility is Improving Patient Care (Jay Mervis, CDW)
- The Four Key Elements of Cyber Security (Howard Solomon, ESET)
- Twitter & Healthcare: Making Lifesaving Connections (Janet Kennedy, Get Social Health)
- The Challenge of Securing Healthcare (Ryan Dobbins, infoLock Technologies)
- Single Patient Identity Across All Settings: Eliminating Duplicate Records & Improving Clinical Data (Tom Foley, Lenovo Health)
- The Need for the Digital Roadmap (Luke Borgnis, Sirius Computer Solutions)
The Future Healthcare Ecosystem (Tuesday 8:30-10:00 am)
Moderator: Holt Anderson (Learning Health System)
Topics & Presenters:
- A World Without Meaningful Use (Roy Wyman, Nelson Mullins Riley & Scarborough)
- Next Generation ACO (Andrew Weniger, Firstview LLC)
- Managing Complex Change: Ransomware (Cliff Kittle, SecureWorks)
- Learning Health System (Holt Anderson & Ed Hammond, Duke Clinical Research Institute)
- HIMSS NA (Dana Alexander, Divurgent)
Health Information Exchange in North Carolina (Tuesday 2:45-3:45 pm)
Presenters: Yvonne Hughes (Coastal Connect HIE) & Darryl Meeks (NC HIE Authority)
Applying Analytics to IoT (Monday 9:45-10:45 am)
With the availability of Internet-of-Things (IoT) connected wearable devices, a larger segment of the population have adopted wearable devices that can help monitor their heart rate, sleep, exercise, and other health habits. To effectively leverage streaming data coming from these devices and turn them into actionable information, we need an effective Analytics-of-Things data strategy. This presentation will describe how IoT driven event streaming data and analytics are being used to monitor real-time healthcare data that provides a 360 degree view of the patient. You will learn how SAS is using the IoT to capture event streaming healthcare data, perform analytics on the data, and then upload generated signal alerts derived from vital statistics data into the Cloud. The alerts provide actionable information on health risks that providers may use for follow-up with their individual patients.
- Discuss how streaming healthcare data can used to create meaningful alerts.
- Describe how analytics can turn large amounts of streaming data into smaller more useful data.
- Explain how data from a wearable device can be uploaded into the cloud.
Carol Rigsbee (SAS)
Developing & Operationalizing a Telehealth Strategy (Monday 9:45-10:45 am)
In recent years, various forms of telehealth have emerged, with the goal of providing patients with flexible, timely, and effective care. Although the adoption of this new delivery model has been gradual, organizations are beginning to efficiently plan and implement their strategic visions for telehealth. For many healthcare entities, developing an innovative telehealth strategy is uncharted territory full of new system governance considerations, policy roadblocks, technical challenges, and provider and patient buy-in efforts. Cone Health has successfully navigated these challenges and implemented two major telehealth offerings for its patients: asynchronous e-Visits and live video/phone visits. Cone’s strategy, processes, and organizational infrastructure to support these two programs were the products of careful planning and agile project teams that quickly learned from and adjusted the programs in real time. Cone’s successful management of these two projects has allowed patients in the community to receive high-quality care that meets their evolving expectations for convenience and exemplary service. This presentation will review the outcomes of the e-Visit offering at Cone, the organizational governance used to implement similar projects, the reporting capabilities used to measure patient participation and program success, the efficient communication used in building and modifying a patient-friendly product, and the lessons learned in creating a sustainable telehealth offering for the regional community.
- Describe the necessary steps in planning and deploying a telehealth program.
- Discuss how different use cases and telehealth offerings interact with and impact each other.
- Explain the specific tactics to building a use case for telehealth with patients and providers at your organization.
John Jenkins (Cone Health) & Jake Fochetta (ECG Management Consultants)
The Rise of Ransomware in Healthcare: New Threats, Old Solutions (Monday 9:45-10:45 am)
Recent headlines have highlighted a number of events in which hospitals have suffered a significant impact to their operations due to ransomware attacks. Where traditional cyber attacks have focused on stealing data for the purposes of selling that information on the black market, ransomware has flipped the script by preventing organizations from accessing their critical data and systems unless ransoms are paid. The resulting impact to operations and patient safety can be significant for those who are not adequately prepared. However, in many respects, ransomware is just an evolution of existing malware attacks, and the required defenses are similar. In this session, we will discuss how healthcare delivery organizations have been affected by ransomware, and the steps that can be taken to address these evolving threats.
- Discuss how attackers are changing their objectives from simply stealing data to using extortion to compel the victim to pay a ransom.
- Identify some common ransomware strains and how they can evade traditional defenses.
- Describe approaches that can be used to address the new threats posed by ransomware.
Chuck Kesler (Duke Health) & Jon Sternstein (Stern Security)
How to Leverage Existing Organizational Capabilities to Kickstart Healthcare Analytics (Monday 11:00 am – noon)
Finding and retaining health analytics professionals is more difficult than ever. As other industries are embracing a data-driven mindset, healthcare is just now realizing that such competencies cannot be found overnight. This educational presentation will describe how healthcare has many professionals skilled in data management and reporting, but there is a competency gap in problem investigation and analytics literacy. Most organizations don’t realize there is great potential to grow health analytics by investing in internal candidates with the right thirst for data, even if they don’t have a traditional background. We will share case studies describing how organizations that lead in health analytics have approached this problem. Examples include a development and mentoring plan to nurture skills and teach concepts using an organization’s own ‘dirty’ data. This approach can benefit both the employee seeking career development as well as the employer who has already invested time into growing the staffs’ health data literacy. Finally, we will discuss the “unteachable” traits critical in all knowledge workers and explain how to craft a development plan that nurtures new competencies. Approaches such as these will be critical to closing the projected shortfall of analytics professionals in healthcare over the next decade.
- Describe the five most critical traits of healthcare analysts regardless of their clinical background
- Create an actionable roadmap for a ‘guild’ of healthcare analytics learners at your organization
- Evaluate the variety of free virtual programs, courses and training certificate options and pinpoint what best suits your organization’s needs
Monica Horvath (ThotWave)
Enabling Population Health Informatics (Monday 11:00 am – noon)
Providence Health & Services (PH&S) recently created the Population Health (PH) division. The division’s goal is to maximize the health outcomes of people in defined populations and communities through the design, delivery and coordination of affordable quality health care. Within the division, the Office of Population Health Informatics (OPHI) manages population health data coordination, advanced analytics, predictive modeling, and PH&S Information Technology collaboration. This OPHI also maximizes the ability of Providence’s Electronic Health Record, the Healthcare Intelligence Data Warehouse and other healthcare IT applications to support population health and vendor management. To enable IT support for the functions within population health management, the OPHI, together with Encore, initiated a process to:
- Determine the inventory of PH&S population HIT capabilities across the five states where PH&S provides care
- Determine the level of value the current capabilities provide to PH&S
- Identify redundancy and potential gaps when compared to the needs, goals, and objectives of PH&S overall, the PH division, and the charter of the OPHI
- Determine the information technology needed to address gaps and carry out an efficient and effective selection process
- Assess the current PH&S staff who are performing population health data analytics, informatics and related functions both within the PH division and across the regions, assessing their ability to form the basis of a common shared service of population health informatics
- Identify the data requirements and sources, determine consistency and reliability and identify needed remediation to close gaps and improve data quality
The presenters will summarize by explaining the key lessons learned as PH&S found and brought together the people, processes and technology needed to ensure functional and operational performance within the realm of population health. Finally, the presenters will share PH&S’s successes to date.
- Describe how to prepare to move from a volume-based reimbursement model to a value-based model, including identifying the people, process and technology capacity required.
- Explain how data plays a critical role in making the shift to population health and advocate for better data quality and more sophisticated analytics.
- Apply both PH&S’s successes and lessons learned to help their own population health initiatives succeed.
Randy Thomas (Encore)
Cybersecurity Program Maturity: Are You Chasing Symptoms? (Monday 11:00 am – noon)
In many healthcare organizations, the prevalent approach to cybersecurity can be overly complex and unsustainable. Driven by compliance, healthcare organizations are restrained from moving beyond a reactive approach – allowing compliance initiatives to dictate cybersecurity efforts. Recognizing that healthcare is part of the nation’s critical infrastructure, providers must take steps to proactively address the challenges posed by complex and compliance-driven security. This session will focus on establishing a proactive, holistic, business-aligned approach to cybersecurity using the National Institutes of Standards and Technology’s Cybersecurity Framework for Critical Infrastructure. It will touch on examples of how to translate cybersecurity capabilities into language that can be understood at all organizational levels. Further, this session will illustrate how a proactive and risk informed program can provide enhanced visibility into the root causes of cybersecurity weaknesses. Enhanced visibility into these key areas is essential to strategically plan and operationally confront the threat of data breach and the direct threat to patient safety.
- Explain why compliance does not equal security.
- Identify the root cause of common cybersecurity weaknesses.
- Describe key elements of a proactive approach to cybersecurity in healthcare.
- List the benefits of a cybersecurity framework and program.
Jeremiah Grant & Ed Russell (Novant Health)
Using Technology to Drive CIN Performance (Monday 2:45-3:45 pm)
The US healthcare system is rapidly moving to value-based payment models where quality is rewarded over volume. New models such as ACOs and bundled payments are showing promise to the point that CMS plans on accelerating their adoption. Health care providers are responding by joining forces in a variety of models including clinically integrated networks (CIN) in which disparate organizations cooperate in patient care to reduce overall community spend. Among the challenges facing these providers is the ability to implement cost effective interconnected technology solutions that enable sharing of clinical and financial data across their organizations. This session will focus on practical methods and challenges associated with designing a technology plan that support these CINs. Specific areas that will be covered include:
- What exactly is a clinically integrated network (CIN)?
- The role of the network
- Typical participants
- Payer and patient expectations
- Readiness assessment
- The role of governance in driving technology
- Assessing a current technology’s capability for the CIN
- Existing data and analytics availability and usability
- Developing assessment tools to support your process
- Developing a go forward strategy and plan
- Assessing and accommodating organizational priorities
- Creating realistic and affordable goals and objectives
- Addressing the never ending connectivity challenge
- Establishing standards to drive technology selections
- Lessons learned
- Navigating competing corporate entities
- Working with and across payer programs
- Learning to settle with less to gain more
- Explain the role of clinically integrated networks in value-based care models
- Assess the value of integrated systems to support care management
- Develop internal tools to support your project
Sheldon Hamburger (The Aristone Group)
NC DHHS Meaningful Use Update & Data Use Overview (Monday 2:45-3:45 pm)
The Health Information Technology for Economic and Clinical Health Act provides financial support to Eligible Hospitals (EHs) and Eligible Providers (EPs) for adopting, implementing, upgrading to, or meaningfully using certified electronic health record technology and electronic health information exchange. Beginning with Stage 2 of Meaningful Use in 2014, EHs must demonstrate Meaningful Use by implementing ongoing electronic laboratory reporting (ELR), immunization registry reporting, cancer registry case reporting, and syndromic surveillance data transmission. Similarly, EPs must attest to the core objective of ongoing immunization registry reporting, and may select up to three menu measure options involving submission to state cancer registry, other diseases registries and syndromic surveillance data transmission. The purpose of this presentation is to provide an update on implementing electronic laboratory result reporting, syndromic surveillance reporting, immunization reporting, and cancer case reporting to North Carolina Department of Public Health. Speakers representing ELR, syndromic surveillance, immunization registry, and cancer registry programs will provide updates from each program.
- Describe the four North Carolina public health electronic data systems included in the Meaningful Use requirements and their status with respect to Meaningful Use standards and implementation requirements.
- Describe the current status of the implementing electronic reporting to each of the four Public Health Program areas.
- Describe next steps for Meaningful Use public health reporting in Stage 3.
Lana Deyneka, Emilie Lamb, Chandrika Rao & Wendy Holmes (NC DHHS)
Proposed ‘Modernized’ 42 CFR Part 2 Confidentiality Rules: Panacea or Pandora’s Box? (Monday 2:45-3:45 pm)
In February 2016, the Substance Abuse and Mental Health Services Administration (“SAMHSA”) published a Proposed Rule designed to “modernize” the Confidentiality of Alcohol and Drug Abuse Patient regulations set forth at 42 C.F.R. part 2 (“Part 2”). In its first substantive update to Part 2 since 1987—when electronic health records and accountable care organizations did not exist—SAMHSA hopes to facilitate increased electronic exchange of Part 2 information to enable patients who suffer from substance use disorders to participate in and benefit from a variety of 21st century integrated models of health care. The Proposed Rule also would support disclosure of Part 2 data for clinical research purposes to promote understanding of addiction treatment. To achieve these ends while assuring the ongoing protection of Part 2 data, SAMHSA proposes to permit patients to more generally designate the persons or entities who may receive their Part 2 information, provide patients a right to receive a list of entities to which their information has been disclosed where disclosure has occurred based on the general designation, and require Part 2 programs to have formal security processes protecting Part 2 information. The panel will describe key provisions of the Proposed Rule and will highlight both the opportunities and challenges posed by SAMHSA’s proposed approach and, if a Final Rule has been issued by the Annual Conference, the presenters will offer practical tips for behavioral health providers and other holders of Part 2 information to consider in updating policies, forms, and processes to assure compliance with the new requirements.
- Explain key changes implemented by the Proposed/Final Rule and their anticipated effect.
- Discuss operational challenges posed, and opportunities created, by the Proposed/Final Rule.
- Offer practical tips for policy and process revisions needed to implement requirements of the Proposed/Final Rule.
Patricia Markus (Nelson Mullins Riley & Scarborough)
Improving Revenue Cycle Results through Data Visualization (Tuesday 10:15-11:15 am)
Data analytics in the current healthcare environment is critical for organizations that are attempting to navigate the current environment as well as be prepared for the future. Within healthcare, process analytics is a new discipline that is now available due to the tremendous amount of transaction data that has become available. By combining process data and operational-based information, the healthcare industry must shift its perception of information to realize the true potential, which centers on a marriage between operations, data and outcomes. This combined approach consists of seeing what everybody has seen and thinking what nobody has thought as it relates to driving higher outcomes. Process data and analytics are becoming critical to delivering on a high performance revenue cycle, including patient access, claims and contract management and collections.
- Explain how visualization can impact decision making
- Explain how to use transaction-based data to understand process performance and root cause
- Describe approaches to using visual analysis to drive unguided decision making
Mike Duke (KPMG)
Patient Engagement in a Digital World (Tuesday 10:15-11:15 am)
Patient engagement is often referred to as the holy grail of healthcare. While advances in technology have provided greater opportunities to connect with patients, these advances have also brought about new challenges. In a world where information overload is a common concern, it is imperative that healthcare providers ensure patients receive the appropriate level of information at a time and place that is most beneficial to them. The technology tools available to healthcare providers grows by the day. Patient portals, video chat applications, and interactive systems have all become standard for many healthcare organizations, but have they truly improved patient care? Technology alone cannot engage the patient and improve their care. At ECU Physicians we strive to engage patients with technology that meets their needs and allows us, as a healthcare provider, to maximize the patient engagement and experience. Whether we engage the patient in the office or over a video chat, the goal remains the same, improving the health and welfare of the patients we serve.
- Discuss the positives and potential negatives of using technology to engage patients
- Explain ways to maximize technology in engaging patients
- Identify the various technologies available to facilitate patient engagement
Tommy Ellis & Drillious Gay (East Carolina University Physicians)
Expert Mobility: Managing Wifi, Wearables, Sensors & IoT for Availability, Quality & Security for Availability, Quality & Security (Tuesday 10:15-11:15 am)
Today’s connected hospital relies on mobility for everything from guest services to tracking patients and administering medications. As trends in mHealth and IoHT (Internet of Healthcare Things) grow, the requirements of your network morph to a mobile-first environment where availability, security, and quality are key to patient care and privacy. Learn about the underlying technologies and trends including:
- Today’s and tomorrow’s mobile technology trends
- Specific considerations for healthcare
- Managing the logical and physical aspects of mobility
- Considerations for planning, managing, and securing your mobile environments
- Best practices in design and implementation
- Discuss current and future mobile trends in healthcare.
- Describe best practices for managing the availability, quality, and security of mobile environments.
- Describe threats and vulnerabilities of mobile technology and mitigation techniques.
Jennifer Minella (Carolina Advanced Digital)
Clinical Data Research Networks: Leveraging the Value of EHRs (Tuesday 11:30 am – 12:30 pm)
The use of EHR systems in most health care delivery organizations in the United States has resulted in a plethora of electronic clinical data. Consequently, this is a tremendous benefit to researchers and significantly aids various types of research, including health services research, clinical trials, and quality improvement initiatives. Health care providers are forming networks called “clinical data research networks” to pool their EHR data to support research efforts, research that is essential in the evolving value-based payment environment. This presentation will describe what a clinical data research network (CDRN) is, identify the benefits of CDRNs for research, and review the CDRNs in which Duke Health is currently a member.
- Describe a clinical data research network
- Identify two benefits CDRNs provide to researchers and how CDRNs contribute to the Learning Health System construct
- Name two CDRNs in which Duke Health participates
Janis Curtis & Iain Sanderson (Duke Health)
Developing the Staff & Resource Infrastructure to Support Value-based Reimbursement (Tuesday 11:30 am – 12:30 pm)
This session will help participants strategically develop the staff and resource infrastructure necessary to support a successful transition from fee-for-service to value-based reimbursement. Value-based incentives and penalties continue to rely heavily on capture, management, and reporting of quality measures. University Physicians, in partnership with the University of Colorado School of Medicine, recently created an “Office of Value-Based Performance” to promote alignment of quality reporting and quality innovation activities across a large enterprise consisting of 2,500+ providers. By bringing together expertise in population and care management, quality and performance measurement, analytics, and clinical informatics, the new office is able to look into what we’re doing well and where we can improve. Traditionally, organizations silo this expertise but the Office of Value-Based Performance is aligning it to enhance efficiency and impact.
- Describe the infrastructure needed to successfully manage a transition from fee-for-service to value-based reimbursement.
- Provide compelling arguments for investment in staff and resources to successfully capture, manage and report quality metrics impacting reimbursement.
- Project value-based emergence into commercial payor modeling.
Aaron Van Artsen & John Steffen (University Physicians)
Strategies to Avoid Being the Phisherman’s Catch (Tuesday 11:30 am – 12:30 pm)
Could a hacker deceive you into providing your credentials or personal information? Phishing attacks are now one of the top threats for healthcare organizations. The need to better protect against these intrusions has never been greater – as demonstrated by recent mega breaches and incidents such as Anthem, Premera and Beacon Health System. Hackers are using hundreds of different tactics from fake dating websites to spoof emails that look like they are from the IRS. Learn how to protect yourself. Information assurance veteran David Holtzman will highlight some of the recent attacks we’ve seen across healthcare and identify the risks posed to organizations. Phishing expert Clayton Gouard will provide examples of phishing tactics and explain what end-users should look for to detect potential threats, and offer risk mitigation strategies to combat the phishing threat.
- Identify the risks posed to healthcare organizations by phishing attacks and offer proven strategies for mitigating that risk
- Describe real-world examples of breaches caused by phishing attacks
- Discuss strategies to help you train your workforce to think before clicking on an email
David Holtzman & Clayton Gouard (CynergisTek)
Are You Who You Say You Are? (Tuesday 1:30-2:30 pm)
A long existing problem in healthcare is identifying patients across their multiple sites of care and encounters. The obvious solution of a universal identifier has historically been rejected by privacy advocates, although universal identifiers have existed for use in other fields for many years (e.g., passports, drivers’ licenses, social security numbers). In healthcare, however, unique identifiers have typically been IDs assigned only within some closed environment and numerous person-identifying algorithms that would identify persons with some error using identifying characteristics. According to the ONC, the error rate for patient identification is approximately seven percent. The need to match patient records has become critical as the amount of electronic healthcare data grows, and is especially important for population health management, privacy and security, connected health, and technology transformation. This presentation will examine some of the methods used for unique patient identification, but will propose the creation of a universal identifier that has added advantages to support the patient-centric electronic health record.
- Describe the importance and necessity of identifying a person across multiple sites of care.
- List a number of algorithms available for patient identification, the data elements used, and some of the resulting issues.
- Explain the advantages of a unique, universal personal identifier.
Ed Hammond & Vivian West (Duke Center for Health Informatics)
MACRA: What We Know, Don’t Know & How to Prepare (Tuesday 1:30-2:30 pm)
Payments by CMS through alternative payment models for achieving outcomes and quality will increase to 50 percent by the end of 2018. This shift to payment for value will be driven by APM programs, bundle payments and ACOs. Continued refinement of provisions in the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) will further enhance these models, as well as introduce new physician performance guidelines such as the Merit-Based Incentive Payment System (MIPS). Moving forward to 2019 and beyond, MACRA combines the PQRS, MU, and VBM programs into MIPS and defines incentives for providers to participate in APMs. MACRA creates two tracks for providers: the MIPS or APM option. MU, as we know it today, will end on Dec. 31, 2018, while the final rules for MACRA from CMS are not expected until the fall of 2016. We anticipate ongoing updates from CMS until publishing of the Final Rule. What we do know is that MACRA will create a shift in thinking and approach for providers creating challenges for governance, forecasting, data management, care delivery, and outcomes monitoring. This presentation will give an overview of the current understanding and requirements for MACRA, outline strategies as to how provider organizations should be positioning for success, and help determine the state of readiness through a structured MACRA assessment. Additionally, results will be shared from a cross-section of provider organizations, highlighting their thinking, approach, risk concerns, and preparation for MACRA and transitioning from the MU and quality programs.
- Discuss the challenges of MACRA for anticipated governance, forecasting, data management, care delivery, and outcomes monitoring.
- Describe how providers are preparing for MACRA and transitioning from MU and quality programs
- Outline strategies to prepare for MACRA and support integrated stakeholder accountability
Dana Alexander (Divurgent)
Managing HIPAA Violations in a World of Expanded Access (Tuesday 1:30-2:30 pm)
While the advancement of technology promotes portability and efficiency in healthcare, it also creates risks and challenges with regard to protecting patient privacy. After nearly 13 years of enforcing HIPAA privacy regulations, we still find ourselves peeling back many layers in an attempt to validate the appropriateness of access, identify motives, and ensure appropriate closure and notification. The fact that HIPAA privacy laws exist is common knowledge to the average individual, yet curiosity and a personal “need to know” still motivates some individuals to risk their jobs in order to gain knowledge of another person’s medical information. During this session, learn about the efforts of the New Hanover Regional Medical Center to prevent access violations, how they monitor, investigate, and manage concerns, and how they mitigate violations in order to fulfill legal requirements.
- Discuss ways to strengthen staff awareness of HIPAA and prevent inappropriate access and disclosure of protected health information.
- Describe the anatomy of a HIPAA violation, including sources of concerns and reports, and monitoring activities.
- Discuss the importance of mitigation and notification requirements, as well as thorough documentation.
Vera Newkirk (New Hanover Regional Medical Center)
Click the link below to review the agenda.