Skip to main content

Risk Management

By HIMSS TV | 09:40 am | July 02, 2019
Simer Sodhi, director of data management & analytics at Westchester Medical Center, details how integrating data from the EHR using a machine learning algorithm connects patients to the right sources of care.
By HIMSS TV | 01:32 pm | June 26, 2019
Ronald Petru, CMIO at Radboudumc in the Netherlands, says that organizations need to change the workforce culture, while also ensuring that a proportional investment is made into security to ensure risks are mitigated.
By HIMSS TV | 08:57 am | June 18, 2019
Day 1 of of our event in Helsinki included discussions of hot topics including blockchain, cybersecurity and patient advocacy. Watch the stream in its entirety.
By HIMSS TV | 02:52 pm | June 17, 2019
All stakeholders need to help ensure that cybersecurity is taken seriously and acknowledge risks to outcomes, says Saif Abed, MD, founding partner of AbedGraham Healthcare Strategies.
By HIMSS TV | 12:45 pm | June 12, 2019
SVP of Operations Wael Alkhalidi says startup Medicalchain is using distributed ledger technology to enable patients to find all their medical data in one place.
By HIMSS TV | 09:25 am | June 10, 2019
Richard Staynings, an independent executive security leader, says protecting patients' data from security breaches needs to be a big part of keeping patients safe.
By Susan Morse | 12:45 pm | June 03, 2019
During June, HFN will dive into the new payments, interview experts and report on what's really happening with value-based care.
By HIMSS TV | 05:28 am | May 31, 2019
BitSight Vice President Jacob Olcott says healthcare organizations need to assess and monitor business relationships because of the dangers of cyber threats.
By HIMSS TV | 01:03 pm | May 08, 2019
Starship Children's Health is accomplishing patient matching to a high degree of confidence, claims Dr. Greg Williams, clinical director at the New Zealand hospital.
By HIMSS TV | 04:57 pm | May 07, 2019
Agari Field CTO John Wilson explains how the security vendor is protecting organizations from threats such as the Scarlet Widow scam and the display name deception tactic in a world where geopolitical boundaries do not apply to the internet.