AMGA 2014 Annual Conference - Grapevine, TX
 

Wednesday, April 2

 

 

1:00 p.m. – 1:15 p.m.

 

Welcome & Introductions

Tim Terrell, MS, Chief Information Officer, Cornerstone Healthcare; Chair, CIO Leadership Council

1:15 p.m. – 2:15 p.m.

Analytics for Value

Tim Terrell, MS, Chief Information Officer, Cornerstone Healthcare; Chair, CIO Leadership Council

2:15 p.m. – 3:15 p.m.

Patient Engagement

3:15 p.m. – 3:30 p.m.

Refreshment Break

3:30 p.m. – 4:45 p.m.

Clinical Integration & HIE Discussion

Moderated by: Tim Terrell, MS – Chief Information Officer, Cornerstone Healthcare; Chair, CIO Leadership Council

  • Ways to Clinically Integrate a Community of Physicians
  • Decisions & Pitfalls around HIE Deployment

4:45 p.m. – 5:00 p.m.

Wrap-Up & Adjourn

5:30 p.m. – 7:00 p.m.

AMGA Board of Directors and Leadership Councils Reception

 

Thursday, April 3


7:00 a.m. – 8:00 a.m.

Joint Leadership Council Breakfast

8:00 a.m. – 9:15 a.m.

Regulatory Environment Issues

Group Discussion of:

  • ICD10 Preparedness
  • Meaningful Use Audits
  • HIPAA Risk Assessments
  • HIPAA Security Rule Audit

9:15 a.m. – 10:15 a.m.

Hot Technologies for 2014

Attendees are asked to come prepared to ask the following questions:

  • What types of hardware and software systems are being put in by the members?
  • Will ROI measurement change with new health care funding changes?
  • What is being done to improve physician engagement and satisfaction with automation?

10:00 a.m. – 10:30 a.m.

Networking Break

10:30 a.m. – 12:00 p.m.

Technical Security Plan

Tim Terrell, MS, Chief Information Officer, Cornerstone Healthcare; Chair, CIO Leadership Council

Mac McMillan, Chairman and Chief Executive Officer, Cynergistek

  • How to Protect a Medical Group or Hospital Against Security Threats?
  • What Are the Threats, Systems, and Approaches to Protecting Your Group?

12:00 p.m. – 1:15 p.m.

Lunch 

1:15 p.m. – 2:15 p.m.

Administrative Security Plan

Mac McMillan, Chairman and Chief Executive Officer, Cynergistek

  • What Processes and Procedures to Have in Place
  • What Practical Measures are Needed to Implement in a Non-Technical Security Program?
  • What Would a Security Training Program Look Like?

2:15 p.m. – 3:15 p.m.

 

Creating a Security Framework Standard

The group will continue to work on creating a model information security plan.  We’ll list specific security areas that need to be addressed and model security plans to needed in each area.  The goal is to create a security framework that still allows data to flow freely as we create CINs and ACOs.

3:15 p.m. – 3:30 p.m.

Refreshment Break

3:30 p.m. – 4:45 p.m.

Creating a Security Framework Standard Continued

4:45 p.m. – 5:00 p.m.

Wrap-Up & Adjourn

5:00 p.m. – 7:00 p.m. 

Welcome Reception in Exhibit Hall