All events are in Eastern Time (ET) unless otherwise noted in the event description.

  • Event Information

    These series are available to CHIME, AEHIA, AEHIS and AEHIT provider members only. Foundation members will be able to view session archives, which can be found at the bottom of this page.

    As the Covid-19 pandemic spreads, health care providers around the world are facing unprecedented challenges but also opportunities to rethink healthcare. Brian Herrick, CIO of Cambridge Health Alliance, will share his observations and teachable moments around telehealth. By providing a secure virtual connection between patients and caregivers, Cambridge Health Alliance has been able to leverage telehealth as a way to extend care and meet community needs during a time of physical distancing.

    How do providers extend their reach in helping communities with telehealth? What barriers exist in telehealth in creating a means of connection? What will the new normal look like? These are just a few of the questions we’ll explore in this session and discussion to follow.

    Innovation Beyond the Edge features industry experts sharing knowledge and experience bringing advanced technology to health and care, and a collection of executives discussing creative problem solving to the COVID-19 pandemic. These TED-style talks are impactful and informative, inspiring health IT leaders to drive innovation within their organizations.

    Session sponsored by:

    Google Cloud
  • Event Information

    In this presentation, John Gomez, CEO of Sensato, will present a thesis first established in his podcast Tactical Cybersecurity. The theory is based on two questions; both put forth to him by CISOs after a breach. How were the attackers successful given how well we have done in our assessments, and what scares an attacker? During this dynamic and lively presentation, John will dive into the background of these questions, provide context to what makes an assessment and security framework successful or fail and share the results of research when over 100 attackers asked – what scares you? Learning Objectives:
    • Allow the attendee to identify practices that create a false sense of security.
    • Identify the one true test of cybersecurity maturity.
    • Identify technologies and practices that cause concern to cyber attackers.
    • Utilize maturity as a means to illustrate risk to executives and colleagues.