TV

Announcements 03-04-2016

Highlights from HIMSS 2016

Sara Drury

Thousands of health IT professionals gathered this week for the annual Health IT Conference (HIMSS16) in Las Vegas, Nevada. With more than 1,200 vendors and 400+ educational sessions to choose from, attendance tallied a mix of more than 41,000 professionals, clinicians, executives, and vendors from all over the world.

While there are many exciting highlights from this week, health IT security is at the root of each topic, understandably so, as patient and provider privacy is a primary concern in the healthcare industry. In fact, the conference discussed this topic at length at the Interoperability showcase and Cybersecurity Command Center.

Interoperability

Monday’s symposia acted as a precursor to what most would consider this week’s most popular buzz—interoperability. HHS Secretary Sylvia Burwell’s called for an interoperability pledge to make Electronic Health Records (EHRs) work better for patients and providers. The three core commitments of the Interoperability Pledge include:

  1. Consumer Access: To help consumers easily and securely access their electronic health information, direct it to any desired location, learn how their information can be shared and used, and be assured that this information will be effectively and safely used to benefit their health and that of their community.
  2. No Blocking/Transparency: To help providers share individuals’ health information for care with other providers and their patients whenever permitted by law, and to not block electronic health information (defined as knowingly and unreasonably interfering with information sharing).
  3. Standards: Implement federally recognized, national interoperability standards, policies, guidance, and practices for electronic health information, and adopt best practices including those related to privacy and security.

Burwell also emphasized that

Further, as Carla Smith from the HIMSS management team recalls, the interoperability showcase was a “true demonstration of interoperable Health IT in actions. You can see how your health information moves from solution to solution seamlessly and with appropriate security protocols in place so that the right information is available to the right people at the right time.” Interoperability was one of this week’s hottest topics at HIMSS16.

Cybersecurity Command Center

Mary Griskewicz, director of strategic sales for HIMSS North America, recalls the on the HIMSS show floor as the place to learn the importance of “how to prevent hacking in ransomware and [make] sure that the hospital security and all the personal health data stays secure.”

According to the new 2016 HIMSS Connected Health Survey, . Any one failure, as cybersecurity pro Mike Miliard cautions, . Therefore, it is critical to identify gaps and establish protocol to address vulnerabilities in networked medical devices, which, according to Miliard, requires a closer working relationship between IT and medical personnel.

Miliard also points out that health-data processing is progressively taking place remotely through the use of smartphones and other personal devices. While the progression of connected health technologies allows for patients and providers to connect outside of the examination room, the more devices connected to patient health information also puts patient safety at risk. Making the security of connected devices an essential priority is key in this industry.

In Summary

To make these technologies secure enough to ensure the privacy of their users, developers must remember the pillars of protection that include: backup, encryption, anti-malware, and strong authentication.

HIMSS 2016 will round up a full week of health IT talk and exciting new announcements with closing keynote speaker, Peyton Manning.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-27-2024

6 actionable ways to secure the IIoT at every stage

Tracking the progress toward post-quantum cryptography

The state of PQC since the publication of FIPS 203, 204 and 205