Department of Defense to play featured role at HIMSS14

Jan. 31, 2014

This year HIMSS14 offers an extremely robust public policy agenda with presentations ranging from the National Strategy for Trusted Identities in Cyberspace, to several HHS Office of the National Coordinator sessions, and everything in between. Today, we'll focus on the timely offerings from the Department of Defense (DoD). 

DoD leaders will headline the following sessions:

Federal Health Community Forum: Standing Up IT as a Shared Service in the U.S. Military (session #54)

Monday, February 24, 1:00-2:00 pm – Room 330D

Featuring David Bowen, Director of the Health Information Technology Directorate for the Defense Health Agency and Chief Information Officer, Military Health System, Department of Defense

Better Buying Power—How Defense Acquisition Improves Data Interoperability and Electronic Health Record Modernization(session #71)

Tuesday, February 25, 8:30-9:30 am – Room 330A

Featuring Christopher Miller, Program Executive Officer, DoD Healthcare Management System, and Acting Deputy Director, Interagency Program Office

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...