HCI's Back Burner Stories: CIOs Wanted

June 24, 2011
Not every story is researched and written in a month, so we’re letting these ambitious projects percolate on the back burner until they’re ready to

Not every story is researched and written in a month, so we’re letting these ambitious projects percolate on the back burner until they’re ready to serve. CIOs, consultants and analysts looking to participate can contact Anthony Guerra.

Security Breach: Every CIO's Nightmare

Security breaches involving personal health information (PHI) are now taking place regularly. What's most troubling is when it comes down to it, they are extremely difficult to prevent, as nearly all have been "inside jobs." What happens when a breach does take place? We interview CIOs who have gone through this experience and talk about the issues they have faced — strategic, communications/public relations, tactical, technological. We look at how they've survived, and what the impact has been on their IT operations and institutions. We also talk to worried, thoughtful CIOs who haven't yet experienced major breaches, but who know they're inevitable over time, and to consultants who are familiar with numerous incidents and situations, and how they're advising their clients.

When is it Time for a Divorce?

Many hospitals have had a major core clinical and financial vendor system in place for years. Now, after full implementation, some are leaving their legacy system for another big player. Out of the frying pan and into the fire? We take a look at hospitals that have switched from one of the following vendors to another — McKesson, Cerner, GE, Siemens, Eclipsys, Epic and Meditech. What is the rationale behind this kind of defection? And how can an enterprise mitigate the risk of crossing from one “big” to another.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...