This report reveals how a growing number of patient experience programs have moved beyond focusing primarily on training nurses to also include physicians and a host of nonclinical staff. Another sign of the degree to which organizations are embracing patient experience is the increasing number which feature a chief patient experience officer (or individual with similar responsibilities) on the senior leadership team. Complete this short form to download your FREE copy of PATIENT EXPERIENCE: Cultural Transformation to Move Beyond HCAHPS
Workforce management and the pursuit of productivity have formed a consistent pain point for hospitals for several years. The Affordable Care Act has only exacerbated the problem, increasing the demand on providers as the number of insured grows and the bar continues to rise on quality of care. According to a recent HealthLeaders Media Council survey, workforce productivity and acuity-based staffing will continue to be top priorities this year. Karlene Kerfoot, PhD, chief clinical integration officer at API Healthcare, says the survey results indicate a shift taking place as workforce management initiatives are expected to deliver more than reduced labor costs.
As chief transformation officer at MemorialCare Health System in Los Angeles and Orange counties, CA, it’s Helen Macfie’s job to rethink the future of healthcare delivery. Lately, she’s been thinking a lot about healthcare reform and care redesign as the six-hospital integrated delivery system, with more than 200 care sites, focuses on growth across the Southern California region.
Published By: Emarsys
Published Date: Dec 20, 2018
As a modern marketer, you’re always looking for ways to improve your efficiency at work, especially in the form of software that makes some part of your job easier. You’ve likely heard a lot lately about AI in marketing and how it promises to do just that – and more, of course. In fact, it’s pretty hard to avoid the topic of AI and all the ways it is destined to change marketing as we know it. You may already know that companies who have adopted AI boast about the results: increased conversions, engagement, and a host of other metrics. With such decisive evidence, everybody must be aware of AI and clearly sees its business potential, right? Then you go to your Chief Marketing Officer to strike up an informal conversation where you can strategically recommend the technology, and it starts off great — your CMO is well aware of AI and what it could do for the business. You’re thinking, “What luck! I might not have to put up much of an argument.” Then your CMO says, “But you’re not a data
Published By: Mimecast
Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee.
Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss:
The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside.
The multiple ways internal email threats start, and why human error nearly always plays a role.
The scale and impact of attacks that spread via internal email.
How to extend your current protection with Mim
A Chief Marketing Officer's Roadmap.
In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Published By: DocuSign
Published Date: Feb 13, 2017
DocuSign electronic signatures are valid and legally binding around the world. In fact, they are more enforceable than traditional handwritten signatures. Hear from DocuSign's Chief Legal Officer, Ken Moyle, and DocuSign's Founder, Tom Gonser, about how DocuSign delivers the highest levels of legal enforceability and is the only eSignature provider to warrant compliance with the Federal ESIGN Act.
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable?
MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the
way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers.
Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security
investments to bridge the divide between largely siloed security systems. The focus is on reducing
the number of consoles needed to manage the security infrastructure. Network security vendors have
a significant role to play in bridging the communication gap between these systems. The creation of a
unified defense architecture enables threat data exchange between existing security systems. It helps
automate the process of raising an organization's security posture when a security infrastructure
component detects a threat.
The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security
Products program, on behalf of Fortinet's customers.
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Published By: ServiceNow
Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital.
These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Published By: FusionOps
Published Date: Jun 15, 2016
Bimodal capabilities, customer intimacy and advanced analytics can all be enabled by digital technologies, allowing supply chains to be both cost-effective and innovation-driven.
This research explores the implications of these leading trends for chief supply chain officers.
"The success of your digital strategy requires bridging the gap between your core capabilities and what customers want.
Watch this on demand webcast with Forrester’s Vice President and Principal Analyst, Ted Schadler, Michael Fasosin, Chief Strategy Officer, Spindrift & DigitasLBi OSG, and Oracle to learn:
- Key trends in consumer online shopping behavior
- How to develop a successful digital experience technology strategy and roadmap
- The essential components of a modern digital experience platform
- How to achieve quick-wins and long term investments simultaneously
You will also see a short demonstration of how Oracle's CX Cloud solutions deliver personalized, unified experiences across channels. "
Published By: Evariant
Published Date: Sep 07, 2016
Many hospital Chief Marketing Officers continue to debate whether their institution should transform their traditional marketing campaigns and embrace digital marketing. If you are in doubt as to whether digital marketing is important to your success and the success of your hospital, look at the countless articles, white papers, and blogs that have been published over the past several years that talk to the use of the internet and web-based services by patients and consumers. Here are a few of the latest examples from Pew Research Center’s Health Fact Sheet (
This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change.
The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Quali caratteristiche deve avere un buon leader?
Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Ashley Goldsmith ist Chief People Officer bei Workday. Ihr obliegt die Verantwortung über das Personalwesen, die interne Kommunikation, das Global Impact-Programm, die Arbeitsplatzausstattung und die Workday Foundation. Bevor sie zu Workday kam, war Ashley Chief Human Resource Officer und Executive Vice President bei Polycom. Vor ihrer Zeit bei Polycom war sie Senior Vice President für Personalwesen, Unternehmenskommunikation sowie Environmental Health und Sicherheit der Sparte Tissue Diagnostics bei F. Hoffmann-La Roche. Außerdem war Ashley Chief Human Resource Officer bei Ventana Medical Systems und Vice President für Personalwesen bei The Home Depot.
Wir sprechen oft über die Zukunft, aber wie oft malen wir sie uns wirklich aus?
Stellen Sie sich eine Personalleiterin vor, die eine hoch effiziente HR-Abteilung führt: Als CHRO – oder vielleicht trägt sie auch den heute schon gängigen Titel „Chief Employee Experience Officer“ – nimmt sie in nicht allzu ferner Zukunft an einer Telefonkonferenz zu den Finanzergebnissen teil. Sie unterstützt den CEO darin, zu veranschaulichen, wie neu formierte Mitarbeiterprogramme zu dem jüngsten, positiv überraschenden Unternehmensgewinn beigetragen haben. Im Anschluss stellt die Personalchefin eine Verbindung zu einem modernen Virtuality-Reality-Konferenzraum in einem Tokioter Hotel her, um ein Pressebriefing zu geben. Sie bittet die Teilnehmer (mithilfe ihres „Hearable“- Übersetzers, der sie in Echtzeit dolmetscht und der nun von jedermann diskret im Ohr getragen wird) auf Japanisch, ihre kurze Verspätung zu entschuldigen, bevor sie ihre innovativen Pläne zur Schließung von Kompetenzlücken durch ko
Ashley Goldsmith ist Chief People Officer bei Workday.
Ihr obliegt die Verantwortung über das Personalwesen, die interne Kommunikation, das Global Impact-Programm, die Arbeitsplatzausstattung und die Workday Foundation. Bevor sie zu Workday kam, war Ashley Chief Human Resource Officer und Executive Vice President bei Polycom. Vor ihrer Zeit bei Polycom war sie Senior Vice President für Personalwesen, Unternehmenskommunikation sowie Environmental Health und Sicherheit der Sparte Tissue Diagnostics bei F. Hoffmann-La Roche. In dieser Bericht lesen sie über Ihre Erfahrung und Tips für HR-Führungskräfte.
Stellen Sie sich eine Personalleiterin vor, die eine hoch effiziente HR-Abteilung führt: Als CHRO – oder vielleicht trägt sie auch den heute schon gängigen Titel „Chief Employee Experience Officer“ – nimmt sie in nicht allzu ferner Zukunft an einer Telefonkonferenz zu den Finanzergebnissen teil. Sie unterstützt den CEO darin, zu veranschaulichen, wie neu formierte Mitarbeiterprogramme zu dem jüngsten, positiv überraschenden Unternehmensgewinn beigetragen haben. Im Anschluss stellt die Personalchefin eine Verbindung zu einem modernen Virtuality-Reality-Konferenzraum in einem Tokioter Hotel her, um ein Pressebriefing zu geben. Sie bittet die Teilnehmer (mithilfe ihres „Hearable“- Übersetzers, der sie in Echtzeit dolmetscht und der nun von jedermann diskret im Ohr getragen wird) auf Japanisch, ihre kurze Verspätung zu entschuldigen, bevor sie ihre innovativen Pläne zur Schließung von Kompetenzlücken durch kontinuierliche Schulungen am Arbeitsplatz vorstellt, die auf die gesamte Asien- Paz