Info@NationalCyberSecurity
Info@NationalCyberSecurity

UHealth IT Receives National Recognition in Cybersecurity and Revenue Optimization | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


By: Joey Garcia

Becker’s Hospital Review recently recognized two members of the IT team at UHealth – University of Miami Health System for their innovative work in cybersecurity and revenue optimization.

September 6, 2023 – Mauricio Angee, D.B.A., chief information security officer for UHealth, was selected as one of Becker’s 60 hospital and health system CISOs and CPOs to know. James Lindgren, executive director of revenue cycle optimization, was chosen as one of Becker’s 30 health IT and revenue cycle up-and-comers.

“Working with Mauricio and James has been an incredible journey,” said David Reis, Ph.D., vice president of IT and chief information officer at UHealth. “Their commitment to excellence and their forward-thinking approaches continue to drive positive transformation within our team and UHealth as a whole.”

Contributions to Cybersecurity

As technology advances, protecting patients’ data becomes more vital, and UHealth has led the way in this protection thanks to Angee. Becker’sacknowledged him on their list of 60 individuals executing vital cybersecurity initiatives and integrating innovative technologies to protect patient privacy.

Angee credits his early experience in IT to the programming he used to do on his first computer. Soon after that, he began working in a computer integrator repair shop, started his computer business and landed his lifelong dream job at NASA’s Kennedy Space Center as an IT security specialist.

In his CISO role at UHealth and the University of Miami, Angee oversees the implementation of security solutions to help strengthen the institution’s cybersecurity posture while bolstering the network infrastructure against cyber threats. Additionally, he oversees the management of security technologies and leads incident response efforts, while collaborating with leadership and other departments to integrate security measures and promote a culture of security across the institution.

“My role is to be the guardian of information for the health system and University,” Angee said. “Here, I ensure data integrity, confidentiality and availability while fostering a secure and compliant digital culture. These factors allow our organization to continue caring for patients, educating our students and conducting groundbreaking research.”

The CISO recognition is one of many for Angee, who has previously been recognized with the CSO 50 and Top 100 CISO awards.

Optimizing Health Care Revenue Processes and Solutions

Individuals selected for Becker’s up-and-comer list have risen into leadership roles that impact their organizations’ growth, financial operations and outcomes. In addition, they bring a deep understanding of health care’s changing landscape and help their organizations adjust accordingly. These are all qualities James Lindgren exhibits in his passion for the field.

“I have always been interested in health care efficiency and its impact on public health,” Lindgren said. “I knew I wanted to make an impact in an environment that challenged me and fostered personal and professional growth. Here at UHealth, I can do so by participating in projects that transform the patient, faculty, and staff experiences and support our ability to meet our strategic operational and financial goals. I am extremely thankful for this recognition and appreciate UHealth for supporting all these efforts within IT and clinical operations.”

Working for Epic Systems opened Lindgren’s mind to the value of health care process optimization. In his role at UHealth, he drives numerous projects utilizing artificial intelligence and machine learning to produce effective outcomes. Some of his projects include a revenue integrity forecasting tool; a patient no-show predictive analytics tool; an exam room utilization tool; and a suite of revenue cycle billing and task automation projects.


Post Views: 2

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW