Resources from MTM Services

Webinars


joyfruth

Open Access 101

Open Access is the best way to engage consumers quickly into treatment, but designing open access is never a “one-size-fits-all” approach. Joy Fruth, MTM’s lead process change consultant, shares knowledge gained from more than 500 Same Day Access transitions, including insights regarding centralized scheduling, collaborative documentation and no-show management.

View the Slides   Watch the Recording


anniejensen

Sustaining Open Access

Annie Jensen, process change consultant at MTM shares insights on how to sustain an open access model of care by enhancing other areas of operation and service delivery to enable organizations to provide high quality of service to consumers.

View the Slides   Watch the Recording


scottl.jpg

Methodologies of Implementing Costing Measurements

As teams adopt value based reimbursement models that must follow the value of care equation to be successful, they are making large and vital decisions for their agencies – often based upon inaccurate or incomplete information. In this session, Scott Lloyd, president of MTM, shares insights from his work helping set up systems across the country.

View the Slides   Watch the Recording


davidlloyd

Operationalizing Value Based Reimbursement

David Lloyd, founder of MTM and author of Leadership Skills to Support High Functioning Teams, focuses on how local leadership teams can shift from a discussion of the need to embrace VBR to identifying the four core value-based practice requirements that will support a timely transformation of fee-for-service operational and clinical service delivery models.

View the Slides   Watch the Recording


SLP-MTMHeadshots_10-20-17_ (64 of 72)-1.jpg

Satisfied with Your Return on IT Dollars Spent?

Charlie Grantham, Senior IT Systems Specialist for MTM Services, provides an overview of the assessments needed to help you determine if you are getting the best from your IT investment. The webinar focuses on: assessing your current IT system and EHR status; using cost-effective strategies to get the most out of future IT spending; meeting meaningful use requirements; and addressing cybersecurity threats: phishing, ransomware and social engineering attacks.  

View the Slides   Watch the Recording