Resources from MTM Services
Supervisor to Manager to Leader
Position your leadership team for success in a dynamic, value-based health care marketplace. David Lloyd and MTM Services have helped more than 800 health care providers harness their potential and transform it into meaningful change. Now, it’s your turn. David will guide you through critical issues of leadership skill development.
Open Access 101
Open Access is the best way to engage consumers quickly into treatment, but designing open access is never a “one-size-fits-all” approach. Joy Fruth, MTM’s lead process change consultant, shares knowledge gained from more than 500 Same Day Access transitions, including insights regarding centralized scheduling, collaborative documentation and no-show management.
Methodologies of Implementing Costing Measurements
As teams adopt value based reimbursement models that must follow the value of care equation to be successful, they are making large and vital decisions for their agencies – often based upon inaccurate or incomplete information. In this session, Scott Lloyd, president of MTM, shares insights from his work helping set up systems across the country.
Operationalizing Value Based Reimbursement
David Lloyd, founder of MTM and author of Leadership Skills to Support High Functioning Teams, focuses on how local leadership teams can shift from a discussion of the need to embrace VBR to identifying the four core value-based practice requirements that will support a timely transformation of fee-for-service operational and clinical service delivery models.
Satisfied with Your Return on IT Dollars Spent?
Charlie Grantham, Senior IT Systems Specialist for MTM Services, provides an overview of the assessments needed to help you determine if you are getting the best from your IT investment. The webinar focuses on: assessing your current IT system and EHR status; using cost-effective strategies to get the most out of future IT spending; meeting meaningful use requirements; and addressing cybersecurity threats: phishing, ransomware and social engineering attacks.