2nd Information Security in Health Conference

What measures does the law prescribe with regard to the information security of the patient file? Where are the stumbling blocks? What practical experience already exists? The 2016 Information Security in Health Conference in Rotkreuz/ZG will focus on information security and data protection in the electronic patient dossier.

Dr. rer. nat. Günter Karjoth at the Information Security in Health Conference 2015. Before that, he worked for more than 25 years at the IBM Research Laboratory Zurich in the areas of identity and access management as well as data protection in companies, among others.

Information security and data protection are sticking points in the introduction of digital data traffic in the healthcare sector. In addition, there is the increasing cost pressure to which the service providers are exposed. Mediation skills between politics, technology, healthcare and medicine are more important than ever.

The main goal of the Information Security in Health Conference is therefore to enable users, providers, patients and decision-makers to talk to each other in a more meaningful way. Only in this way will a practical implementation of the legal requirements be possible.

The conference is committed to building bridges between information technology, politics and medicine. In 2016, the focus is on the information security of the patient dossier adopted in summer 2015 and what this means for practical implementation.

Why go there?

Building Knowledge: Four keynote speeches, three interactive breakout sessions, lunch talks and a concluding panel discussion will provide health professionals with the information security knowledge they need for the patient dossier.

  1. Recognizing trends: Only those who know what tomorrow could be can act today. Benefit from updates on the latest developments in the IT health sector. Benefit from the experience of others and learn about new developments.
  2. Make better decisions: Base your knowledge technology decisions on the best available knowledge and find experts who can support you.
  3. Share experience: Share problems and solution strategies with other health experts. Communicate across disciplines.
  4. Expand your network: Make valuable contacts with other health and IT professionals.
  5. Identify security vulnerabilities: Learn how to find security vulnerabilities in your information systems. Learn how to keep your IT infrastructure secure without increasing costs.

For whom?

Employees of hospitals and other healthcare organisations: IT managers, IT specialists and technicians, security managers, administrative staff, nursing service managers, senior physicians, management bodies.

  • Doctors
  • Employees of insurance companies and health insurers: Risk experts, security officers, IT specialists and technicians
  • Insurance Commissioner
  • healthcare company
  • Pharmacists
  • health policy makers
  • Employees of health directorates

What is at issue?

  • Legislation and implementation
  • Data anonymization
  • identity and access management
  • Authentication
  • Safe devices
  • Medical Technology

How much does it cost to attend?

The early booking price of CHF 410.- is valid until 30 April 2016. After that, the participation fee is CHF 460. The price includes drinks, stand-up lunch and downloadable presentations.

Special price: Members of the following organizations benefit from a special price of only CHF 380: Swiss Society for Medical Informatics (SGMI); Health Tech Cluster Switzerland (HTCS); Healthetia; Alumni Lucerne University of Applied Sciences and Arts; Technologie Forum Zug; Customers of HEALTH INFO NET AG.

Where will the conference be held?

The event will take place at the Dorfmatt Zentrum in Rotkreuz. The venue is ideally accessible by public transport due to its location directly at Rotkreuz railway station. Parking spaces are available for those arriving by car.

You can find more information about the Information Security in Health Conference at this Link

(Visited 130 times, 1 visits today)

More articles on the topic