Growing area of ​​attack: The importance of cybersecurity for medical technology

11 januari 2022

During this Virtual Round Table André van Cleeff, CISO at St. Antonius Hospital, shares his experiences with a vision on an integrated approach to medical information technology and the ICT domain. He pays special attention to safeguarding privacy and continuity of patient care in the event of a breakdown. Are you curious about his experiences and vision of the future? Would you like to discuss the safe guidance of an organization in transition with peers? Then you are most welcome to participate in this Virtual Round Table!

  • Small scaled peer session
  • Open dialogue by means of the Chatham House Rule

André van Cleeff, St. Antonius Ziekenhuis

Sign up
Speaker
André van Cleeff

Voordat André begon bij het St. Antonius Ziekenhuis was hij onder meer werkzaam als adviseur bij DXC Technology en als onderzoeker op het gebied van informatiebeveiliging verbonden aan de Universiteit van Twente. In zijn huidige rol als CISO is André verantwoordelijk voor het ziekenhuisbrede informatiebeveiligingsprogramma en het in stand houden van de NEN 7510 certificering. Hiervoor werkt hij nauw samen met andere zorginstellingen en leveranciers.

Company
St. Antonius Ziekenhuis

Information
Topic

In healthcare, software applications and medical devices are increasingly exposed to cybersecurity risks. These risks are becoming increasingly visible. In November 2021, it was revealed that thousands of types of medical devices are insufficiently protected. Measures taken by individual hospitals are only part of the solution; there is also a need for a more central approach in which suppliers and other chain partners play an important role.

Program

16.00 – 17.30

Audience

CISO and CIO

Main language

Dutch

Conditions

  • Participants have to meet the previously described target audience.
  • If applicable, our partners will be presented with every application.
  • During all our sessions, the Chatham House Rule applies. This means that the participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed. This means that no report, no photos and no recordings are made of the meeting. The presentation will also not be distributed to the participants afterwards.
Partners

Contact information

Agenda

Do you wish to be informed about our upcoming sessions? Subscribe to our monthly agenda!