DSIH webinar, Thursday 06/10 “Mapping and protecting your data: solutions to prevent the risks associated with cyber attacks”


Healthcare institutions are relentless producers of data. They are also collectors. Whether we are talking about medical reports, biological analysis results, image interpretations, but also identity cards, passports, vital card numbers or patient contact details, the IS health establishments concentrate millions of information, almost all sensitive to the meaning of the production of care but also to the regulations associated with the GDPR. How to qualify them, protect them and ensure the inviolability of the most sensitive data?

Digital Health Thursdays, Thursday October 6 at 10:30 a.m.:

As the mapping of material and immaterial assets of the information system is one of the keys to controlling the IT department, and their security is an issue for the availability and integrity of business processes, healthcare establishments should have a map of the data, taking into account their location, the traceability of their use and their qualification in terms of sensitivity. Very useful for the Data Protection Officer, the DPO, this inventory of data, with a definition of their sensitivity and the a posteriori control of their access, proves to be a very practical tool for the DSI and the RSSI, as responsible for their security, their backups and their ability to restore them in the event of a compromise.

To identify and qualify the data, artificial intelligence technologies are developing, able to recognize photos of individuals, social security numbers, postal addresses but also pre-programmed keywords or expressions allowing medical documents to be automatically identified. Thanks to such algorithms, the identification and qualification of data can be carried out in dynamic mode, or in audit mode, providing valuable information to the DPO as well as to the DSI / RSSI couple.

We can thus think of differentiated backup strategies, focusing technical effort and investment on sensitive data categories and less on others. We can also, in the event of a ransomware attack or data leaks, quickly identify impacted sensitive dataand take the necessary measures as soon as possible.

Map data, refine your backup strategy, benefit from immutable and non-encryptable backups, react faster to a cryptovirus attack : register for the webinar hosted by Xavier VALLIN and Vincent TRELY, in partnership with the specialized company RUBRIK.

As usual, prior registration required, by clicking on the following link:

A DSIH webinar, intended for CIOs, CISOs, Engineers, Administrators and IT Project Managers.


We would love to say thanks to the author of this post for this outstanding web content

DSIH webinar, Thursday 06/10 “Mapping and protecting your data: solutions to prevent the risks associated with cyber attacks”

Check out our social media accounts as well as other pages that are related to them.https://www.ai-magazine.com/related-pages/