SlideShare a Scribd company logo
KeyTalk

PortalTalk
(source: KPMG)
   General privacy laws and specific laws apply
   All parties receiving data must be bound by professional secrecy (art. 458)
   Limit access to relevant information (art. 458)
   Explicit approval by patient required (art. 458)
   ICT standards on the exchange of health data apply (law 21-08-’08)
   Hospital file= medical file managed by Doctor + nursing file managed by Nurse (Law 07-08-’87)
   Patients rights (Privacy guaranteed), health professional obligations (management of access rights)
   Patient Consent is required within medical team, within organization, across organizations
   ISO27001 (Other standards: HIPAA)
   HL7 – std for exchange of health data



Sanctions: EUR 500-550K, imprisonment, health professional reputation


Applicable legislation (BE)
   IPad toegang tot HIS (vb. Epic)
   Onderzoeksdata (bv. Borstkanker: behandelen, genereren & combineren (big-)data, analyseren)
   Regionale samenwerking van ziekenhuizen (bv. AMC, Flevo)
   EPR (bv. Tandheelkunde: beeldmateriaal delen)
   Diagnostische centra (vb. Diagnostiek4U)
   Zorg op afstand (MAD Europe)
   Zelfstandige behandelcentra (vb. Obesitas, Diaboss)
   Artsen die voor meerdere ziekenhuizen werken

Dutch Cases
Health Professional requests a new
role .
For example EPR for a medical
treatment.




                                     The patient approves or rejects the
                                     request
KeyTalk protects your data in motion by providing secure access for
machine-to-machine communication and data transmissions between
devices, corporate networks and cloud applications. It prevents common
attacks such as man-in-the-middle.

Solution description
KeyTalk generates, distributes and installs short living client certificates
on the client device in a fully automated manner, leveraging your
existing authentication methodology. Optionally it uses the device
hardware characteristics to strengthen the authentication process.
   Secures corporate data in-motion over the internet
   Using short living certificate technology
   Identification of user’s trusted devices
   No change in user experience, no administration




        KeyTalk secures your data-in-
PortalTalk Controls and Secures access to the cloud from any device,
anywhere and anytime.

Solution description
Elephant Security helps enterprises and institutions with the rapid
adoption of cloud applications while reducing IT costs and ensuring
compliance.

Elephant Security gives complete control to IT and Compliance
Management over user access to sensitive corporate cloud data and it
gives end-users convenient and secure access to a wide range of cloud
applications.
Corporate Client Admin




                                                                                      Corporate Network




                        Enterprise Admin
                             Portal




       Enterprise                                                  Enterprise Cloud
      Cloud Portal                                                   Connectivity


                     Readiness Services




PortalTalk provides & secures cloud
Maarten Stultjens (Elephant Security) @ PIDS seminar

More Related Content

What's hot

Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
SLA-Ready Network
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
Vijayananda Mohire
 
IoT platforms – comparison Azure IoT vs AWS IoT
IoT platforms – comparison Azure IoT vs AWS IoTIoT platforms – comparison Azure IoT vs AWS IoT
IoT platforms – comparison Azure IoT vs AWS IoT
(Saravana) Pandiyan Varadaraj (He/Him)
 
Mobility Trends Impacting Healthcare
Mobility Trends Impacting HealthcareMobility Trends Impacting Healthcare
Mobility Trends Impacting Healthcare
Extreme Networks
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
Jerry Fahrni
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
IJNSA Journal
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
Muhammad Ahad
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
Proofpoint
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
 
Medi cloud
Medi cloudMedi cloud
Medi cloud
Dr. Paolo Di Prodi
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
Andris Soroka
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
Andris Soroka
 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handout
Sarmad Ibrahim
 
Meet with Watson to be present at Communitech waterloo
Meet with Watson to be present at Communitech waterlooMeet with Watson to be present at Communitech waterloo
Meet with Watson to be present at Communitech waterloo
Sarmad Ibrahim
 
Managed Iot services in pune
Managed Iot services in puneManaged Iot services in pune
Managed Iot services in pune
Anshita Dixit
 
Blockchain
BlockchainBlockchain
Blockchain
Appterra, Inc.
 
Why EHR in the Cloud is a good Idea
Why EHR in the Cloud is a good IdeaWhy EHR in the Cloud is a good Idea
Why EHR in the Cloud is a good Idea
Pedro Locs
 
Cloud Computing in Healthcare IT
Cloud Computing in Healthcare ITCloud Computing in Healthcare IT
Cloud Computing in Healthcare IT
Mahindra Satyam
 

What's hot (20)

Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
IoT platforms – comparison Azure IoT vs AWS IoT
IoT platforms – comparison Azure IoT vs AWS IoTIoT platforms – comparison Azure IoT vs AWS IoT
IoT platforms – comparison Azure IoT vs AWS IoT
 
Mobility Trends Impacting Healthcare
Mobility Trends Impacting HealthcareMobility Trends Impacting Healthcare
Mobility Trends Impacting Healthcare
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Lock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part IILock Down Mobile and Cloud Data Leaks Part II
Lock Down Mobile and Cloud Data Leaks Part II
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Medi cloud
Medi cloudMedi cloud
Medi cloud
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handout
 
Meet with Watson to be present at Communitech waterloo
Meet with Watson to be present at Communitech waterlooMeet with Watson to be present at Communitech waterloo
Meet with Watson to be present at Communitech waterloo
 
Managed Iot services in pune
Managed Iot services in puneManaged Iot services in pune
Managed Iot services in pune
 
Blockchain
BlockchainBlockchain
Blockchain
 
Why EHR in the Cloud is a good Idea
Why EHR in the Cloud is a good IdeaWhy EHR in the Cloud is a good Idea
Why EHR in the Cloud is a good Idea
 
Cloud Computing in Healthcare IT
Cloud Computing in Healthcare ITCloud Computing in Healthcare IT
Cloud Computing in Healthcare IT
 

Similar to Maarten Stultjens (Elephant Security) @ PIDS seminar

Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
RapidValue
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
Erik Ginalick
 
IoT Platform Meetup - Oracle
IoT Platform Meetup - OracleIoT Platform Meetup - Oracle
IoT Platform Meetup - Oracle
Filip Kolář
 
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
Manuela Moroncini
 
Forecast deploy2 100_eb
Forecast deploy2 100_ebForecast deploy2 100_eb
Forecast deploy2 100_eb
Open Data Center Alliance
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvis
dickcraigson
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
CloudWALL Italia
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
Redington Value Distribution
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
Mark Skilton
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
IoT_Frameworks_.pdf
IoT_Frameworks_.pdfIoT_Frameworks_.pdf
IoT_Frameworks_.pdf
Pyingkodi Maran
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
ScottBreadmore
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
Amazon Web Services
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
Roberto Siagri
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
ECI – THE ELASTIC NETWORK™
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
sampleid978
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
IBM Sverige
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
Igor Zboran
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 

Similar to Maarten Stultjens (Elephant Security) @ PIDS seminar (20)

Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
 
IoT Platform Meetup - Oracle
IoT Platform Meetup - OracleIoT Platform Meetup - Oracle
IoT Platform Meetup - Oracle
 
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
 
Forecast deploy2 100_eb
Forecast deploy2 100_ebForecast deploy2 100_eb
Forecast deploy2 100_eb
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvis
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
IoT_Frameworks_.pdf
IoT_Frameworks_.pdfIoT_Frameworks_.pdf
IoT_Frameworks_.pdf
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 

More from AlmereDataCapital

Karel Thönissen (Garabit) @ PIDS seminar
Karel Thönissen (Garabit) @ PIDS seminarKarel Thönissen (Garabit) @ PIDS seminar
Karel Thönissen (Garabit) @ PIDS seminar
AlmereDataCapital
 
Steven van der Linden (Qforce) @ PIDS seminar
Steven van der Linden (Qforce) @ PIDS seminarSteven van der Linden (Qforce) @ PIDS seminar
Steven van der Linden (Qforce) @ PIDS seminar
AlmereDataCapital
 
Sampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarSampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminar
AlmereDataCapital
 
Jaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminar
Jaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminarJaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminar
Jaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminar
AlmereDataCapital
 
Peter Kits (Holland Van Gijzen) @ PIDS seminar
Peter Kits (Holland Van Gijzen) @ PIDS seminarPeter Kits (Holland Van Gijzen) @ PIDS seminar
Peter Kits (Holland Van Gijzen) @ PIDS seminar
AlmereDataCapital
 
Prof. mr. Sijmons (Universiteit Utrecht) @ PIDS seminar
Prof. mr. Sijmons (Universiteit Utrecht) @ PIDS seminarProf. mr. Sijmons (Universiteit Utrecht) @ PIDS seminar
Prof. mr. Sijmons (Universiteit Utrecht) @ PIDS seminar
AlmereDataCapital
 
Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'
Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'
Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'
AlmereDataCapital
 
Dr. Piet Daas (CBS) - Statistiek en grote data bestanden
Dr. Piet Daas (CBS) - Statistiek en grote data bestandenDr. Piet Daas (CBS) - Statistiek en grote data bestanden
Dr. Piet Daas (CBS) - Statistiek en grote data bestanden
AlmereDataCapital
 
Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...
Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...
Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...
AlmereDataCapital
 
Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...
Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...
Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...
AlmereDataCapital
 
Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...
Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...
Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...
AlmereDataCapital
 
Carlijn Nouwen (McKinsey) - Keynote: Big Data in de Zorg
Carlijn Nouwen (McKinsey) - Keynote: Big Data in de ZorgCarlijn Nouwen (McKinsey) - Keynote: Big Data in de Zorg
Carlijn Nouwen (McKinsey) - Keynote: Big Data in de Zorg
AlmereDataCapital
 
Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...
Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...
Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...
AlmereDataCapital
 
Nicky Hekster (IBM) - Watson for Health
Nicky Hekster (IBM) - Watson for HealthNicky Hekster (IBM) - Watson for Health
Nicky Hekster (IBM) - Watson for Health
AlmereDataCapital
 
Freek Bomhof (TNO) - Big Data en kansen in de zorg
Freek Bomhof (TNO) - Big Data en kansen in de zorgFreek Bomhof (TNO) - Big Data en kansen in de zorg
Freek Bomhof (TNO) - Big Data en kansen in de zorg
AlmereDataCapital
 
Harro Stokman (Euvision) - Big Brother Watches Big Data
Harro Stokman (Euvision) - Big Brother Watches Big DataHarro Stokman (Euvision) - Big Brother Watches Big Data
Harro Stokman (Euvision) - Big Brother Watches Big Data
AlmereDataCapital
 
Arjan Hassing (Ernst & Young) - Kosten besparen op big data storage
Arjan Hassing (Ernst & Young) - Kosten besparen op big data storageArjan Hassing (Ernst & Young) - Kosten besparen op big data storage
Arjan Hassing (Ernst & Young) - Kosten besparen op big data storage
AlmereDataCapital
 
Lex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdata
Lex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdataLex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdata
Lex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdata
AlmereDataCapital
 
Prof. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe data
Prof. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe dataProf. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe data
Prof. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe data
AlmereDataCapital
 
Peter Walgemoed (Carelliance) - Businessmodels for Big Data
Peter Walgemoed (Carelliance) - Businessmodels for Big DataPeter Walgemoed (Carelliance) - Businessmodels for Big Data
Peter Walgemoed (Carelliance) - Businessmodels for Big Data
AlmereDataCapital
 

More from AlmereDataCapital (20)

Karel Thönissen (Garabit) @ PIDS seminar
Karel Thönissen (Garabit) @ PIDS seminarKarel Thönissen (Garabit) @ PIDS seminar
Karel Thönissen (Garabit) @ PIDS seminar
 
Steven van der Linden (Qforce) @ PIDS seminar
Steven van der Linden (Qforce) @ PIDS seminarSteven van der Linden (Qforce) @ PIDS seminar
Steven van der Linden (Qforce) @ PIDS seminar
 
Sampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarSampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminar
 
Jaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminar
Jaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminarJaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminar
Jaap-Henk Hoepman (Privacy & Identity Lab) @ PIDS seminar
 
Peter Kits (Holland Van Gijzen) @ PIDS seminar
Peter Kits (Holland Van Gijzen) @ PIDS seminarPeter Kits (Holland Van Gijzen) @ PIDS seminar
Peter Kits (Holland Van Gijzen) @ PIDS seminar
 
Prof. mr. Sijmons (Universiteit Utrecht) @ PIDS seminar
Prof. mr. Sijmons (Universiteit Utrecht) @ PIDS seminarProf. mr. Sijmons (Universiteit Utrecht) @ PIDS seminar
Prof. mr. Sijmons (Universiteit Utrecht) @ PIDS seminar
 
Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'
Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'
Roland Haeve (Atos): 'Using the Cloud for Big Data Analytics'
 
Dr. Piet Daas (CBS) - Statistiek en grote data bestanden
Dr. Piet Daas (CBS) - Statistiek en grote data bestandenDr. Piet Daas (CBS) - Statistiek en grote data bestanden
Dr. Piet Daas (CBS) - Statistiek en grote data bestanden
 
Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...
Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...
Maurice Bouwhuis (SARA/Vancis) - Hoe big data te begrijpen door ze te visuali...
 
Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...
Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...
Gerard Jansen (CEO Alan Turing Institute) - Alan Turing Institute: brengt dat...
 
Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...
Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...
Bert Reijmerink (Genalice) - Hoe technologie bijdraagt aan een betere behande...
 
Carlijn Nouwen (McKinsey) - Keynote: Big Data in de Zorg
Carlijn Nouwen (McKinsey) - Keynote: Big Data in de ZorgCarlijn Nouwen (McKinsey) - Keynote: Big Data in de Zorg
Carlijn Nouwen (McKinsey) - Keynote: Big Data in de Zorg
 
Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...
Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...
Sjaak van der Pouw (Siemens Healthcare) - Beeldexplosie: de mogelijkheden van...
 
Nicky Hekster (IBM) - Watson for Health
Nicky Hekster (IBM) - Watson for HealthNicky Hekster (IBM) - Watson for Health
Nicky Hekster (IBM) - Watson for Health
 
Freek Bomhof (TNO) - Big Data en kansen in de zorg
Freek Bomhof (TNO) - Big Data en kansen in de zorgFreek Bomhof (TNO) - Big Data en kansen in de zorg
Freek Bomhof (TNO) - Big Data en kansen in de zorg
 
Harro Stokman (Euvision) - Big Brother Watches Big Data
Harro Stokman (Euvision) - Big Brother Watches Big DataHarro Stokman (Euvision) - Big Brother Watches Big Data
Harro Stokman (Euvision) - Big Brother Watches Big Data
 
Arjan Hassing (Ernst & Young) - Kosten besparen op big data storage
Arjan Hassing (Ernst & Young) - Kosten besparen op big data storageArjan Hassing (Ernst & Young) - Kosten besparen op big data storage
Arjan Hassing (Ernst & Young) - Kosten besparen op big data storage
 
Lex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdata
Lex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdataLex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdata
Lex Pater (Flevoziekenhuis) - Slim omgaan met ziekenhuisdata
 
Prof. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe data
Prof. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe dataProf. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe data
Prof. Ard den Heeten (LRCB) - Brondata: kennis uit ruwe data
 
Peter Walgemoed (Carelliance) - Businessmodels for Big Data
Peter Walgemoed (Carelliance) - Businessmodels for Big DataPeter Walgemoed (Carelliance) - Businessmodels for Big Data
Peter Walgemoed (Carelliance) - Businessmodels for Big Data
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Maarten Stultjens (Elephant Security) @ PIDS seminar

  • 1.
  • 2.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10. General privacy laws and specific laws apply  All parties receiving data must be bound by professional secrecy (art. 458)  Limit access to relevant information (art. 458)  Explicit approval by patient required (art. 458)  ICT standards on the exchange of health data apply (law 21-08-’08)  Hospital file= medical file managed by Doctor + nursing file managed by Nurse (Law 07-08-’87)  Patients rights (Privacy guaranteed), health professional obligations (management of access rights)  Patient Consent is required within medical team, within organization, across organizations  ISO27001 (Other standards: HIPAA)  HL7 – std for exchange of health data Sanctions: EUR 500-550K, imprisonment, health professional reputation Applicable legislation (BE)
  • 11. IPad toegang tot HIS (vb. Epic)  Onderzoeksdata (bv. Borstkanker: behandelen, genereren & combineren (big-)data, analyseren)  Regionale samenwerking van ziekenhuizen (bv. AMC, Flevo)  EPR (bv. Tandheelkunde: beeldmateriaal delen)  Diagnostische centra (vb. Diagnostiek4U)  Zorg op afstand (MAD Europe)  Zelfstandige behandelcentra (vb. Obesitas, Diaboss)  Artsen die voor meerdere ziekenhuizen werken Dutch Cases
  • 12. Health Professional requests a new role . For example EPR for a medical treatment. The patient approves or rejects the request
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. KeyTalk protects your data in motion by providing secure access for machine-to-machine communication and data transmissions between devices, corporate networks and cloud applications. It prevents common attacks such as man-in-the-middle. Solution description KeyTalk generates, distributes and installs short living client certificates on the client device in a fully automated manner, leveraging your existing authentication methodology. Optionally it uses the device hardware characteristics to strengthen the authentication process.
  • 21. Secures corporate data in-motion over the internet  Using short living certificate technology  Identification of user’s trusted devices  No change in user experience, no administration KeyTalk secures your data-in-
  • 22. PortalTalk Controls and Secures access to the cloud from any device, anywhere and anytime. Solution description Elephant Security helps enterprises and institutions with the rapid adoption of cloud applications while reducing IT costs and ensuring compliance. Elephant Security gives complete control to IT and Compliance Management over user access to sensitive corporate cloud data and it gives end-users convenient and secure access to a wide range of cloud applications.
  • 23. Corporate Client Admin Corporate Network Enterprise Admin Portal Enterprise Enterprise Cloud Cloud Portal Connectivity Readiness Services PortalTalk provides & secures cloud

Editor's Notes

  1. 09/26/12 14:23 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  2. 09/26/12 14:23 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  3. Vereniging van Zorgaanbieders voor Zorgcommunicatie (VZVZ) De Vereniging van Zorgaanbieders voor Zorgcommunicatie (VZVZ) zet in op beheer en verbetering van de zorginfrastructuur. De VZVZ treedt op als verantwoordelijke voor de gegevensverwerking en is opdrachtgever van het Servicecentrum Zorgcommunicatie (SCZ) dat de infrastructuur beheert.
  4. 1919 – 1930 > bauhaus school