Header image for Vitalis 2024

Sessions

Discover the complete Vitalis program here. Utilize the search box to locate a specific lecture, speaker, or topic. Additionally, you can use the filters below to organize by criteria such as date, language, target audience, or track. Sorting by Schedule allows you to view an overview of lectures by lecture hall.

For those interested in exploring the program via thematic tracks that maintain a consistent theme, you can organize by track using the Filters option or by clicking on the Tracks page in the menu.

View session in English

Track: Cyber ​​security

While information security focuses on protecting data regardless of its form, and cyber security concentrates on safeguarding digital systems, the EU's NIS directives, including the expanded NIS 2, underscore the escalating importance of both in ensuring a high level of security across the European network and information systems amidst global changes.

Filters

Location

Main track

Track

Language

Topic

Seminar type

Objective of lecture

Level of knowledge

Target audience

Keyword

Conference

Track Cyber ​​security
Profile image for Zero Loss Storage - why software protection isn't enough?

Zero Loss Storage - why software protection isn't enough?

Ulrich Helm
Wednesday May 15, 2024 10:30 - 11:00 A2
Cyber ​​security, English, Pre-recorded + On-site, Presentation, Tools for implementation, Intermediate, Management/decision makers, Technicians/IT/Developers, Actual examples (good/bad), Benefits/effects, Information security

Profile image for Vem behöver vara cybersäker?

Vem behöver vara cybersäker?

Daniel Eidenskog
Tuesday May 14, 2024 16:00 - 16:30 F5
Cyber ​​security, Swedish, Live broadcast, Presentation, Orientation, Introductory, Management/decision makers, Politicians, Organizational development, Purchasers/acquisitions/eco nomy/HR, Technicians/IT/Developers, Care professionals, Healthcare professionals, Information security

Profile image for Varför är det så svårt att skapa säkra IT-system?

Varför är det så svårt att skapa säkra IT-system?

Daniel Eidenskog
Wednesday May 15, 2024 08:30 - 09:00 A2
Cyber ​​security, Swedish, Pre-recorded + On-site, Presentation, Orientation, Introductory, Management/decision makers, Politicians, Organizational development, Purchasers/acquisitions/eco nomy/HR, Technicians/IT/Developers, Information security

Profile image for Utmaningar i arbetet med informationssäkerhet

Utmaningar i arbetet med informationssäkerhet

Hans Kalldal, Niklas Lindberg
Tuesday May 14, 2024 16:30 - 17:00 F5
Cyber ​​security, Swedish, Live broadcast, Presentation, Tools for implementation, Introductory, Management/decision makers, Politicians, Organizational development, Technicians/IT/Developers, Actual examples (good/bad), Law, Judicial procedures, Information security

Profile image for The impact of NIS2 on Swedish healthcare software services

The impact of NIS2 on Swedish healthcare software services

Lars Larsson
Wednesday May 15, 2024 11:30 - 12:00 A2
Cyber ​​security, English, Pre-recorded + On-site, Presentation, Orientation, Introductory, Management/decision makers, Politicians, Organizational development, Technicians/IT/Developers, Benefits/effects, Patient safety, Information security

Profile image for Security Operations Centers roll i att säkra välfärden

Security Operations Centers roll i att säkra välfärden

Fredrik Rosenberg, Stefan Schörling
Tuesday May 14, 2024 15:30 - 16:00 F5
Cyber ​​security, Swedish, Live broadcast, Presentation, Inspiration, Introductory, Management/decision makers, Actual examples (good/bad), Management, Municipality, Information security

Profile image for Safeguarding patient safety and medical device security

Safeguarding patient safety and medical device security

Arno van der Heijden
Wednesday May 15, 2024 11:00 - 11:30 A2
Cyber ​​security, English, Pre-recorded + On-site, Presentation, Tools for implementation, Introductory, Management/decision makers, Politicians, Organizational development, Purchasers/acquisitions/eco nomy/HR, Technicians/IT/Developers, Researchers, Students, Care professionals, Healthcare professionals, Patient/user organizations, Actual examples (good/bad), Management, Innovation/research, Law, Judicial procedures, Patient safety, Information security, Usability

Profile image for På IMY:s radar

På IMY:s radar

Linn Sandmark, Magnus Bergström
Tuesday May 14, 2024 10:30 - 11:30 F3
Cyber ​​security, Swedish, Live broadcast, Presentation, Orientation, Intermediate, Management/decision makers, Politicians, Organizational development, Purchasers/acquisitions/eco nomy/HR, Technicians/IT/Developers, Researchers, Students, Care professionals, Healthcare professionals, Patient/user organizations, Education (verification), Management, Municipality, Innovation/research, Documentation, Law, Judicial procedures, Patient safety, Information security, Government information

Profile image for När It attacken slår till.

När It attacken slår till.

Anna-Lena Andersson
Tuesday May 14, 2024 13:00 - 13:45 F5
Cyber ​​security, Swedish, Live broadcast, Presentation, Inspiration, Introductory, Management/decision makers, Politicians, Organizational development, Researchers, Students, Care professionals, Healthcare professionals, Patient/user organizations, Actual examples (good/bad), Benefits/effects, Management, Municipality, Patient safety, Information security, Government information, Usability

Profile image for Hur kan sekundärdata tillgängliggöras för att öka patientnytta och driva innovation?

Hur kan sekundärdata tillgängliggöras för att öka patientnytta och driva innovation?

Anders Tunold-Hanssen, Helena Nilsson, Magnus Åslund, Markus Lingman, Petra Hasselqvist
Tuesday May 14, 2024 11:30 - 12:00 F3
Cyber ​​security, Swedish, Live broadcast, Panel, Orientation, Intermediate, Management/decision makers, Politicians, Organizational development, Healthcare professionals, Patient centration, Management, Follow-up/Report of current status, Law, Judicial procedures

Profile image for Förbered er för det oförutsägbara

Förbered er för det oförutsägbara

Anna Stålbrand Sundh, Carl-Johan Ekelund, Niklas Hörling, Roberto Söderhäll
Tuesday May 14, 2024 13:45 - 14:15 F5
Cyber ​​security, Swedish, Live broadcast, Presentation, Management/decision makers, Organizational development, Care professionals, Actual examples (good/bad), Municipality

Profile image for Cybersäkerhet i praktiken

Cybersäkerhet i praktiken

Johan Callmyr, Rickard Åberg
Wednesday May 15, 2024 09:30 - 10:00 A2
Cyber ​​security, Swedish, Pre-recorded + On-site, Presentation, Orientation, Intermediate, Management/decision makers, Organizational development, Purchasers/acquisitions/eco nomy/HR, Technicians/IT/Developers, Actual examples (good/bad), Benefits/effects, Management, Documentation, Patient safety, Information security

Profile image for Cybersäkerhet, dags att ta detta på allvar!

Cybersäkerhet, dags att ta detta på allvar!

Micael Johansson, Rickard Åberg, Robert Tönhardt
Wednesday May 15, 2024 09:00 - 09:30 A2
Cyber ​​security, Swedish, Pre-recorded + On-site, Presentation, Orientation, Intermediate, Management/decision makers, Organizational development, Technicians/IT/Developers, Actual examples (good/bad), Benefits/effects, Welfare development, Innovation/research, Documentation, Patient safety, Information security

Profile image for Cybersecurity och dess oväntade fotavtryck i din verksamhet

Cybersecurity och dess oväntade fotavtryck i din verksamhet

Steve Murphy, Charlotta Smålander
Tuesday May 14, 2024 14:15 - 15:00 F5
Cyber ​​security, Swedish, Live broadcast, Presentation, Orientation, Intermediate, Management/decision makers, Politicians, Organizational development, Purchasers/acquisitions/eco nomy/HR, Technicians/IT/Developers, Actual examples (good/bad), Benefits/effects, Management, Follow-up/Report of current status, Test/validation, Documentation, Law, Judicial procedures, Information security