Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 6 / Booth Number 6-424

Security for Safety


Planning of data centers and IT infrastructures BSI IT baseline protection ISMS (ISO-IEC 2700x / BS 7799) Consulting IT security Awareness Physical IT-security Network security

Key Facts

  • ISO 27001
  • IT-Sicherheitsgesetz

Product Description

Security for patients, data and systems

When it comes to protecting hospitals, clinics and practice groups, we support our clients with a methodology based on the industry-specific security standard (B3S), which ensures the security of data, employees and patients in five phases.

The first phase comprises the inventory, which includes a modelling of the security-relevant components of the overall system and an audit of the security processes (ISO 27001 GAP analysis). In phase two, the structure of the information security management system (ISMS) is developed and initial procedures and processes are defined. We then use a detailed IT security risk analysis to identify the threats and security gaps in the system under review, both technically and in terms of infrastructure and processes. Based on this preliminary work, our experts formulate a catalogue of measures aimed at reducing risks and optimising the customer's Information Security Management System (ISMS). The final stage is the awareness phase, in which we train our clients' employees in all security-relevant aspects. In addition, we conduct internal audits for ISMS control.

... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.