Warning message

You must login or register to view this form.


Approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best programming practices.

Objectives of the topic session

  • Understanding the needs to cover cyber-security aspects during information system lifecycle
  • Identification of the critical phases that are required of the information system lifecycle with regard to cyber-security
  • Understanding the key actors in HCO and information system suppliers and how it might be grouped, e.g. according to level of responsibility, role, health sector context, etc.
  • Information on previous knowledge/experience and any common/local policy or standards that will apply to the information system lifecycle