Ed TALKS Modernizing Medical Device Security: A New Perspective on Old Practices

Logo
Presented by

Ed Adams, Security Innovation | Joshua Corman, Claroty | Uma Chandrashekhar, Alcon | Chad Holmes, Cynerio

About this talk

On top of the usual threats inherent to IT networks, applications, and cloud services, the complexity of medical devices creates a massive and distributed attack surface. Compounding the challenge are long-life expectancy and third-party dependency. Attend this panel to hear healthcare security experts discuss the anatomy of medical devices, how to design them with human safety in mind, and how to make a shared security responsibility model a reality. Specific topics include: • The Prescription - security measures the FDA and others are demanding • The Skeleton - the rickety infrastructure healthcare runs on • The Brains - is SaMD (Software as a Medical Device) the new world norm? • The DNA - what Software Bill of Materials (SBOMs) tell us about risk • The Immune System - why traditional IT defenses struggle to protect patients • The X-Rays - the need for new surveillance techniques
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (71)
Subscribers (14821)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.