Are Your Patients at Risk? Protecting Medical Devices with IoT Security

Presented by

Itzik Feiglevitch (Check Point), Craig Hyps (Ordr)

About this talk

Given the productivity benefits, IoT device usage in healthcare has risen to 87% and continues to expand. IoT devices in medical include everything from MRI and X-ray machines to infusion pumps and cameras. The IoT security risk also continues to rise with 82% of healthcare organizations reporting a security incident. Healthcare organizations also face the highest security breach costs averaging $6.45M per incident, or 65% higher than the industry average. How are you enabling your IoT devices while ensuring they are secure? Join Check Point and Ordr in this webinar to understand more about medical devices and their cybersecurity risks, as well as learn best practices to mitigate risks to ensure your patients are safe. This webinar will include: • A discussion of vulnerabilities and risks in connected medical and IoT devices • Security considerations to strengthen defenses in key phases of the medical device lifecycle • How to bring networking, security, and HTM teams together for an effective medical device security program • How Ordr and Check Point work together to identify malicious intent, profile risks and behavior, and secure medical devices at scale

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (344)
Subscribers (51879)
Check Point Software Technologies Ltd. ( is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.