Are Your Patients at Risk? Protecting Medical Devices with IoT Security

Logo
Presented by

Itzik Feiglevitch (Check Point), Craig Hyps (Ordr)

About this talk

Given the productivity benefits, IoT device usage in healthcare has risen to 87% and continues to expand. IoT devices in medical include everything from MRI and X-ray machines to infusion pumps and cameras. The IoT security risk also continues to rise with 82% of healthcare organizations reporting a security incident. Healthcare organizations also face the highest security breach costs averaging $6.45M per incident, or 65% higher than the industry average. How are you enabling your IoT devices while ensuring they are secure? Join Check Point and Ordr in this webinar to understand more about medical devices and their cybersecurity risks, as well as learn best practices to mitigate risks to ensure your patients are safe. This webinar will include: • A discussion of vulnerabilities and risks in connected medical and IoT devices • Security considerations to strengthen defenses in key phases of the medical device lifecycle • How to bring networking, security, and HTM teams together for an effective medical device security program • How Ordr and Check Point work together to identify malicious intent, profile risks and behavior, and secure medical devices at scale
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (348)
Subscribers (53239)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.