Tackling Cybersecurity of Connected Medical Devices

Geoffrey Parker | December 6, 2018

Join Healthcare Software Development and CyberSecurity experts Geoff Parker and Justin Gratto as they walk through a set of best practices in how to start addressing the security vulnerabilities associated with connected medical devices.

Connected medical devices are becoming the new industry standard and are migrating out of hospitals into less secure environments. At the same time, many of these devices still rely on legacy software at their core, potentially exposing them to an array of security threats. The challenge of securing these devices has now come to the forefront of many a CISO’s agenda.

Join Healthcare Software Development and CyberSecurity experts Geoff Parker and Justin Gratto as they walk through a set of best practices in how to start addressing the security vulnerabilities associated with connected medical devices.

You will walk away with:

  • How to design in security and privacy requirements around connected and legacy medical devices
  • How to manage and maintain the security of your network of connected devices over time
  • A pre-audit evaluation checklist to conduct a self-assessment

Access the Webinar

Suggested Stories

Health Information System Integration

In this webinar, we discuss interoperability in healthcare and answer attendee questions on Health Information System integration. Download the webinar Now.

Read More

Hacking for Health

Participating teams were tasked with developing solutions that demonstrated the use of sensors, data collection, and the interconnectedness of hardware and software.

Read More

Building your own IoT Product: Is your IT team ready?

Follow these three steps, and you've begun your IoT journey. Never forget that technology is just a portion of the overall experience that a customer and/or user will have with the IoT device you are creating.

Read More