In this 7 webinar series learn about Medical Device Security. Each webinar episode is 90 mins long and includes time with industry-leading experts. Join us for the entire webinar series or choose the episodes that fit your needs!
Episode 1 (1.5 hours) – Medical Device Cybersecurity – Thought Leaders
July 6th 11:30 – 1:00 pm eastern
Kicking off our Medical Device Cybersecurity webinar series are the Thought Leaders. An expert panel representing Government Agencies, Physicians, MDM’s, HDO’s and Hackers will discuss today’s challenges, initiatives and possible solutions to the unbelievably complex problem of securing medical devices and protecting patient safety. This discussion is perfect for executives and cyber practitioners who want to better understand the complexities of medical devices and how to mitigate risk at an enterprise level. It will also feature topics covered in more detail during the rest of the webinar series.
Episode 2 (1.5 hour) – Aligning Healthcare Cybersecurity for Connected Medical Devices
July 23rd 1:00 – 2:30 pm eastern
Two publications released by health industry public-private partnerships have impacted Medical Device Security more than any others. A new law to, Recognize Cybersecurity Best Practices, was passed into law in 2021 based on one of them. By adhering to the best practices detailed in the 405(d) Publication Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients, Healthcare Delivery Organizations (HDO) can potentially avoid fines, audits and post breach oversight from the Office for Civil Rights (OCR). The second document is the Medical Device and Health IT Joint Security Plan is a cross-sector strategy for securing medical devices. Julie Chua, Erik Decker and Rob Suarez will discuss the publications and how they can be leveraged to improve cybersecurity postures, to increase patient safety and to reduce the risk of data loss.
Episode 3 (1.5 hour) – Public Private Partnerships to Secure Medical Devices
Aug 5th 2:30 – 4:00 eastern
Public-Private Partnerships have created task forces of health care industry stakeholders, cybersecurity experts, and any Federal agency as a response to the cybersecurity threats and laws that require compliance. This presentation features the leaders from three important task groups that will assist attendees in understanding: Software Bill of Materials (SBoM), Securing Legacy Medical Devices and Contract Language Standards for Medical Devices.
- SBoM – a recent Presidential Executive Order called for the creation of an electronic SBoM
- Legacy – learn the best practices for securing legacy and unsupported medical devices
- Contracts – a framework of medical device security language designed to reduce the risk HDO’s
Episode 4 (1.5 hour) – Medical Device Discovery and Monitoring Tools
Aug 17th 11:30 – 1:00 pm eastern
HDOs have recently turned to sophisticated security software architects in hopes of tackling this Wicked Problem of securing connected medical devices. Their solutions automatically discover the entire inventory of medical devices, monitors network traffic for details, analyzes the device details that have been integrated with known and active vulnerabilities, determines anomalous device behavior and seamlessly provides policies to network enforcement tools to intelligently secure devices. All of this is done simultaneously. All of this previously unavailable and unrelated information is correlated in real time, prioritizing device risk and escalating alerts. Jeff and Ben will explain how the technology works and can be applied to solve many of the problems associated with securing connected medical devices and operational technology.
Episode 5 (1.5 hours) – Operationalizing, Standardizing and Contextualizing.
Aug 31st 11:00 – 12:30 pm eastern
Despite the increased awareness and assessment of operational technology (OT) security events and vulnerabilities using medical device discovery and security monitoring tools, HDO’s struggle to operationalize the tool data into traditional IT security defenses. Effective OT security solutions must create one accurate inventory of OT assets, to include medical devices, and the important details about them, integrated with discovery and security monitoring tools.
When an OT security event occurs, the detailed context about the affected devices is required. Contextsupport the response and remediation steps that should consider the current operation of the device. The context includes elements such as maintenance history, current usage details, device owner, device location and the latest software, firmware versions, etc.
In addition, these solutions should provide orchestration, automation, and remediation response-based workflow. Today we will discuss these solutions, integration, the workflows and how they ensure the safety and availability of OT, including medical devices and healthcare facilities systems.
Episode 6 (1.5 hours) – Mayo Clinic – Next Gen Tools for Medical Device Cybersecurity
Sept 15th 11:30 – 1:00 pm eastern
Over the last several years, Mayo has worked to align the health industry’s cybersecurity efforts to include medical device security providing actionable examples how Mayo Clinic’s program evaluated and operationalized medical device security technology. The audience will learn the limitations of traditional cybersecurity solutions, why there is a need for a more targeted technology and the best practices Mayo found for implementing a medical device security solution. Areas Mayo found most successful include defining mission, goals & objectives, determining needs, aligning to frameworks and Mayo’s existing security solutions which will be shared. The presentation attendees will leave with clear understanding of the complex ecosystem and the Best Practices Mayo has implemented to secure their medical and OT devices.
Episode 7 (1.5 hour) – A Business Case for Next Gen Medical Device Solutions
Sept 27th 11:30 – 1:00 pm eastern
New medical device and OT security technology is built on the powerful capabilities of artificial intelligence (AI) and machine learning (ML). They are delivering the ability to secure what is, according to HHS, one of the most significant risk to patients and hospitals, the Internet of Medical Things (IoMT). Due to limited budgets, these specialized solutions are dismissed, and traditional network security tools, designed for laptops, desktops and servers, are acquired instead. But perimeter security alone is failing over and over.
What compliance, infosec and information technology specialists do not understand is how these tools also benefit operational cost savings and asset management improvement for the hospital’s most expensive equipment. By deploying medical device security solutions to reduce cybersecurity risk levels, improve compliance and increase patient safety, a hospital can increase revenue, decrease costs and improve patient satisfaction as a result of new utilization management functionality. This session will equip attendees with the information they need to construct a compelling business case and ROI for the technologies required to secure connected medical and OT devices.