How to Build a Medical Device Security Program
Want to build a medical device security program from the ground up? Don’t know where to start? Walk away from this on-demand presentation with a plan to kick off a medical device security program.
Medical devices are a weak link susceptible to cyberattack, and the stakes are high—patient lives. Historically medical devices were stand-alone and only interacted with the patient. Today, medical devices are storing and transmitting patient data. Medical devices contain configurable embedded computer systems. Medical devices are connected to the network, potentially accessible by anyone on the network, and subject to a cyberattack. Many are legacy devices with no control options. Current medical device inventory lacks basic IT information.
- Define the steps to build an effective medical device security program
- Apply a process to create an IT-based medical device inventory
- Describe the process of assigning risk to medical devices
About the host
Fortified Health Security
Virtual Information Security Officer (VISO)
Tamra Durfee is a Virtual Information Security Officer (VISO) with Fortified Health Security. She has over 25 years of experience in information security, compliance, regulatory risk, strategy, innovation, and technology transformation. For the past 8 years, she has specialized in healthcare cybersecurity and building risk-based medical device information security programs. She’s a presenter at HIMSS, CHIME, CHA, and a healthcare security contributor to Healthcare IT News. Tamra holds certifications as a Certified Healthcare CIO (CHCIO), Certified Digital Healthcare Executive (CDH-E), GIAC Security Leadership Certification, Certified Professional in Healthcare Information Management Systems (CPHIMS), and IBM Certified Solutions Architect.