How to Build a Medical Device Security Program
Time: 1:00 – 2:00 pm ET in Room W311E
Speaker – Tamra Durfee, Virtual Information Security Officer at Fortified Health Security (Booth #300-26)
Want to build a medical device security program from the ground up? Don’t know where to start? Walk away from this presentation with a plan to kick off a medical device security program. Medical devices are a weak link susceptible to cyberattack, and the stakes are high—patient lives. Historically medical devices were stand-alone and only interacted with the patient. Today, medical devices are storing and transmitting patient data. Medical devices contain configurable embedded computer systems. Medical devices are connected to the network, potentially accessible by anyone on the network and subject to cyberattack. Many are legacy devices with no control options. Current medical device inventory lacks basic IT information.
To read the full article visit, Health IT Answers.