Medical Device Cybersecurity Quality Assurance - Webinar CD/Transcript
Medical Device Cybersecurity Quality Assurance: Requirements, Best Practices and Innovative Approaches
Network connectivity opens up a wealth of possibilities for medical devices, but it also exposes a minefield of potential liabilities. Devices transmit data on the user’s condition to healthcare professionals, but can you be sure the information doesn’t fall into unauthorized hands? Even more vitally, if a device can send data out, malware or hackers could possibly get in. How can you guarantee an attacker won’t be able to affect its functionality?
Do you know the difference between “black hat” and “white hat” hackers? Do you understand how a hacker views a target, what motivates them and what makes a device a target? How can common malware — not necessarily intended specifically for devices — find its way into devices and connected systems?
Explore what you, as a medical device manufacturer, should be doing with your quality assurance strategies to protect your devices. Plus, take a deeper dive into how other industries are dealing with this issue through responsible disclosure policies. What does “responsible disclosure” mean to your relationship with regulators?
Take a look at bug bounty programs and how they might work for a medical device development organization. Would you be willing to have security researchers poke and prod within your products and code to identify weak spots? How would the FDA view these types of quality assurance measures?
Consider what security requirements hospitals use when they procure devices. How do they ensure their own systems stay up and running? Finally, consider how your company should view the information it receives. Should this be an extension of your formal complaint system?
Learn both sides of the facts, from two of the field’s top experts – one in systems engineering and design, the other in hacking and reverse engineering – before you risk having your company’s devices compromised.
In 90 Minutes You’ll Learn:
- Why and how hackers find vulnerabilities and target medical devices
- Real-life scenarios of cybersecurity breaches and their consequences (even an attack not aimed at your device could interfere with it!)
- The path to incorporate cybersecurity into your quality assurance and safety risk analysis (do you know why cloud connectivity might not be a good idea?)
- The elements of an effective, cross-functional cybersecurity team (what color are their hats, and why does it matter?)
- The best practices used to address cybersecurity in other industries, and practical ways medical device manufacturers may apply these (could a bug bounty program work for you?)
- Information about FDA’s pre-market cybersecurity guidance released in October 2014
- Policies and procedures companies may consider to prepare for FDA’s upcoming release of post-market surveillance expectations