Endpoint Security , Enterprise Mobility Management / BYOD , Incident & Breach Response

Medical Devices: Treat Them Like Untrusted End-User Tools

Highlights From an ISMG Healthcare Security Summit Panel
Medical Devices: Treat Them Like Untrusted End-User Tools
HealthcareInfoSecurity's Marianne Kolbasuk McGee, left, moderates a panel on medical device security.

The latest ISMG Security Report features a special report on securing medical devices.

In the Security Report (click on player beneath image to listen), you'll hear highlights from a panel - Medical Devices: Treat Them Like Untrusted End-User Devices - held at Information Security Media Group's recent Healthcare Security Conference in New York. HealthcareInfoSecurity Executive Editor Marianne Kolbasuk McGee provides analysis in this report on the panel she moderated. You'll hear from panelists:

  • Suzanne Schwartz, a physician who serves as associate director for science and strategic partnership at the Food and Drug Administration Center for Device and Radiological Health;
  • Steven Teppler, head of the electronic discovery and technology litigation practice at the Abbot Law Group;
  • Jennings Aske, chief information security officer at New York-Presbyterian Hospital; and
  • David Nathans, product security officer at medical device maker Siemens Healthcare.

The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our Dec. 1 and Dec. 5 editions, which respectively address flaws in Apple Computer's desktop operating system, High Sierra, and explore the Securities and Exchange Commission targeting a Canadian company for cheating investors by exploiting a so-called Initial Coin Offering crowdsourcing funding system.

The next ISMG Security Report will be posted on Tuesday, Dec. 12.

Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.