×

Learn How to Assess Medical Device & IoT Security

First Name
Last Name
Company
State
Join Our Mailing List
Country
I have read and agree to the terms of the privacy policy (linked below).
Thank you!
Error - something went wrong!

Endpoint Device Security: Addressing the Hidden and Neglected Endpoints

August 29, 2018
The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed bed – many of those are networked. All of those devices present a risk that must be managed, just like traditional workstations and servers. By 2020 it is expected there will be 200 billion+ devices connected to networks, so proper ongoing device management is business-critical. The term ‘device’ encompasses many things, medical devices, smartphones, tablets, monitors, CCTV’s; but also printers, copiers, and fax machines. Regardless of device type, providers are challenged with implementing a management strategy to inventory and secure each one of them. Medical device and IoT security strategy should begin with a thorough understanding of all endpoint devices, including what purpose they serve, what kinds of information they possess, and the potential security risks they pose. In this webinar, security experts John Nye and David Finn will ask four simple questions that will help you assess the effectiveness of your medical device and IoT security and compliance program.
Previous Video
Medical Devices: The Risks Go Beyond Security
Medical Devices: The Risks Go Beyond Security

Watch our latest webinar on medical device security hosted by David Finn, EVP of Strategic Innovation at Cy...

Next Video
Investigating and Assessing Incidents Reported by a Vendor
Investigating and Assessing Incidents Reported by a Vendor

What would you do if one of your third-party vendors compromised your patients’ health information? Not you...