Learn How to Assess Medical Device & IoT Security

First Name
Last Name
Join Our Mailing List
I have read and agree to the terms of the privacy policy (linked below).
Thank you!
Error - something went wrong!

Endpoint Device Security: Addressing the Hidden and Neglected Endpoints

August 29, 2018

The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed bed – many of those are networked. All of those devices present a risk that must be managed, just like traditional workstations and servers. By 2020 it is expected there will be 200 billion+ devices connected to networks, so proper ongoing device management is business-critical. The term ‘device’ encompasses many things, medical devices, smartphones, tablets, monitors, CCTV’s; but also printers, copiers, and fax machines. Regardless of device type, providers are challenged with implementing a management strategy to inventory and secure each one of them. Medical device and IoT security strategy should begin with a thorough understanding of all endpoint devices, including what purpose they serve, what kinds of information they possess, and the potential security risks they pose. In this webinar, security experts John Nye and David Finn will ask four simple questions that will help you assess the effectiveness of your medical device and IoT security and compliance program.

Previous Video
Medical Devices: The Risks Go Beyond Security
Medical Devices: The Risks Go Beyond Security

Watch our latest webinar on medical device security hosted by David Finn, EVP of Strategic Innovation at Cy...

Next Video
Investigating and Assessing Incidents Reported by a Vendor
Investigating and Assessing Incidents Reported by a Vendor

In this webinar, David Holtzman describes the actions to take if your business associate compromises your p...

Limited Time Offer - 60% off Continuous Pentesting

Learn More