COVID’s Impact on Medical Device Security
Coffee with CISOs Episode 11
Our guest speaker Stephanie Domas, Director of Cybersecurity Strategy & Communications at Intel, joined us to discuss the impact COVID has had on medical device security.
Bring your favorite drink (doesn’t have to be coffee) and take a quick break to learn more about:
- The aftereffects of the COVID-19 pandemic in terms of medical device security
- How cybersecurity resilience can be encouraged in your security team
- The most prevalent threat actors and how to optimize your security position
One of the side effects you saw in COVID was the sort of desperate need for more medical devices in a few key areas and so you saw the dust getting wiped off of some really really old legacy devices coming out of closets, coming from old academic research institutes, and so there’s this kind of this bell curve where if they were old enough they had really no connectivity associated with them which inherently actually kind of gave them some cyber resilience…
About the Webinar
The COVID-19 pandemic has put an emphasis on medical device security in terms of regulations and a growing number of cyberattacks on the healthcare industry. Rapid deployment, as well as working remotely, have furthered this gap. For example, the traditional update validation process was modified for remote circumstances. With this, the changes in patch testing and healthcare facility infrastructure impacts your medical device security. We sat down with Stephanie Domas, Director of Cybersecurity Strategy & Communications at Intel, to discuss how to secure medical devices especially in a COVID-19 world. We discuss risk management, legacy systems, and healthcare guidelines/protocols to help you maximize security efficiency. To learn more about legacy systems in the healthcare industry, check out our blog post.
MEET THE SPEAKERS
Stephanie Domas, Director of Cybersecurity Strategy and Communications at Intel. Stephanie is a cybersecurity leader and ethical hacker, specializing in medical device security. She has spent more than 13 years performing reverse engineering, vulnerability discovery, and cyber forensics for medical device development.
Want to see rThreat in action?
See how the next generation of breach and attack emulation can help protect your company from cyber threats.