Conference Sessions See. Know. Secure. Simplifying Medical Device Cybersecurity
Objectives
Challenges securing connected devices
Responsibilities and collaboration between HTM, IT and cybersecurity teams
Security and operational use cases including asset inventory, risk identification, and device utilization
Practical approaches to zero trust segmentation for security and cost avoidance
Session Abstract
In this session, join expert Srinivas Loke Head of Product Management of Ordr as he explores simplifying the overwhelming task of keeping connected medical devices protected. Securing connected medical devices can be a daunting task. We will break down the process into three steps and outline techniques and tools that can be used to identify high-risk devices, understand how they are being used, and implement measures to protect them without interfering with patient care. There is no one-size-fits-all solution, but there are tools and best practices that can make a seemingly impossible task manageable regardless of the organization’s size.