Medical Devices Need Better Cyber Security

Rapid advances in computer science, engineering and electronics have led to a new generation of connected medical devices that permit access to real-time patient data and the opportunity to monitor and adjust treatment remotely. Cyber security for medical devices is critical in retaining the trust consumers place in health care companies for how the technology is used, and how health information is protected. 

While manufacturers can ensure a high level of safety through testing, the security of connected devices (IoT), from pacemakers to monitoring devices, remains a growing and moving target.

The University of Minnesota has established a new Center for Medical Device Cybersecurity (CMDC). The center will foster university-industry-government collaborations to ensure that medical devices are both safe and secure from the growing number of cyber security threats. The CMDC is founded and funded in large part by five US leading health industry companies. These include Boston Scientific, Smiths Medical, Optum, Medtronic, and Abbott Laboratories. Industry members are invited to take part in the CMDC Steering Committee and additional members will be actively recruited over the next two years.

In addition to the founding corporations, additional industry representatives will be actively recruited to the center steering committee over the next two years. "Cybersecurity for medical devices is critical in retaining the trust consumers place in healthcare companies for how the technology is used, and how health information is protected," said Allison Miller, chief information security officer for Optum, in a statement.  “By partnering with academic organisations, industry experts, and our peers we can help formulate policies, regulatory proposals and state-of-the-art testing so that we not only support the long-term success of secure medical devices, but also protect the patients who rely on medical devices for their care therapies,” 

As part of its inaugural year, the center is hosting roundtables and a hackathon, organising networking and training opportunities, establishing a medical device cybersecurity short course that TLI is launching this fall and developing a medical device cybersecurity summer internship program.

I_HLS:    University of Minnesota:     MinneInno:     GoHealthyGo:       Universtity of Minnesota:     

Image: Piqsels

You Might Also Read:

How To Prevent Healthcare Data Breaches:

 

« French Government Ministers Bugged
Cyber Crime Just Keeps On Growing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

Computex Technology Solutions

Computex Technology Solutions

Computex is an IT solutions provider delivering high-performance IT infrastructure solutions from assessment and design through to implementation, security and management.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Grupo CFI

Grupo CFI

Grupo CFI is the largest Spanish network of data protection and cybersecurity professionals.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Kameleon Security

Kameleon Security

Kameleon is a semiconductor startup developing advanced hardware cybersecurity platforms for computing systems.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.