Public Sector Talks #9: Implementing connected medical devices with cybersecurity in mind
The US Department of Health and Human Services (HHS) Office of Inspector General’s (OIG) Work Plan for 2016, released early in November 2015, summarizes the OIG’s efforts to boost the overall effectiveness of more than 100 HHS-administered programs. In addition to scrutinizing Centers for Medicare & Medicaid Services (CMS) reimbursements with an eye to detecting fraud and cutting costs, the OIG aims to put cybersecurity for medical technology under the microscope.
Specifically, the government watchdog agency will evaluate the adequacy of FDA efforts to protect both hospital patients and their data by securing networked medical devices at hospitals. The OIG also expects device manufacturers to begin providing a security disclosure statement for each of their products, incorporating information gleaned from threat assessments, threat modeling and vulnerability assessments.
In a world in which cybersecurity is coming to the fore, how will security concerns affect digital health software and medical device vendors’ product roadmaps? Join digital health and medical device cybersecurity expert Shahid Shah and IBM cybersecurity guru Bob Stasio as they parse the OIG requirements and discuss areas of particular importance to software and device manufacturers.
For an in-depth look at the topics covered in this podcast, explore the following resources:
- Inspector General’s 2016 Work Plan: A Cybersecurity Wake-Up Call To Medical Device Designers
- Articles by Shahid Shah
- IBM Analytics Cyber Threat Intelligence Solutions
- IBM Analytics Solutions for Healthcare
This week’s guest
Shahid Shah, the CEO of Netspective Communications, is an award-winning government 2.0, health IT and biotechnology IT expert. In his roles as a digital medical device inventor and CTO, he has more than 25 years of experience in technology strategy, architecture, engineering, entrepreneurship, speaking and writing. He serves as the chair of the #HealthIMPACT Forum.
This week’s host
Bob Stasio, a senior product manager of cyber analysis with IBM i2 Safer Planet, brings nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the NSA and the commercial sector. Bob served on the initial staff of US Cyber Command, and during the troop surge of 2007, his intelligence unit supported the detainment of more than 450 high-value targets.