Christopher is one of the leading cybersecurity experts in the U.S. with over 18 years of experience in information technology, compliance and security. He currently is the Director of Security and Compliance at Agio, an international information security and managed services firm headquartered in New York. He provides clients with expertise in security risk, HIPAA, HITRUST, cloud computing, medical device security, NIST SP-800, and international regulatory IT security best practices.
Prior to joining Agio he was the VP and Managing Consultant at Redspin, an information security consulting firm headquartered in Santa Barbara, California. At Redspin he managed the firm’s healthcare security consulting practice and served as the senior-most consultant for projects in the healthcare, technology and higher education verticals.
Christopher attended Mississippi State University where he earned an MBA and a BS in Psychology. Certified in HITRUST CSF (CCSFP) and Governance of Enterprise IT (CGEIT). He is based in Franklin, TN.
Securing the Internet of Healthcare – Effective Strategies for Medical Device Security
The modern clinical ecosystem has become dependent upon a complex environment of medical devices, from the simplest of consumer glucose meters to the largest of imaging devices. The interactions from patients and clinicians, and the sharing of data among devices, is crucial for accurate diagnoses and effective outcomes. However, most healthcare security experts agree that medical device security vulnerabilities have reached the tipping point at which the risk to integrity of data is becoming eclipsed by the compromise of patient safety.
Given the criticality of data and workflows within this Internet of Healthcare, what can be done to address medical device security issues without creating obstacles to patient care? We will first discuss how to identify and target the devices with the most critical security vulnerabilities – those in use by consumers up through those within hospital settings. Second we will learn how to address these issues through a layered risk management approach of IT security best practices and vendor analysis that creates checkpoints for patients, clinicians and IT staff.
- Discuss how to identify and target the devices with the most critical security vulnerabilities – from those in use by consumers to those within hospital settings.
- Learn how to address these issues through a layered risk management approach of IT security best practices and vendor analysis that creates checkpoints for patients, clinicians and IT staff.
- How to maintain innovation in development of medical devices and applications while adhering to security best practices.