A hacker gains access to a care provider’s computer network through an email phishing attack and turns off all ICU heart monitors, putting multiple patients in peril. This was the realistic scenario put out in a report from the U.S. Department of Health and Human Services, which listed medical devices as one of the top five cybersecurity threats.

Likewise, the FDA is pushing manufacturers on cybersecurity — an estimated 70 percent of devices are running outdated, no-longer-supported Windows operating systems. A surprising number have critical vulnerabilities for which a patch was long-ago available.

If your medical devices are connected to networks, other devices or the internet, they’re vulnerable to attacks that can impact their safety and effectiveness.

This webinar will show you how to incorporate cybersecurity into your quality system and defend it to interested third parties. You’ll stay compliant, bolster your device defenses and protect patients — not to mention stay out of security breach-related headlines.

Eric Henry, a senior quality systems and compliance advisor in the FDA and Life Sciences practice of the law firm King & Spalding, will explain how to bolster your medical device cybersecurity. In particular, he’ll address the defense of cybersecurity during facility inspections and product submissions in light of the latest regulatory activities.

Webinar Takeaways:

  • How cybersecurity relates to design controls and the quality system more generally
  • Key tips for defending cybersecurity during an FDA inspection or notified body audit, even when the investigator or auditor is not familiar with cybersecurity concepts
  • How addressing cybersecurity risk relates to product risk management
  • What regulatory literature currently exists globally and some of the ways they compare to each other (e.g., FDA premarket and postmarket cybersecurity guidances, AAMI TIR-57 and TIR-97, IMDRF cybersecurity guidance, MDCG cybersecurity guidance, and various national guidance documents)
  • Common cybersecurity issues identified during inspections and submission reviews

Ensure your devices can withstand attack, keep patients safe … and make sure your business isn’t part of the next hack-related headline.

Who Will Benefit:

  • Software engineers
  • Quality assurance personnel/engineers
  • Regulatory affairs personnel
  • Legal personnel
  • Functional and business leaders