5th Annual Medical Device Cybersecurity Risk Mitigation Conference

September 28-30, 2020 | Virtual Event
Access Agenda
Register Today

Individual modules are available for $595.
The entire course may be accessed for $1,500.

Target Audience:
Product Security
Information Technology
Information Security

Industries Represented:
Medical Device


Aaron Vandyke





Aaron Van Dyke
Operations Director, Life Science
Q1 Productions
+1 (312) 955-0825

Design of Secure Medical Devices with Increased Attention to Risk Management & Cybersecurity Threat Testing while Ensuring Safety through Compliance with Working Group Standards & Global Requirements

With the continual development of new health products, cybersecurity teams are discovering new vulnerabilities and threats each day. Cybersecurity teams must not only develop secured products that ensure patient safety is protected, they must also work to maintain products in the field and ensure compliance with constant updated guidance. Medical device manufactures much test and continually monitor product safety to ensure risks are not exploited as devices age and become more vulnerable.

This year’s Medical Device Cybersecurity Risk Mitigation Conference will virtually connect security leaders to share best practices in the following modules:
Module 1: Managing Cybersecurity Risk Through Various Assessments & Robust Management Systems
Module 2: Cybersecurity Collaboration Between MDMs & HDOs to Ensure Patient Safety
Module 3: Considerations for Compliance with Regulatory Guidelines & Privacy Requirements


Explore the Virtual Event Guide & FAQ for insight into our dynamic event platform, including technical requirements, audio troubleshooting, detailed networking steps and more. Our mobile app, Q1 Events, mirrors onsite networking experiences so you stay connected.

A Special Thanks to Our Sponsor:

Health-ISAC is a trusted community of critical infrastructure owners and operators within the global Healthcare and Public Health sector (HPH). The community is primarily focused on sharing timely, actionable and relevant information with each other including intelligence on threats, incidents and vulnerabilities and best practices, mitigation strategies and more. Sharing occurs both machine-to-machine and person-to-person. H-ISAC also fosters the building of relationships and networking through worldwide educational events and whitepapers. Working groups and committees focus on topics of importance to the sector and member-vetted shared services offer enhanced services to leverage the H-ISAC community for the benefit of all.

Share This