Overview:
This
webinar will focus on cybersecurity of medical devices, a key concern for those
who develop, manufacture, test, and distribute these products. Protecting medical devices from hacking where
someone can alter the actual code embedded in the device could result in injury
or death to a patient or consumer. A
serious threat, it must be dealt with at all levels to make sure the end
product being used by a patient or consumer is perfectly safe and delivers the
effective treatment required.
This
session will provide some insight into current trends in cybersecurity threats
to medical devices and how to follow industry best practices to prevent and/or
mitigate these threats.
Cybersecurity
is a serious concern for medical device safety and effectiveness. Without protection, software running on a
medical device could cause severe injury or death to a patient.
There
are many forms of cybersecurity and many remedies for thwarting attempts to
penetrate medical device software. Most
of these are based in physical and logical security practices that are becoming
best industry practices.
This
webinar will detail some of the threats and ways to mitigate them to protect
consumers from harm.
Areas Covered:
This
webinar will cover the following key areas:
- Provide
an overview of cybersecurity and guidance on device software
- Provide
an overview of the most common problems faced by industry in terms of medical
device security, efficacy, and safety
- Provide
a set of best practices and industry standards to meet the challenges of
cybersecurity and other threats to devices and software
- Q&A
Why Should you attend
this training program?
Providing
safe and effective medical devices is in the best interests of all those
involved in the development, manufacturing, testing, and distribution of these
products. One of the largest current
threats to these devices working safely and effectively is cyberattacks that
can wreak havoc on code and device functionality. Preventing these attacks by identifying
sources of threats and rooting them out before they can take effect is of the
utmost concern.
In
this webinar, you will learn just how cyberattacks threaten medical devices and
how industry is currently responding to them.
We will discuss the many ways of preventing and mitigating the cybersecurity
risk, and about the industry best practices that can help your company do the
same.
Industries that
benefit from this training:
Manufacturing, Testing, Packaging and Distribution companies in the following industries that are regulated by FDA are required to follow GxPs:
- Pharmaceutical
(for drug products introduced using a medical device)
- Medical
Device
- Biologicals
(for biological products introduced using a medical device)
- Tobacco
(based on the Tobacco Control Act of 2009)
- E-Liquid/Vapor
(based on the “Deeming” Act of 2016)
- E-Cigarette
(based on the “Deeming” Act of 2016)
- Cigar
(based on the “Deeming” Act of 2016)
- Third-Party
companies that support those in the above industries, including Contract
Research Organizations (CROs)
- Colleges and Universities offering programs of study in Clinical Trial Management and Regulatory Affairs/Matters related to FDA
Personnel in the
following roles will benefit:
- Information
Technology Analysts
- QC/QA
Managers
- QC/QA
Analysts
- Clinical
Data Managers
- Clinical
Data Scientists
- Analytical
Chemists
- Compliance
Managers
- Laboratory
Managers
- Automation
Analysts
- Manufacturing
Managers
- Manufacturing
Supervisors
- Supply
Chain Specialists
- Computer
System Validation Specialists
- GMP
Training Specialists
- Business
Stakeholders responsible for computer system validation planning, execution,
reporting, compliance, maintenance and audit
- Consultants working in the life sciences industry who are involved in computer system implementation, validation and compliance
- Auditors engaged in the internal inspection of labeling records and practices
Carolyn
Troiano has more than 35 years of experience in computer system validation in
the pharmaceutical, medical device, animal health, tobacco and other
FDA-regulated industries. She is currently an independent consultant, advising
companies on computer system validation and large-scale IT system
implementation projects.
During
her career, Carolyn worked directly, or on a consulting basis, for many of the
larger pharmaceutical companies in the US and Europe. She developed validation
programs and strategies back in the mid-1980s, when the first FDA guidebook was
published on the subject, and collaborated with FDA and other industry
representatives on 21 CFR Part 11, the FDA’s electronic record/electronic
signature regulation.
Carolyn
has participated in industry conferences. She is currently active in the PMI,
AITP, and RichTech, and volunteers for the PMI’s Educational Fund as a project
management instructor for non-profit organizations.
Enrollment Options
Tags: carolyn troiano, cybersecurity, medical device, fda compliance