Тёмный

FDA Cybersecurity Testing Requirements - Interview with Red Sentry 

Medical Device Academy
Подписаться 7 тыс.
Просмотров 1,4 тыс.
50% 1

Опубликовано:

 

24 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 13   
@redsentry3470
@redsentry3470 Год назад
Loved the conversations, and the Q&A! Thanks for having us!
@MedicalDeviceAcademy
@MedicalDeviceAcademy Год назад
Looking forward to a new cybersecurity topic next month. Maybe someone will post a great question in the comments for us to address next month.
@MedicalDeviceAcademy
@MedicalDeviceAcademy Год назад
Thank you for taking the time to do this interview Valentina. We really appreciate your help.
@j.f.1564
@j.f.1564 Год назад
This webinar was very informative. Looking forward to future ones. Thank you Rob and Red Sentry!
@MedicalDeviceAcademy
@MedicalDeviceAcademy Год назад
Thank you. We are looking forward to more videos with Red Sentry too.
@kishin7
@kishin7 Год назад
Thanks for this!
@MedicalDeviceAcademy
@MedicalDeviceAcademy Год назад
Sure thing!
@bradento
@bradento Месяц назад
This was great-thanks for hosting, Rob. I have a question: If penetration testing identifies cybersecurity vulnerabilities in a mobile medical app, is it necessary to conduct and document a complete impact assessment and regression analysis of the software before implementing the cybersecurity fix? After the issue is resolved, would it be required to develop a regression testing report, or is it sufficient to simply fix the cyber vulnerability and document that it was addressed?
@MedicalDeviceAcademy
@MedicalDeviceAcademy Месяц назад
Usually you don't want to submit software for pen testing until it is "bug free." So the last thing you are probably going to do is validate the software to make sure your last few bugs are gone. But you don't need an impact assessment and regression analysis before you submit the software for pen testing. After vulnerability testing and pen testing are completed, you will have a new list of things to fix. After you fix the security issues, you should probably repeat your validation again before sending it back for pen testing. This would be the logical time to develop your validation testing report, but you could also do it after the final security testing. Hopefully, the second time the security issues are gone and you don't have to repeat the process a third time.
@TanishaBhambure-g3h
@TanishaBhambure-g3h 8 месяцев назад
Thank you for helping us to understand. could you please let me know security control for this
@MedicalDeviceAcademy
@MedicalDeviceAcademy 8 месяцев назад
There are 8 security controls that must be included as a minimum. Those are included in the eSTAR and the help Java script window explains each one. The list of 8: A) Authentication controls: B) Authorization controls: C) Cryptography controls: D) Code, data, and execution integrity controls: E) Confidentiality controls: F) Event detection and logging controls: G) Resiliency and recovery controls: H) Firmware and software update controls:
@TanishaBhambure-g3h
@TanishaBhambure-g3h 8 месяцев назад
any specfice requriement for tester to be certification for testing medical device
@MedicalDeviceAcademy
@MedicalDeviceAcademy 8 месяцев назад
Great question. The FDA states that the qualifications of the tester need to be documented, but the requirements do not include specific training in medical devices.
Далее
Medical Device Standards overview: ISO13485
1:07:55
Просмотров 10 тыс.
Three NEW MAPS in Update 0.31.0 Nightmare | Standoff 2
01:48
WI-007 Cybersecurity Requirements Webinar
53:05
Considering a career in epidemiology? Ask the experts!
59:24
Design Controls and Risk Management
1:19:44
Просмотров 2,4 тыс.
Strategy: Back to the Basics
57:50
Просмотров 5 тыс.
ISO 27001 Basics: Everything You Need to Get Certified
43:38