Endpoint Security , Enterprise Mobility Management / BYOD , Governance & Risk Management

State of Medical Device Security, Part 2: The Regulator's View

Suzanne Schwartz of the FDA on the Government's Role in Mitigating Risks
Dr. Suzanne Schwartz, CDRH associate director for science and strategic partnerships, FDA

The U.S. Food and Drug Administration lssued cybersecurity expectations for manufacturers of medical devices. But how are those expectations being met, and what is the FDA's ongoing role in improving device security? The FDA's Suzanne Schwartz offers an update.

See Also: Improving Security Compliance in The Financial Industry With Data Privacy Regulations

In an interview at Information Security Media Group's recent Healthcare Security Summit in New York, Schwartz discusses:

  • How the device security debate has evolved;
  • The FDA's role in improving and ensuring device security;
  • Milestones that must be met in 2018 to make further progress.

This is part 2 of a three-part video interview series on medical device security. Look for the other two interviews, which feature Dale Nordenberg of the Medical Device Innovation, Safety and Security Consortium and Jennings Aske of New York-Presbyterian.

Having served many roles within the FDA, Dr. Schwartz currently serves as the associate director for science and strategic partnerships at the FDA's Center for Devices and Radiological Health. In this capacity, she assists in the development, execution and evaluation of the center's biomedical science and engineering programs and oversees CDRH's activities related to the Medical Device Innovation Consortium.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.