Endpoint Security , Internet of Things Security , Open XDR

Improving the Security of Connected Medical Devices

Fortified Health Security's Dan Dodson Describes Critical Steps
Dan Dodson, president, Fortified Health Security

Healthcare organizations have an ever-growing network of connected devices, which all too frequently cannot be updated or patched in a timely manner, says Dan Dodson, president of Fortified Health Security. He recommends organizations actively manage their networked devices to ensure that they can provide high levels of patient care while minimizing cybersecurity risks.

See Also: Beyond Pandemic: Right-Sizing the Cybersecurity Posture

In a video interview at Information Security Media Group's recent Cybersecurity Summit in New York, Dodson also discusses:

  • The risks posed by having an ever-growing network of connected devices inside healthcare organizations;
  • What health systems must consider when evaluating a connected medical device security program;
  • How Fortified Health Security is helping organizations address these challenges.

Dodson is president of Fortified Health Security. He's previously served in various roles at Santa Rosa Consulting, Hooper Holmes, Dell Perot Systems and Covenant Health System.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.