Cybersecurity

Ask anyone in healthcare technology management (HTM) what worries them most about the future of medical devices and they’ll likely say the same thing: cybersecurity.
GettyImages-1159740389

Cybersecurity Resources

Cybersecurity risks and their impact on the safety and security of patients, employees, and organizations are a real threat in today’s digital landscape. Learn from experts in the field on protecting your critical systems and sensitive information from attacks. 


Buy Your Copy
tbfPUbcJ_Cybersecurity_2021

This collection contains AAMI standards, technical information reports, books, articles from BI&T, as well as other resources that will help you make the decisions needed to safeguard your data. Take advantage of this collection's discounted price plus receive multiple resources to help you ensure the security of your system. 

  • ANSI/AAMI/IEC TIR80001-2-2, Application of risk management for IT-networks incorporating medical devices—Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls
  • AAMI/IEC TIR80001-2-8, Application of risk management for IT-networks incorporating medical devices—Part 2-8: Application guidance—Guidance on standards for establishing the security capabilities identified in IEC 80001-2-2
  • AAMI TIR57, Principles for medical device security—Risk management
  • AAMI TIR97, Principles for medical device security—Postmarket risk management for device manufacturers
  • Medical Device Cybersecurity: A Guide for HTM Professionals
  • The Medical Device Connectivity FAQs
  • Resources from the field

Appropriate Use of Public Cloud Computing for Quality Systems and Medical Devices

The purpose of this document is to provide guidance to multiple stakeholders regarding the appropriate use of public cloud computing both as a component of medical devices and in support of quality systems. Cloud technology providers, medical device manufacturers, regulatory professionals and regulators alike should be able to refer to this document to identify known best practices for ensuring that the public cloud computing component of any medical device (or quality system) works both within the spirit and the letter of regulations designed to ensure that medical devices improve patient outcomes and/or help manage healthcare costs, while also being safe and effective..
Buy Your Copy
lRAFdKZp_CR510_store_02_png

Principles for medical device security—Postmarket risk management for device manufacturers

This technical information report (TIR) provides guidance on methods to perform postmarket security risk management for a medical device in the context of the Safety Risk Management process required by ISO 14971. This TIR is intended to be used in conjunction with AAMI TIR57:2016.
Details
gRrhDyYQ_Store_AAMI_TIR97_2019_png

Related Events

Software/Cyber

Mastering SaMD: Navigating Regulations & The Product Lifecycle (Jan 2025)

Jan 21 to Jan 23, 2025

Software/Cyber

Medical Device Software Validation (Feb25)

Feb 10 to Feb 12, 2025

Software/Cyber

Production & Quality System Software (April25)

Apr 23 to Apr 24, 2025

Software/Cyber

Medical Device Software Validation (May25)

May 20 to May 22, 2025