Trevor Slattery Answers Tough Medical Device Cyber Questions | Ep. 51
Episode Summary
In this rapid-fire episode of The Med Device Cyber Podcast, Trevor Slattery provides expert answers to critical questions in medical device cybersecurity, offering invaluable insights for product security teams, regulatory leads, and engineers. The discussion covers essential standards such as IEC 62304 for software lifecycle processes and safety classifications, and ISO 14971, which outlines risk management in medical devices, emphasizing patient safety. The podcast further explores how AAMI TR57 extends ISO 14971 to security risk management and introduces AAMI TR97 for postmarket activities, alongside ANSI/UL 81001-5-1 for a secure total product lifecycle approach. Slattery clarifies key concepts like Secure Product Development Frameworks (SPDF) and the Total Product Lifecycle (TPLC), from design to decommissioning. He also delves into practical testing methodologies like fuzz testing and differentiates between black-box and white-box penetration testing. Additionally, the episode addresses the nuances of DICOM for medical imaging, the FDA’s definition of a "cyber device," and the critical role of Software Bill of Materials (SBOMs), including "software of unknown provenance" (SOUP). This episode is a concise yet comprehensive guide to navigating the complexities of medical device cybersecurity.
Key Takeaways
- 01IEC 62304 and ISO 14971 are foundational standards for medical device software development and patient safety risk management, respectively.
- 02AAMI TR57 adapts the risk management framework of ISO 14971 for cybersecurity, while AAMI TR97 focuses on postmarket security activities.
- 03A Secure Product Development Framework (SPDF) and a Total Product Lifecycle (TPLC) approach are crucial for integrating security from a medical device's design to its decommissioning.
- 04SBOMs are essential for listing all software components in a medical device, including both third-party and proprietary code, without exposing source code.
- 05The FDA defines a "cyber device" by the presence of validated software, network interfacing capabilities, and potential cybersecurity risk exposure.
- 06Static Application Security Testing (SAST) analyzes code without execution, whereas Dynamic Application Security Testing (DAST) evaluates code during runtime.
Frequently Asked Questions
Quick answers drawn from this episode.
-
In this rapid-fire episode of The Med Device Cyber Podcast, Trevor Slattery provides expert answers to critical questions in medical device cybersecurity, offering invaluable insights for product security teams, regulatory leads, and engineers.
-
IEC 62304 and ISO 14971 are foundational standards for medical device software development and patient safety risk management, respectively. AAMI TR57 adapts the risk management framework of ISO 14971 for cybersecurity, while AAMI TR97 focuses on postmarket security activities. A Secure Product Development Framework (SPDF) and a Total Product Lifecycle...
-
This episode covers Penetration Testing and SBOM Management. It's part of The Med Device Cyber Podcast, hosted by Blue Goat Cyber, focused on practical medical device cybersecurity guidance for MedTech teams.
-
The podcast further explores how AAMI TR57 extends ISO 14971 to security risk management and introduces AAMI TR97 for postmarket activities, alongside ANSI/UL 81001-5-1 for a secure total product lifecycle approach. It's most useful for medical device manufacturers, cybersecurity engineers, regulatory affairs professionals, and MedTech...
-
IEC 62304 and ISO 14971 are foundational standards for medical device software development and patient safety risk management, respectively.
Listeners also asked
Quick answers pulled from related episodes.
-
What does Episode 28 cover about "Total Product Lifecycle Security: From Design to Disposal"?
Episode 28 of The Med Device Cyber Podcast covers Total Product Lifecycle Security: From Design to Disposal.
From Episode 028 · Total Product Lifecycle Security: From Design to Disposal | Ep. 27 -
What does Episode 34 cover about "Vulnerability, Penetration & Other Cybersecurity Testing Types Explained"?
Episode 34 of The Med Device Cyber Podcast covers Vulnerability, Penetration & Other Cybersecurity Testing Types Explained.
From Episode 034 · Vulnerability, Penetration & Other Cybersecurity Testing Types Explained | Ep. 33 -
What does Episode 54 cover about "Untangling Software Composition Analysis for MedTech Teams"?
Episode 54 of The Med Device Cyber Podcast covers Untangling Software Composition Analysis for MedTech Teams.
From Episode 054 · Untangling Software Composition Analysis for MedTech Teams | Ep. 53
Hosted by
Related Topics
Explore every episode in the topics covered here.
Device, network, wireless, and protocol penetration testing for medical devices - what to scope, who to trust, and how to report it.
Browse Pen Testing episodes →Software Bills of Materials for medical devices: generation, monitoring, and using SBOMs as a continuous security tool, not a checkbox.
Browse SBOM episodes →More from your hosts
Other episodes diving into Christian and Trevor's areas of focus.
More like this
Episodes covering similar ground - including Pen Testing, SBOM.
Why this matches shares the SBOM topic and covers similar themes around tplc, decommissioning, spdf.
Why this matches shares the Pen Testing and SBOM topics and covers similar themes around fuzz, code, white-box.







