Fill out the form to watch now


Defend Against a MedTech Cyber Breach:
A Fireside Chat with Critical Healthcare Stakeholders 

While the Internet of Medical Things (IoMT) brings connectivity and data-driven decision making to everyday healthcare practices, it also increases the risk and susceptibility of cyberattacks across the multitude of connected ecosystems.

This panel will explore medical device regulation and cybersecurity requirements for addressing, managing and mitigating safety risks, as well as securing and protecting patient PHI.

Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport, connected health and IoT connected industries. Irdeto’s solutions and services enable customers to protect their revenue, create new offerings and fight cybercrime effectively. With more than 50 years of expertise in security, Irdeto’s software security technology and cyberservices protect more than six billion devices and applications for some of the world’s best-known and loved brands. With a unique heritage in security innovation, Irdeto is the well-established and reliable partner to build a secure future where people can embrace connectivity without fear. Please visit Irdeto at

About us

Healthcare experts include: 

GE HealthcareSteve Abrahamson, Senior Director, Product Cybersecurity 

Partners Healthcare: David Guffrey, Biomedical Cybersecurity Specialist

Zipnosis: Derek Rockwell, Chief Information Security Officer and Vice President of Product & Engineering 

Irdeto: Steeve Huin, VP of Strategic Partnerships, Marketing and Business Development 

Moderator/Medtech Intelligence: Thomas Maeder

Understand more about securing your medical devices to comply with regulation, as well as protecting patient PHI


48% of the equipment in an average North American hospital is connected, with estimates reaching 68% by 2023

82% of healthcare organizations have experienced an IoT-focused cyberattack in the last year with 30% of these attacks resulting in compromised end-user safety.