Endpoint Security , Enterprise Mobility Management / BYOD , Governance & Risk Management

State of Medical Device Security Part 3: A CISO's View

Jennings Aske of New York-Presbyterian on the Challenge of Incentivizing Greater Security
Jennings Aske, CISO, New York-Presbyterian

New York-Presbyterian has more than 72,000 medical devices from over 1,400 manufacturers, says CISO Jennings Aske. Given that scale, how can a security leader help ensure device cybersecurity? Aske shares his view of what's needed from manufacturers and the government.

See Also: Secureworks Named a Major Player in the 2024 IDC MDR Marketscape

In an interview at Information Security Media Group's recent Healthcare Security Summit, Aske discusses:

  • Why he believes device manufacturers fail to take security issues seriously;
  • His views on the lack of meaningful regulations incentivizing device security;
  • How he tackles the medical device security challenge at his organization.

This is part three of a three-part video interview series on medical device security. Look for the other two interviews, which feature Suzanne Schwartz of the FDA and Dale Nordenberg of the Medical Device Innovation, Safety and Security Consortium.

Aske is the CISO for New York-Presbyterian, an ntegrated academic healthcare delivery systems. Previously, he was vice president information security and chief security officer at Nuance Communications, chief information security and privacy officer at Partners Healthcare and CISO at UMass Memorial Hospital. Aske was also CISO for the Commonwealth of Massachusetts's Executive Office of Health and Human Services, responsible for coordinating information security across the 16 state agencies. He's is a licensed attorney in the Commonwealth of Massachusetts.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.