AAMI Summer Learning Series: Internet of Things (IoT) Track
The AAMI Summer Learning Series is your opportunity to gain insights from leading health technology, regulatory, and sterilization experts in an interactive virtual format. Each custom track connects you with the content most relevant to success in your role. Registration includes live streaming access and recordings of the sessions. Each webinar can earn you from one (1) to four (4) CEU's towards your ACI certification. Learn when—and where—you want this summer at an incredible value!
–Registration includes all sessions in the track!–
Data-Savvy HTM: On-Ramp to Modern Medical Equipment Systems IntegrationThursday, August 20, 2:00 p.m. to 3:00 p.m. ET
This session will provide a primer for healthcare technology management professionals interested in the integration side of medical equipment systems management. The presenters seek to motivate HTM professionals who want to excel in the IT aspects of their role by providing an intriguing and relatable on-ramp to the common approaches of integrating medical equipment data for clinical documentation, alarm management, real-time surveillance, and research workflows. This content of this session will be vendor agnostic/neutral and sourced from published or open-source industry associations (e.g., IHE, HL7, NIST).
- Ross Leder, Connexall
- Yihan Zhang, Connexall
- Fernando Maturell, University of Chicago Medicine
Compare and Illustrate Current State of Medical Device Security ProgramsFriday, August 28, 2:00 p.m. to 3:00 p.m. ET
Several in-house and independent healthcare technology management programs are responsible for managing the cybersecurity of medical devices, including using innovative tools to optimize cybersecurity management. During this session, speakers will discuss the current state and recent developments of their programs, including lessons learned from the tools they have implemented and how they’ve used that data to improve the overall risk management of the medical devices and key aspects of their programs (e.g., staffing structures, skill levels, and deliverables).
- Priyanka Upendra, Banner Health
- Shawn Anderson, Intermountain Healthcare
- Keith Whitby, Mayo Clinic
Securing the Telehealth and Remote Patient Monitoring EcosystemWednesday, September 2, 2:00 p.m. to 3:00 p.m. ET
Healthcare delivery organizations (HDOs) are leveraging telehealth capabilities, such as remote patient monitoring (RPM) and videoconferencing, to treat patients in their homes. These technologies improve patient care, but they can also expose the HDO to cybersecurity risks. The National Cybersecurity Center of Excellence is developing an example solution to help secure the telehealth RPM environment. This session will explore the risks associated with telehealth RPM and detail a standards-based solution to mitigate those risks. The session will detail security controls that can be implemented to help secure the RPM ecosystem and protect patient privacy.
- Jeffrey Greene, National Institute of Standards and Technology
- Sue Wang, The MITRE Corporation
Medical Device Cybersecurity in a Legacy WorldWednesday, September 9, 2:00 p.m. to 3:00 p.m. ET
The population of legacy medical devices continues to grow as healthcare organizations try to squeeze them for useful life. Unfortunately, the security capabilities of legacy systems generally can't be updated. Until organizations can replace their legacy systems with newer, more secure ones, they must find ways to protect these systems by isolating and otherwise building multiple levels of defense around them. This session will describe how legacy systems can be identified, evaluated for risk, and protected with in-depth security measures.
- Stephen Grimes, Strategic Healthcare Technology Associates, LLC
- Jessica Wilkerson, U.S. Food & Drug Administration
- Axel Wirth, MedCrypt
- Robert Kerwin, IAMERS
Leveraging Security Tools to Respond to the Urgent 11/IPnet VulnerabilitiesFriday, September 11, 2:00 p.m. to 3:00 p.m. ET
The cybersecurity vulnerabilities known as "Urgent/11" have prompted multiple critical warnings, including a safety communication from the FDA. The vulnerabilities are a result of third-party software, IPnet, that was included in at least six different operating systems and could affect connected equipment (e.g., routers, a range of medical devices, critical infrastructure). The session will detail how a multidisciplinary team at Hartford Healthcare, an integrated health system in Connecticut, conducted a vulnerability assessment and implemented controls to manage the risks created by the Urgent/11 exploits.
- Seth Baker, Hartford HealthCare
- Craig Hyps, Ordr
- Christine Vogel, Hartford HealthCare