This session will explain different types of vulnerabilities in medical devices; how they are identified; how vulnerabilities in third party libraries or components can be linked to devices, assessed, mitigated and shared.
Identify the different types of cyber vulnerabilities
Describe the purpose and function of the NIST vulnerability database
Discuss how medical device ISAO will link published third party vulnerabilities to medical devices
Illustrate the coordinated disclosure process for medical devices
Explain how medical device researchers evaluate a device for vulnerabilities