• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Alpine Security Introduces Evolutions for Medical Device Cybersecurity Assessment and Penetration Testing

Home Alpine Security Introduces Evolutions for Medical Device Cybersecurity Assessment and Penetration Testing

Alpine Security Introduces Evolutions for Medical Device Cybersecurity Assessment and Penetration Testing

ST. LOUIS, MO – St. Louis-based firm Alpine Security (“Alpine”) aims to secure the healthcare industry from cyberattacks. One way Alpine is securing healthcare is by working with medical device manufacturers to help ensure their devices are safe from cybercriminals. Medical devices range from external systems, such as drug infusion pumps or patient monitoring systems to implantable (internal) devices, like pacemakers. Cybercriminals go after medical devices for four main reasons:

  1. To steal Protected Health Information (PHI) (Motive: Financial Gain)

  2. Ransomware (Motive: Financial Gain)

  3. To harm or kill a patient (Motive: Terrorism or Assassination)

  4. To use the medical device as a beachhead for enemy advancement (Motive: Foothold to Expand Operations)

“Attacks against medical devices are often high risk and may harm or kill a patient. We’re fortunate to work with many medical device manufacturers and learn how their devices are advancing medicine and improving healthcare. Our goal is to assist medical device manufacturers with their mission of improving healthcare.

— Christian Espinosa, Alpine Security CEO

Alpine developed and introduced its “Evolution” methodology for medical device cybersecurity assessments and testing to help medical device manufacturers mature the cybersecurity of their devices. Alpine’s Evolution approach is based on Navy SEAL Evolutions. The SEALs use Evolutions to describe each progressive event in a training schedule. The general idea is that as you progress through each Evolution you mature and evolve. Alpine assists medical device manufacturers to evolve the cybersecurity of their medical devices using a structured, phased approach.

Alpine’s medical device cybersecurity assessment and penetration testing methodology has two main Evolutions and can include as many as necessary. During each Evolution, the medical device is thoroughly assessed and tested. The first Evolution establishes a cybersecurity baseline for the medical device. This baseline includes all the ways an attacker could gain entry to and compromise the device, as well as the risk associated with each method of compromise. Higher rated risks typically affect patient safety or privacy. After the first Evolution, the medical device manufacturer works to fix the vulnerabilities identified by Alpine Security. The next Evolution validates the vulnerabilities were fixed and checks for any new vulnerabilities that may have been introduced. This process, the Evolution, repeats as many times as necessary to get the medical device to an acceptable risk level.

 Alpine’s Evolutions include the following activities, in addition to a technical “white box” penetration test:

  • Identification and prioritization of risk pertaining to confidentiality, integrity, and availability

  • Identification and assessment of all entry points into the device (system)

  • Assessment of existing cybersecurity controls

  • Identification and assessment of data flows

  • Identification and assessment of use case risk

  • Threat (Attack) Tree development

  • Assessment of the cybersecurity Traceability Matrix

  • Assessment of medical device standard operating procedures

  • Assessment of software cybersecurity architecture

For more information on Alpine Security’s medical device cybersecurity assessment and testing, contact Alpine Security at 844-925-7463 / [email protected] or visit their website at www.alpinesecurity.com.

Share

You also might be interested in

7 Hardest Cybersecurity Certifications
Difficult path like a videogame for a businessman

7 Hardest Cybersecurity Certifications

Mar 17, 2018

Replace Windows Task Manager with Process Explorer for Easy Malware Detection

Replace Windows Task Manager with Process Explorer for Easy Malware Detection

Feb 15, 2016

armitage-meterpreter-options

7 Steps to Hack a Target with Virtually No Experience

Apr 24, 2016

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company