Premium Only Content

QA ONLY: Cybersecurity Vulnerabilities in Legacy Medical Devices 04-01-25 - Energy & Commerce
00:01:36 How many legacy medical devices are in use across the
00:05:51 Is it easy to manipulate a medical device?
00:08:56 HHS to Cut 20,000 Positions at FDA
00:10:18 What Happened to FDA's First Round of Fires?
00:11:05 How Back Door Medical Devices Can Be Vulnerable
00:16:47 How did cybersecurity experts support the medical device reviewers?
00:17:57 Is there any certainty in the FDA review process?
00:19:25 What challenges do hospitals face because of the differences between
00:22:59 Why cybersecurity risks are unlikely to be sufficiently mitigated through
00:24:50 What role does NIH funding play in the development of
00:29:56 Is there a back door into a medical device?
00:32:09 What Subject Matter Experts Contribute to Medical Device Review
00:34:18 What are some of the challenges of identifying cybersecurity risks
00:38:26 Liability of Failure of a Medical Device for a Cybersecurity
00:39:34 How important is it to the device industry that the
00:39:53 FDA's In-House Expertise on Medical Devices
00:40:42 Doctor Fu: How Important is Maintaining America's Biomedical Research Enterprise?
00:43:28 What tools are available to inform the public and providers
00:45:05 What's the difference between cutting edge and legacy medical devices?
00:48:17 What the FDA's Center for Devices and Radiological Health Can
00:48:35 The main risk in my view is the inconsistency
00:49:19 He is running algorithms in every department he has no
00:52:16 I'll start with you doctor dam if it's likely
00:52:59 Is the entire U.S. Mr. Danoff?
00:56:19 What can be done to make a better cybersecurity with
00:59:57 Ending Advisory Committees at CDC, FDA and CDC
01:01:22 Is the medical device industry the most targeted for cyber
01:02:16 Health Sector Coordinating Council's Cybersecurity Working Group
01:04:54 How to improve the regulations but not make them obstacles
01:06:10 How is firing FDA safety employees an effective way to
01:07:58 What Is Being Done to Address Information Blocking?
01:11:39 Doctor Demuth: Is there a standard curriculum at any medical
Legislators are holding a hearing on cybersecurity vulnerabilities and legacy medical devices. The risk of harm to patients is big is a big concern because if a medical device vulnerability is exploited, the ability for a device to help monitor, diagnose or treat a patient can be compromised. There's also national security concerns.
Summary generated by AI
This is just the direct questions and answers portion of the hearing, not commentary.
Full video at https://www.youtube.com/watch?v=D2kFOgCpfvM.
Let me know if the full video link is down and I'll upload the full version.
-
25:27
Cut to the chase
4 months agoQA ONLY: 20250501 TAL Hearing Small UAS and Counter-Small UAS 05-01-25 - Armed
11 -
2:25:31
vivafrei
21 hours agoEp. 281: Charlie Kirk; Routh Trial; Charlotte Train; Bolsanaro Defense; SCOTUS & MORE!
157K244 -
2:55:38
Turning Point USA
12 hours agoWASHINGTON D.C. PRAYER VIGIL FOR CHARLIE KIRK
102K44 -
35:54
The Mel K Show
12 hours agoMel K & Tim James | Healing is an Inside Job | 9-14-25
81.1K4 -
3:06:33
IsaiahLCarter
15 hours ago $15.93 earnedCharlie Kirk, American Martyr (with Mikale Olson) || APOSTATE RADIO 028
84.9K30 -
16:43
Mrgunsngear
18 hours ago $13.33 earnedKimber 2K11 Pro Review 🇺🇸
61.4K14 -
13:40
Michael Button
1 day ago $4.08 earnedThe Strangest Theory of Human Evolution
56.8K31 -
10:19
Blackstone Griddles
1 day agoMahi-Mahi Fish Tacos on the Blackstone Griddle
38K3 -
23:51
Jasmin Laine
1 day ago“Stop Wasting My Time!”—Trump's BRUTAL WARNING To Canada As Poilievre ROASTS CBC LIVE
30.3K30 -
9:54
Millionaire Mentor
1 day agoNBC Host EXPOSES JB Pritzker For Saying This About Trump
19.2K14