Endpoint Security , Healthcare , Industry Specific

Why Connected Devices Are Such a Risk to Outpatient Care

Forescout CTO Justin Foster on Managing the 'Exploding' Number of Devices, Threats
Why Connected Devices Are Such a Risk to Outpatient Care
Justin Foster, CTO of Forescout (Image: Forescout)

The number of connected devices used in healthcare is growing as manufacturers constantly introduce new types of IoT equipment. The ever-evolving threat landscape is making it harder for many entities, particularly outpatient care providers, to keep up, said Justin Foster, CTO of Forescout.

"Regardless of the setting, the amount of these internet-connected or smart devices is exploding," he said. "Understanding and protecting those types of devices in healthcare has become a new frontier for these providers. You want to have specific security that can sense threats against those type of devices, and there are many."

Many outpatient entities such as clinics and doctor practices frequently lack the internal expertise and other resources to effectively handle these device security challenges.

They can't obviously staff a 24x7 information security program. They can't have a SOC and have it staffed around the clock."

In this interview with Information Security Media Group (see audio link below photo), Foster also discussed:

  • Why many healthcare entities are turning to third parties to help monitor and manage device and other endpoint security;
  • Other top security challenges involving outpatient and inpatient care settings;
  • The latest XDR trends in the healthcare sector.

Foster has over 20 years of experience in information security, encompassing server security, cloud security, network security, security analytics and encryption. Prior to joining Forescout, he was the CTO and co-founder of Cysiv, a SOC-as-a-service provider. Foster has also has held technical, product management and go-to-market roles at Trend Micro and Third Brigade.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.