Training – Threat Modeling for medical device manufacturers

Threat Modeling Training

for Medical Device Manufacturers

Hands-on training

International regulators (such as the FDA) as well as customers are expecting Medical Device Manufacturers to manage and reduce cyber security risks. With our Threat modeling training for medical device manufacturers, we teach you to proactively create secured devices.

This is in part a question of technology, but equally a question of security engineering best practices applied during the product development life cycle. This includes applying a mature Cyber Security Risk Assessment methodology during the Risk Management process. One powerful technique available to engineers is threat modeling.

We developed a 2-day in-house course with practical use cases, based on real world projects and our experience with Medical Device Manufacturers. If you want to find out more, or schedule your own training: contact us through our Contact Form.

Training details

We converted our Black Hat edition training to an in-house action-packed 2 day training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.

You will learn the basics of threat modeling, to understand what you are building, how to identify threats using the STRIDE method and how to address each threat.
We also cover the FDA requirements on “Security by Design”.

You will be challenged to create practical threat models covering all different stages of the process on:

  • E-health web and mobile applications, sharing the same REST backend
  • A CT scanner deployment in a hospital connected to a DICOM network
  • OAuth scenarios for a wearable device supported by a web portal
  • Privacy of a new data logging feature of a wearable health monitor

Download the full outline for the threat modeling training for medical device manufacturers  here.

Get started with Threat Modeling

We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be applied in your field.

Learn more

Interested to know more about our training? Do not hesitate to contact us by completing the form below

[wpforms id=”3504″ title=”false” description=”false”]

Read a blog about Threat Modeling

Threat Modeling Insider – April 2024

This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats

Threat Modeling Playbook – Part 4 Strengthen your threat model processes

In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy

Threat Modeling Insider – March 2024

This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats

© 2020 door Toreon | Algemene voorwaarden | Cookie policy

Start typing and press Enter to search

Shopping Cart