
Sign up to save your podcasts
Or


In this episode, host Etienne Nichols sits down with Jose Bohorquez and Mohamad Foustok from CyberMed to dissect the complex world of Software as a Medical Device (SaMD) and cybersecurity. They emphasize that SaMD is first and foremost a medical device and should be treated as such from the very beginning of the development process. The conversation highlights the most common mistakes companies make, like treating security as an afterthought and jumping straight into coding without a solid architectural plan.
Mohamad Foustok introduces the concept of "zero trust" and the critical importance of designing for security across the entire product lifecycle, from initial concept to post-market surveillance. The discussion clarifies that cybersecurity is not limited to network-connected devices but applies to any medical device with a software function, regardless of its connectivity. They also touch on the historical context of FDA guidance, noting a significant shift in recent years that has raised the regulatory bar and put a greater emphasis on robust cybersecurity documentation.
The guests provide actionable advice for MedTech professionals, stressing the value of a balanced approach that integrates security and functionality from day one. They explain that a well-thought-out process, though seemingly slower at the outset, ultimately saves time and resources by preventing costly and time-consuming redesigns later on. This episode serves as a vital guide for anyone looking to build a secure and compliant medical device in today's evolving regulatory landscape.
Key TimestampsZero Trust: A cybersecurity principle that means you should never automatically trust anything inside or outside of your network perimeter. Instead, every access request must be verified before granting access. Think of it like a strict security guard who checks everyone's ID, even if they claim to work there. In a hospital setting, this means a medical device should not assume the hospital's Wi-Fi is secure; it should treat every connection as potentially hostile and build in its own protections. This is in contrast to the old model where everything inside the network was trusted by default.
Feedback Call-to-ActionWe love to hear from our listeners! Your feedback helps us create content that is most valuable to you. Please send your comments, topic suggestions, and guest recommendations to [email protected]. We read and respond to every email personally.
SponsorsThis episode of the Global Medical Device Podcast is brought to you by Greenlight Guru. In a world where regulatory requirements for software are constantly changing, having a robust and agile Quality Management System is non-negotiable. Greenlight Guru's Medical Device QMS & EDC solutions are purpose-built to help you navigate these complexities, from initial design through post-market surveillance, ensuring your SaMD and other medical devices are secure, compliant, and ready for market. Visit their website to learn how their solutions can streamline your entire development process.
By Greenlight Guru + Medical Device Entrepreneurs4.8
9292 ratings
In this episode, host Etienne Nichols sits down with Jose Bohorquez and Mohamad Foustok from CyberMed to dissect the complex world of Software as a Medical Device (SaMD) and cybersecurity. They emphasize that SaMD is first and foremost a medical device and should be treated as such from the very beginning of the development process. The conversation highlights the most common mistakes companies make, like treating security as an afterthought and jumping straight into coding without a solid architectural plan.
Mohamad Foustok introduces the concept of "zero trust" and the critical importance of designing for security across the entire product lifecycle, from initial concept to post-market surveillance. The discussion clarifies that cybersecurity is not limited to network-connected devices but applies to any medical device with a software function, regardless of its connectivity. They also touch on the historical context of FDA guidance, noting a significant shift in recent years that has raised the regulatory bar and put a greater emphasis on robust cybersecurity documentation.
The guests provide actionable advice for MedTech professionals, stressing the value of a balanced approach that integrates security and functionality from day one. They explain that a well-thought-out process, though seemingly slower at the outset, ultimately saves time and resources by preventing costly and time-consuming redesigns later on. This episode serves as a vital guide for anyone looking to build a secure and compliant medical device in today's evolving regulatory landscape.
Key TimestampsZero Trust: A cybersecurity principle that means you should never automatically trust anything inside or outside of your network perimeter. Instead, every access request must be verified before granting access. Think of it like a strict security guard who checks everyone's ID, even if they claim to work there. In a hospital setting, this means a medical device should not assume the hospital's Wi-Fi is secure; it should treat every connection as potentially hostile and build in its own protections. This is in contrast to the old model where everything inside the network was trusted by default.
Feedback Call-to-ActionWe love to hear from our listeners! Your feedback helps us create content that is most valuable to you. Please send your comments, topic suggestions, and guest recommendations to [email protected]. We read and respond to every email personally.
SponsorsThis episode of the Global Medical Device Podcast is brought to you by Greenlight Guru. In a world where regulatory requirements for software are constantly changing, having a robust and agile Quality Management System is non-negotiable. Greenlight Guru's Medical Device QMS & EDC solutions are purpose-built to help you navigate these complexities, from initial design through post-market surveillance, ensuring your SaMD and other medical devices are secure, compliant, and ready for market. Visit their website to learn how their solutions can streamline your entire development process.

30,670 Listeners

43,540 Listeners

8,708 Listeners

414 Listeners

1,453 Listeners

322 Listeners

764 Listeners

1,826 Listeners

1,452 Listeners

324 Listeners

34 Listeners

257 Listeners

14,382 Listeners

231 Listeners

58 Listeners