Cybersecurity Exploitation Recovery

Duration: 60 Minutes
flat 50% off on this webinar
Cybersecurity technology and exploitations evolve rapidly. A static cybersecurity program leaves a software program more vulnerable with each passing day as hackers develop new malware adaptations. The FDA requires that a software developer, whether for a software based device or for standalone software, addressed cybersecurity before the device may be marketed. But the cybersecurity problems manifest themselves after premarket authorization. FDA provides little guidance on how to manage a cybersecurity recovery program once you are on the market and have been hit. What should your cybersecurity recovery program include? You are left with an answer of, "You figure it out."
Cybersecurity Exploitation Recovery
Instructor: Casper E Uldriks
Product ID: 503341
Objectives of the Presentation
The attendee should understand the need for a comprehensive recovery plan before a cyber attack occurs.

Fundamental cybersecurity program concepts will be identified so attendees have to customize them for their particular needs and implement a program that includes training needs, which is something that can be verified during an FDA inspection.

A firm's quality audit division will be provided some initial issues that need to be considered to develop their QA cybersecurity program and how to evaluate adequacy of the programs based on specific factors.

Why Should you Attend
Cyber attacks constantly evolve in their impact and deviousness of deployment. The FDA expects you to apply the Quality System regulation (QSR) Corrective and Preventive Action (CAPA) as an established and implemented cybersecurity recovery program. This webinar provides initial guidance on how to build a cybersecurity recovery program that includes FDA CAPA elements. The training will address how to prepare a firm's staff for cybersecurity problems. Remember, people carry the biggest "open door" for a hacker. You can use FDA's optional follow-up options. Finally, you can take away a basic checklist that a cybersecurity audit team should include in their program. It is a start from which you can further develop and refine a cybersecurity program as you gain experience.

Areas Covered
  • Initial steps to build a cybersecurity recovery program
  • Basic components of a cybersecurity CAPA Program
  • Human resources requirements
  • Cyber attack recovery components
  • Cybersecurity program checklist
Who will Benefit
  • Software engineers, developers and information technology managers
  • Third party software servicers
  • In-house biomedical departments at healthcare institutions
  • Regulatory Affairs Managers
  • Healthcare institution risk managers
  • Product liability counsel
  • Complaint investigation teams
  • Quality assurance directors
Topic Background
Software cybersecurity programs keep a firm vulnerable to devastating outcomes that have a severe impact on the firm and the users of software. The FBI identifies the medical device industry and the FDA as the last prepared sector of industry and government to manage this problem. Heath care products and treatment management remains incredibly vulnerable. If fact, you may carrying an infective malware program in your iPhone, laptop or in a remote printer or photocopier. Nothing is safe, not even the federal government.
$375
Recorded Session for one participant
Get life time access with download option!
Book this course
Pay Now
  $500.00 Training CD
Free shipment within 4 Working Days of placing the order. Get life time access for unlimited participants.
  $600.00 Training USB Flash Drive
Free shipment within 4 Working Days of placing the order. Get life time access for unlimited participants.
For multiple location please contact our customer care team +1-510-857-5896.
How it works
Live Session - How it works
  • Login to onlinecompliancepanel with your registered username and password https://www.onlinecompliancepanel.com/login
  • The webinar joining link, username and password for joining the webinar will be updated on your OCP Account 24 hours prior to the webinar
  • Presentation handouts in Downloadable PDF format will be updated on your OCP Account 24 hours prior to the live session
  • Login to the audio conference on the scheduled date and time
  • Get answers to your queries through interactive Q&A sessions via chat at the end of the session
  • Download the Certificate of Attendance and Purchase Invoice from your OCP Account 24 hours after the completion of the session
  • Please let us know your thoughts and views at the end of the webinar, your valuable feedback will help us improve
Recorded Session - How it works
  • Login to onlinecompliancepanel with your registered username and password https://www.onlinecompliancepanel.com/login
  • Upon purchase of the recorded session a link will be updated on your OCP Account within 24 hours
  • Please click on the link to access the Recorded Session
  • Presentation handouts in downloadable PDF format will be updated on your OCP Account within 24 hours of the purchase of the product
  • Download the Certificate of Attendance and Purchase Invoice from your OCP Account after 48 hours of the product Purchase
  • Please share your valuable Feedback at the end of the session
Instructor Profile:
Mr. Uldriks held a number of positions at FDA, such as an investigator in FDA's New England office, in the Office of the Commissioner in Legislative Affairs and in the Center for Devices and Radiological Health (CDRH), where he served as CDRH's Associate Director for Regulatory Guidance and Government Affairs. He helped to guide CDRH to develop and implement various medical device related amendments to the Food, Drug, and Cosmetic Act, regulations and guidance documents. For years he has trained FDA staff on medical law and has been a featured speaker at many professional conferences involving FDA's medical device program.
Bar Admissions: Massachusetts, 1986 and District of Columbia, 2011
Education: Suffolk University Law School, Boston, Massachusetts, 1986.
View More