Identity and access management continues to be a top medical device cybersecurity challenge, says Clearwater security expert Mark Sexton. “A number of these devices cannot be integrated into normal technical controls, like Active Directory, that you use on your network to manage user access and monitor that activity,” he notes in an interview with Information Security Media Group.

As more of the healthcare ecosystem depends on large-scale cloud providers, executive teams must ensure they have the visibility, governance, and architectural resilience to withstand the next unplanned disruption whether it lasts minutes or hours.

