14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability Thomas Jepsen Chair, IEEE-USA Medical Technology Policy Committee.
A strategy for a Secure Information Society –
The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation.
DISABLING BARRIERS – BREAK TO INCLUDE WORLD REPORT ON DISABILITY.
The Future of Scholarship in the Digital Age: The Role of Institutional Repositories Ann J. Wolpert Director of Libraries Massachusetts Institute of Technology.
1 Whats All This Fuss About Promotion & Tenure? Sandra Burge, Ph.D. Dept. Family & Community Medicine Sandra Burge, Ph.D. Dept. Family & Community Medicine.
W ashington A rea T rustworthy C omputing H our
DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
Joint CASC/CCI Workshop Report Strategic and Tactical Recommendations EDUCAUSE Campus Cyberinfrastructure Working Group Coalition for Academic Scientific.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
US View on the Technological Convergence Between the Internet of Things and Cloud Computing June 1, 2010 Brussels, Belgium Presented by: Dan Caprio.
Vitality Institute Commission Forum Business for Health: Fostering Healthy Workplaces The Vitality Institute's mission is to advance knowledge about the.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
Building a Research CV Yeoh Khay Guan Deputy Chief Executive, NUHS Dean, NUS Yong Loo Lin School of Medicine 30 September 2014.
16th WATCH: Security, Cybercrime and Scale Cormac Herley Microsoft Research THURSDAY March 21 st, Noon, Room 110 W ashington A rea T rustworthy C omputing.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
Research seminars Thursday 29 th September 2011 Professor Nick Barber Department of Practice and Policy, The School of Pharmacy, University of London Assessing.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
Is 'Designing' Cyberinfrastructure - or, Even, Defining It - Possible? Peter A. Freeman National Science Foundation January 29, 2007 The views expressed.
High Confidence Medical Device Software and Systems: A programming languages and tools perspective Mark P Jones Department of Computer Science & Electrical.
OMICS Group Contact us at: OMICS Group International through its Open Access Initiative is committed to make genuine and.
The Changing Food Environment The Role and Activities of the U.S. Food and Drug Administration Transatlantic Consumer Dialogue The Changing Food Environment.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
Science at the FDA: Update for the Science Board Jesse L. Goodman, MD, MPH Chief Scientist and Deputy Commissioner for Science and Public Health November.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems Maya Bernstein US Department of Health & Human Services.
Accelerated Team Performance
5th WATCH: So what if I take over a botnet to do my research? An examination of the current state of Ethics in Information and Communications Technology.
Region 1 Senior Member Elevation Program Concurrent with the Region 1 Board of Governor’s Meeting August 18, 2012 Harold Belson IEEE A & A Committee Member.
Tempe-Feb The National Science Foundation CISE –ANIR Infrastructure programs THOMAS J. GREENE, Ph.D. Senior Program Director, Advanced Networking.
Edward Seidel, Assistant Director Directorate for Mathematical and Physical Sciences.
Joe Farese EXECUTIVE DEPARTMENTS. The mission of the Energy Department is to ensure America’s security and prosperity by addressing its energy, environmental.
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
On Preparing Proposals: Comments from Both Inside and Outside NSF Xiaodong Zhang The Ohio State University.
Research Recommendations for the Broadband Taskforce Agenda November 23, 2009.
11th WATCH: Security, Privacy, and Usability: Better Together Lorrie Cranor Computer Science & Engineering Science Policy Carnegie Mellon University THURSDAY.
NSF Programs and Possibilities Research Linkages EU-US 23 September 2004 Sylvia Spengler US National Science Foundation.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Keynote Talks: 10:00 AM to 10:15 AM:Dr. Iyad Obeid, Bringing Big Data to Bioengineering 10:15 AM to 10:45 AM:Dr. Chris Cieri, Data Center Models and Impact.
National Center for Supercomputing Applications Barbara S. Minsker, Ph.D. Associate Professor National Center for Supercomputing Applications and Department.
OMICS Group Contact us at: OMICS Group International through its Open Access Initiative is committed to make genuine and.
CAREER WORKSHOP APRIL 6, 2015 Overview of the CAREER Program Beth Hodges Director, Office of Proposal Development FLORIDA STATE UNIVERSITY.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
TRANSPORTATION RESEARCH BOARD WATER SCIENCE AND TECHNOLOGY BOARD TRANSPORTATION RESEARCH BOARD TRB’s Vision for Transportation Research.
Barriers to Industry HPC Use or “Blue Collar” HPC as a Solution Presented by Stan Ahalt OSC Executive Director Presented to HPC Users Conference July 13,
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
? ? ? ? ? ? What valuable skills can you develop by studying chemistry? ? ? ? ? ? ? ? ? ? ? ? ?
Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation NIEHS Webinar October 27, 2015 Image Credit: Exploratorium. Integrating.
The U. S. Health Care System Challenges, Opportunities and Solutions Fifth National HIPAA Summit Clinical Data Standards and the Creation of an Interconnected,
IEEE Computer Society Nita Patel VP, Membership and Geographic Activities The community for technology leaders.
1 Grant Applications Rachel Croson, PhD Dean, College of Business UT Arlington (formerly DD SES/SBE NSF)
OMICS international Contact us at: OMICS International through its Open Access Initiative is committed to make genuine and.
OMICS international Contact us at: OMICS International through its Open Access Initiative is committed to make genuine and.
2011 Center for Energy Workforce Development Summit November 7-9, 2011 Westin Alexandria Alexandria, VA.
33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon,
Civil & Environmental Engineering Frank Parker Lecture Series Wednesday, December 2, 4:10pm Featheringill Hall, Room 134, Jacobs Believed In Me Auditorium.
The IT Industry The Online World Building and Installing Know the components of computer systems Understand and practically apply appropriate connectivity.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Who’s in Your Neighborhood? The Patient-Centered Medical Community David C. Willis, MD Medical Director Greater Ocala Health Information Trust, Inc.
Tuesday, October 20, :10p.m. Featheringill Hall Room 138 “Virtual Surgery” PROFESSOR SUVRANU DE, SC.D. J Erik Jonsson ‘22 Distinguished Professor.
Joint Health IT Committee Meeting Precision Medicine Initiative Update March 10, 2016 P. Jon White, MD, Deputy National Coordinator for Health IT.
CompSci 280 S Introduction to Software Development
BIOENGINEER ADRIENNE R. MINERICK, PhD
Trial Funding and Engagement: The NIH Sponsored CTSA Program
Tobey Clark, Director*, Burlington USA
Penn State’s Center for Health Organization Transformation (CHOT)
Presentation transcript:

14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington A rea T rustworthy C omputing H our NSF Stafford I Room 110, Noon Public Invited Abstract The U.S. Institute of Medicine commissioned my 2011 report on the role of trustworthy software in the context of the "510(k)" U.S. medical device regulations. This talk will provide a glimpse into the risks, benefits, and regulatory issues for medical device cybersecurity and innovation of trustworthy medical device software. Today, it would be difficult to find medical device technology that does not critically depend on computer software. The technology enables patients to lead more normal and healthy lives. However, medical devices that rely on software (e.g., drug infusion pumps, linear accelerators) continue to injure or kill patients in preventable ways---despite the lessons learned from the tragic radiation incidents of the Therac-25 era. The lack of trustworthy medical device software leads to shortfalls in properties such as safety, effectiveness, dependability, reliability, usability, security, and privacy. Come learn a bit about the science, technology, and policy that shapes medical device software. Speaker Prof. Kevin Fu investigates research problems in computer system security, ultra-low power computing, and medical device safety. His most recent research explores problems transcending engineering, science, medicine, and public policy that impact the trustworthiness of medical device software. Kevin also manufactures a batteryless, programmable, RFID-scale sensor/actuator platform called the UMass Moo. Past research contributions include the security analysis of cardiac implants, RFID credit cards, web authentication, and secure file systems. His research appears in venues ranging from peer-reviewed computer science conferences and medical journals to critical articles in the NYT, WSJ, and NPR. Kevin received his PhD in Electrical Engineering and Computer Science from the MIT Parallel and Distributed Operating Systems group where his research pertained to secure storage and web authentication. Kevin joins the University of Michigan as Associate Professor of Computer Science and Engineering in January He is currently Associate Professor of Computer Science at University of Mass Amherst. Kevin served as a visiting scientist at the Food & Drug Administration, the Beth Israel Deaconess Medical Center of Harvard Medical School, and MIT CSAIL. Previous employers include Bellcore, Cisco, HP Labs, Microsoft Research, and Holland Community Hospital. He is a member of the federal NIST Information Security and Privacy Advisory Board. Kevin received a Sloan Research Fellowship, NSF CAREER award, and several best paper awards from his computing research community. He was named MIT Technology Review TR35 Innovator of the Year. Kevin also holds a certificate of achievement in artisanal bread making from the French Culinary Institute. About the WATCH series: Transforming todays trusted but untrustworthy cyberinfrastructure into one that can meet societys growing demands requires both technical advances and improved understanding of how people and organizations of many backgrounds perceive, decide to adopt, and actually use technology. WATCH aims to provide thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSFs Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and the Office of Cyberinfrastructure (OCI), and sponsored by the CISE Secure and Trustworthy Cyberspace (SaTC) Program. Talks will be recorded and made available over the Internet. Questions/comments about WATCH? Contact Keith Marzullo Thursday, November 15, 2012