Why Standard IT Security Fails: Securing Cyber-Physical Systems

Why Standard IT Security Fails: Securing Cyber-Physical Systems

Tuesday, March 10, 2026 11:40 AM to 12:00 PM · 20 min. (US/Pacific)
Cybersecurity Command Center | Level 1 | The Park (Hall G) | Booth 10001
Cybersecurity Command Center
Cybersecurity

Information

For decades, Operational Technology (OT) and medical devices lived in isolation. Today, hyper-connectivity has introduced cyber-physical systems (CPS) that leave hospitals exposed, yet many still protect connected infrastructure using tools designed for laptops. Standard IT scanning can break fragile IoMT devices, and a "reboot to patch" error can directly impact patient care.

Join us to learn why CPS requires a dedicated security approach prioritizing availability without compromising safety. We will discuss bridging the gap between biomed, facilities, and security teams to maintain uptime and compliance.

Learn:
Why standard IT scans fail to protect fragile OT/IoMT assets.
The difference between CIA (IT) and AIC (CPS) priority models.
Strategies to align facility and security teams on shared risk.

Target Audience
Clinical Engineering Professional
Format
20-Minute Show Floor Session
Session #
CS04

Log in

See all the content and easy-to-use features by logging in or registering!