04465nam 22007815 450 991103494730332120251024130445.03-032-07309-X10.1007/978-3-032-07309-9(MiAaPQ)EBC32375200(Au-PeEL)EBL32375200(CKB)41724154500041(DE-He213)978-3-032-07309-9(OCoLC)1547909115(EXLCZ)994172415450004120251024d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecuring a Connected Future IoT Cybersecurity & IP Security for Makers and Users of Medical Technology /by William Harding, Andreas Hartmann, Shayla O’Brien, Viktor Sinzig, Gabriel Break, Natalie Sinzig1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (174 pages)Biomedical and Life Sciences Series3-032-07308-1 1. Understanding the IoT Lifecycle and Associated Cybersecurity Risks -- 2. Cybersecurity Related to IP and Protection of Enterprise Value -- 3. Best Practices for Protecting IP & Ensuring the Security of Medical Devices -- 4. Device Security & Standards -- 5. Digitally Transforming Manufacturing Operations -- 6. Third-Party Acquisitions: Cybersecurity Risks and Mitigation -- 7. AI Risks to IP, IoT, and Product Management -- 8. Security Trends & The Evolving Digital Landscape -- 9. The Future of Cybersecurity in Medical Devices.This book demonstrates how robust cybersecurity measures are essential for protecting intellectual property. By intertwining these two critical areas, the authors aim to provide a unified framework that enhances the security and value of medical technology innovations. With those points in mind, the authors of this book explore the topics of cybersecurity and intellectual property (IP) within the scope of the Internet of Things (IoT) lifecycle, emphasizing medical technology, and providing readers with the knowledge to recognize vulnerabilities at each stage of the IoT and IP development lifecycle. This book thus enables organizations to proactively incorporate robust security measures into their design, development, and protection processes. The topics discussed in this book are (1) protecting sensitive data as it is created, transformed, and aggregated, (2) mitigating potential attacks, (3) the impacts of third-party acquisitions on security, (4) case studies that emphasize potential risks, (5) identification and management of vulnerabilities, and finally (6) examining emerging trends and opportunities associated with integrating new technologies, with an eye toward the future of cybersecurity. This is an essential resource for medical technology R&D leaders, medical technology manufacturing operations leaders, healthcare informaticists, and healthcare industry IP legal teams.Biomedical and Life Sciences SeriesBiomedical engineeringData protectionSecurity systemsBig dataDatabase managementArtificial intelligenceData processingBiomedical Devices and InstrumentationData and Information SecuritySecurity Science and TechnologyBig DataDatabase ManagementData ScienceBiomedical engineering.Data protection.Security systems.Big data.Database management.Artificial intelligenceData processing.Biomedical Devices and Instrumentation.Data and Information Security.Security Science and Technology.Big Data.Database Management.Data Science.610.28Harding William1019340Hartmann Andreas382785O'Brien Shayla1853161Sinzig Viktor1853162Break Gabriel1853163Sinzig Natalie1853164MiAaPQMiAaPQMiAaPQBOOK9911034947303321Securing a Connected Future4449210UNINA