DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home CIO Interviews

DigitalCIO Interviews Sumanth Naropanth, CEO, Deep Armor

DigitalCIO Bureau by DigitalCIO Bureau
January 8, 2024
in CIO Interviews, Tech News
0
DigitalCIO Interviews Sumanth Naropanth, CEO, Deep Armor
77
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Healthcare Industry is on the verge of major growth, besides the significant adoption of IoMT devices, SaMD and many more internet based advanced medical equipments. Needless to say that this industry is becoming a hot target for hackers, as it promises a quantum leap. Digital CIO bureau spoke to Sumanth Naropanth, CEO, Deep Armor to understand the growth, direction and challenges this healthcare cybersecurity industry is bound to face.

Q. 1: How big is the market for healthcare cyber security globally? Where does India stand in global scenario?

Sumanth Naropanth: Healthcare cybersecurity is poised to grow significantly over the next 3-5 years. This is because of two reasons:

1. Rapid digitalization in the medical device sector means that software and hardware systems now have access to patient and medical data a lot more than the previous years. Personal Health Information (PHI) and various other forms of personal information is now collected, stored, processed and accessed in new ways. While this offers a rich set of use cases and experiences, it also increases the risk of cyberattacks against such sensitive information. Many forms of medical devices are also used for drug administration and therapy, so cyberattacks against such systems may lead to lethal consequences.
2. Compliance and regulatory standards are more mature and advanced today. For example, the US Food & Drug Administration (FDA) very recently (in September 2023) announced a new final guidance for cybersecurity of medical devices. Similar standards and regulatory requirements exist in other countries as well. Medical device manufacturers (including Software as a Medical Device (SaMD) vendors) are required to mandatorily comply with these standards in order to sell their solutions to customers

The healthcare cybersecurity market is in infancy in India. We do not have as many med-tech industries as the western world, but this is changing as we speak. Deep Armor has worked with a handful of startups in the healthcare/medical device sector and has advised them on long-term strategies for cybersecurity for their devices. Our privacy laws and medical regulations are developing and maturing, but we have a long way to go. In August 2023, the Indian Parliament passed the Digital Personal Data Protection Act, which will have implications to vendors and device manufacturers who process medical/private information. This is a big step forward.

Q. 2: As healthcare data breaches are on the rise even though tough healthcare compliance & regulations are in place, how can healthcare data breaches be prevented?

Sumanth Naropanth: Cybersecurity for healthcare and medical devices require a defense-in-depth approach. Traditional approaches will no longer work, when you have modern technologies such as IoT/IoMT and cloud services being actively used in this industry.

For example, a very common misconception is that data in cloud is secure by default, which is not true. All cloud service providers explicitly say that cloud security is a shared responsibility, which means that their customers are responsible for the security IN the cloud, while the service provider is responsible for the security OF the cloud. Poor or insufficient security practices often lead to medical information theft, ransomware attacks (which are on the rise against hospitals, unfortunately — even leading to patient death), and loss of critical services.

” Deep Armor has worked with the US FDA closely and would be happy to work with the GoI and with private businesses to ensure high security standards of India’s IoMT and healthcare products.“

– Sumanth Naropanth, CEO, Deep Armor

 

A defense-in-depth approach should ensure that the product architecture, design, implementation, deployment and maintenance — all stages of the product lifecycle have cybersecurity embedded in them. Holistic and redundant security measures are required. An important aspect of cybersecurity planning is also response and disaster recovery. No industry or medical service provider should assume that they will not be hacked. They should be adequately prepared to respond in a timely and effective manner when an incident occurs.

Q. 3: Medical transcription service is one of the areas, where hackers are investing big time and forcing organizations to bear significant loss of reputation. How do you see it?

Sumanth Naropanth: Medical transcription business is very attractive target for cyber criminals. This is because such businesses collect, process and store a wealth of personal and patient-related information (PHI, PII and personal data). Such data can often be used to sell on the dark web, extortion and for other nefarious means. Medical transcription businesses are also usually small and mid-sized companies, without adequate know-how about cybersecurity. This makes them an easy target as well.

Modern services such as public cloud have, on the one hand, helped such MT companies to rapidly scale their businesses and offer a rich set of use cases to their customers. Unfortunately, if such systems are not designed and developed with security in mind, they are very likely to be breached. Cyberattacks against MT businesses can lead to very expensive legal implications and impact to the brand image.

Q. 4: Several significant data breaches have forced to strengthen the security posture of Internet of Medical Things (IoMT). Is this an area where future attacks will happen at higher scale, as it invites hackers at large?

Sumanth Naropanth: IoMT promises to offer capabilities that have never existed before. For example, use of digital insulin pumps and blood glucose monitors can eliminate the need for expense lab tests and visits to the hospital. While these solutions will improve the quality of medical services and eventually the quality of life, they have a dark side. Using the same example, if a hacker is able to get into an insulin pump, he/she may be able to inject a lethal dose of insulin to the user without their knowledge.

IoMT systems use the same underlying technologies that have been in use in the IoT industry — use of small microcontrollers, wireless technologies such as Bluetooth/BLE/Zigbee/Z-Wave, mobile applications and cloud services. All these building blocks of IoT systems have known weaknesses and can be difficult to design securely. While some IoT systems may be viewed as luxury or optional (for example, smartwatches, home automation, etc.), IoMT systems are mission critical. They CANNOT fail, especially when patient safety is at stake. Therefore, such attacks are also likely to become high-profile and expensive — attracting cyber criminals to dig more into these systems.

Q. 5: How seriously GoI should look at preparing strong healthcare cybersecurity regulations and what should be the major guidelines to follow?
Sumanth Naropanth: 1. The GoI should have a well-rounded process for auditing healthcare and medical devices that enter the market in India. In addition to functional audits, cybersecurity should play a key, mandatory role in approval of such devices. Such cybersecurity audits should include end-to-end product security assessments, ensuring that the manufacturer owns sufficient responsibility for the cybersecurity maintenance of the product throughout its life cycle, and is prepared to respond to security incidents when they occur.
2. The GoI should also look at the US FDA 510(k) Premarket and Post-Market guidance as examples of how healthcare and medical devices should be regulated. India needs its own cybersecurity standards for this sector.

Q. 6: Do today’s healthcare devices or IoMT devices need ‘Security by Design’ approach, while developed? Is that a tough one asked for?

Sumanth Naropanth: Yes. This is because while several other market technologies such as web and mobile apps are commoditized to a certain extent, IoT and IoMT systems are not. These solutions may take many different forms, shapes, form factors, use cases and deployment environments. An insulin pump may not have much in similar to a drug therapy machine in a hospital, but both run serious risks of cyberattacks and could lead to patient death. However, a fundamental “Security by Design” framework could be drafted, put into effect and regularly updated so that the cybersecurity principles could apply to all such IoMT systems. Such a framework should help in holistic understanding of the threat actors, trust boundaries, security objectives/non-objectives, vendor responsibilities and other topics.

Deep Armor has worked with the US FDA on such topics, and has successfully led many US-vendors in implementing a secure-by-design methodology for their products and clearing the 510(k) Cybersecurity audits. We would be happy to work with the GoI and with private businesses to ensure that India’s IoMT and healthcare products achieve and maintain a high security bar.

Share31Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Google completes acquisition of Wiz

by DigitalCIO Bureau
March 12, 2026
0
Google completes acquisition of Wiz

Google announced the completion of its acquisition of Wiz, a leading cloud and AI security platform headquartered in New York. Wiz will join Google Cloud and maintain its...

Read moreDetails

NTT DATA Named a ‘Best in Class’ Provider in Four PAC RADAR SAP Services 2026 Reports

by DigitalCIO Bureau
March 12, 2026
0
NTT DATA Named a ‘Best in Class’ Provider in Four PAC RADAR SAP Services 2026 Reports

NTT DATA today announced it has been named a Best in Class provider by PAC across four reports in the PAC RADAR SAP Services 2026 assessment. The recognitions span SAP-Related...

Read moreDetails

Fractal unveils intelligent sales agents to accelerate B2B growth

by DigitalCIO Bureau
March 11, 2026
0
Fractal unveils intelligent sales agents to accelerate B2B growth

Flyfish.ai now deploys 35+ coordinated AI agents across the sales lifecycle, helping early enterprise adopters close deals up to 30% faster and improve sales productivity by 42%. Fractal...

Read moreDetails

TCS Named a Leader in Artificial Intelligence and Generative AI Services by Everest Group

by DigitalCIO Bureau
March 11, 2026
0
TCS Named a Leader in Artificial Intelligence and Generative AI Services by Everest Group

Cited as key strengths are Tata Consultancy Services platform-led AI transformation strategy, proprietary industry assets, and strong co-innovation with partners Tata Consultancy Services (TCS), has been positioned as...

Read moreDetails

SEI Engages IBM to Accelerate Enterprise Transformation Through Agentic AI

by DigitalCIO Bureau
March 10, 2026
0
SEI Engages IBM to Accelerate Enterprise Transformation Through Agentic AI

SEI announced it has joined forces with IBM IBM to accelerate enterprise transformation through agentic AI and automation and modernize how it operates, innovates, and delivers value to clients—reinforcing...

Read moreDetails
Next Post
Huawei Releases Data Center 2030 Report

Asia-Pacific Data Centre Association Launches as Voice of Data Centre Operators in the Region

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Optiva named Telecom Market Disruptor by GlobalData

January 16, 2020
Schneider Electric Research Forecasts AI’s Impact On Energy Consumption

Schneider Electric Research Forecasts AI’s Impact On Energy Consumption

January 1, 2025

Poly Introduces G7500, a Meeting Room Solution Designed for Modern Indian Workplaces

September 5, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?