Cybersecurity at ZEISS Medical Technology
Protecting your products and your data
As the digitalization of healthcare evolves, the landscape of cybersecurity threats is also evolving. Securely protecting products and data across the connected care environment is critical.
At ZEISS Medical Technology, just as innovation is part of our DNA, so is cybersecurity readiness. Through the ZEISS Cybersecurity and Data Privacy Governance Program, we manage security risks across the product lifecycle and monitor the digital landscape to protect the security of our products from emerging threats and vulnerabilities.
ZEISS Cybersecurity and Data Privacy Governance Program
Through the ZEISS Cybersecurity and Data Privacy Governance Program, our global team of data security experts is dedicated to protecting your products and your data.
Working proactively across our organization, and in close collaboration with our partners and customers, our security experts work to foster a culture of best practices, embedding “Secure by Design” and “Privacy by Design” principles and processes throughout the product lifecycle. They closely monitor the cybersecurity landscape for potential risks, vulnerabilities and threats, acting quickly to mitigate.
ZEISS Cybersecurity Experts
Behind every product is the ZEISS Cybersecurity Expert Team. Our global team of dedicated data security experts serve as trusted advisors across the organization, working closely with business and product management to integrate information security and data privacy within our products and across the product lifecycle.
The ZEISS Cybersecurity Team works in close collaboration with our developers and suppliers to enhance security in our products, monitoring the product lifecycle and cybersecurity landscape to address potential vulnerabilities and protect against threats.
The team provides guidance, governance and oversight of information security and data privacy, establishing policies, processes and procedures, and fostering a culture of best practices. Their expertise in secure product lifecycle development processes helps to ensure that our products adhere to quality standards and to prevent, detect and respond to cyber threats.
Our team of experts includes:
- Business Information Security Officers (BISO)
- Information Security Managers (ISM)
- Information Security Officers (ISO)
- Product Security Officers (PSOs)
- Security Engineers
- Cloud Security Specialists
- Data Privacy Experts
- Threat and Vulnerability Managers
360° Secure Product Lifecycle
Our products have security capabilities and controls built in, enabling our customers to safely deploy, operate and manage compliance to standards and regulations such as, HIPAA, GDPR and ISO 27001 within their respective environments.
Our products are designed, tested, and maintained based on industry standards and best practices to manage the security risks of our products across the product lifecycle.
By establishing and implementing a 360° cybersecurity risk management process across our products, we can identify, assess, mitigate and effectively manage security risks against the evolving cybersecurity threat landscape in a timely and consistent manner.
ZEISS Cybersecurity FAQs
-
Yes. Our ZEISS Cybersecurity and Data Privacy Governance Program is designed to support and protect our products and services, ensuring the confidentiality, integrity, and availability of our customers’ data and systems. Through our ZEISS Cybersecurity and Data Privacy Governance Program, our dedicated team of security experts work across the organization to integrate information security and data privacy within our products and across the product lifecycle. They provide guidance, governance and oversight, establishing policies, processes and procedures to ensure our products adhere to quality standards, and to prevent, detect and respond to cyber threats.
-
Yes. We review of our policies and procedures regularly and update them, as needed.
-
Yes. We have a vendor management program in place which includes a thorough evaluation of third-party vendors’ cybersecurity practices before engagement. We assess their security controls, conduct audits, and require their adherence to our cybersecurity policies.
-
We utilize a risk assessment framework that considers the potential impact and likelihood of various cybersecurity risks. This helps prioritize and allocate resources effectively to address the most critical risks first. We also stay up to date on emerging threats and vulnerabilities to ensure our risk assessments are comprehensive.
-
Yes. Threat modeling is required and is performed per process.