PodcastsRank #14362
Artwork for MedTech Speed to Data

MedTech Speed to Data

Key Tech
Share:
BusinessPodcastsScienceLife SciencesENunited-states
Rating unavailable
Speed-to-data determines go-to-market success for medical devices. You need to inform critical decisions with user data, technical demonstration data, and clinical data. We interview med tech leaders about the critical data-driven decisions they make during their product development projects.
Top 28.7% by pitch volume (Rank #14362 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
N/A
Episodes
45
Founded
N/A
Category
Business
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: Under 4K / month
Canonical: https://podpitch.com/podcasts/medtech-speed-to-data
Reply rate: Under 2%

Latest Episodes

Back to top

The Real Cost of Adding Cybersecurity Late in Medical Device Development : 44

Thu Jan 29 2026

Listen

Design for Security from the Start: Making Medical Device Cybersecurity More Resilient MedTech innovation is revolutionizing healthcare but is also introducing new cyberattack vectors that can put manufacturers, hospitals, and patients at risk. In Episode 44 of the MedTech Speed to Data Podcast, Key Tech VP of Business Development Andy Rogers and Senior Computer Engineer Jamie Kendall discuss the FDA’s latest cybersecurity guidance. Need to know Smart, connected devices have greater risks — Medical devices are emerging vectors for bad actors targeting the healthcare industry.FDA’s 2025 cybersecurity guidance update — The agency recommends risk-based development frameworks to make device cybersecurity more resilient.Clarifying “cyber devices” — The FDA’s guidance applies to any medical device that runs software and could connect to the Internet.The nitty-gritty “Cybersecurity was always baked into our process,” Jaime explains. More specifically, Key Tech has adapted the TIR57 risk-based standard for managing medical device security to the new rules. “[The FDA’s] 2023 guidance really laid the groundwork for our latest process. We’ve tweaked it slightly with the [latest update]. There are more explicit documentation requirements around vulnerability monitoring and more details on the software bill of materials (SBOMs).” Jamie goes on to describe how Key Tech’s cybersecurity risk management plan informs product development. The security team starts by developing a threat model based on evaluations of data flows, data storage, and the cybersecurity activities protecting that data.  “One of the first things that we always do is a threat model. This is a visual model of the system to show the elements of the device, where data is flowing, and where your trust boundaries are. This is a one-page, digestible visual that everyone can look at, assess, and go ‘yep, that makes sense’ and then build your initial architecture and risk assessment based on that.” The security team documents the resulting security architectures using the FDA’s recommended views: Global System View: Describes how software integrates with hardware and networks and the associated cybersecurity mitigations.Multi-Patient Harm View: Identifies mitigations for vulnerabilities or failures that could compromise multiple devices and harm multiple patients.Updateability/Patchability View: Summarizes the end-to-end process for distributing software updates and patches, especially if manufacturers do not control the entire path.Security Use Case View: Documents scenarios in which vulnerabilities can compromise the device’s safety or effectiveness.“To give a sense of scale,” Jamie says, “this isn’t one or two documents. It’s a pretty large effort, and it’s one of those things that you want to start early in your development process.” Data that made the difference: Throughout his conversation with Andy, Jamie shares some of the lessons Key Tech has learned about designing secure medical devices, including: Design for security from the beginning. Late changes are expensive, especially once in pre-production or after your FDA submission.Avoid cyber rabbit holes. Rather than addressing every possible threat, use data and risk to prioritize the real threats.Don’t roll your own cybersecurity. Stick to standard practices, or you risk introducing unknown, novel vulnerabilities.Fully document your SBOMs. Standard libraries introduce layers of dependencies that you must understand. That’s the only way to control your exposure to new vulnerabilities.Design devices that are truly safe. Cybersecurity risks are real. Don’t treat compliance as a check box. Watch the whole conversation in the video below to learn more about designing for cybersecurity, the importance of third-party penetration testing, and more.

More

Design for Security from the Start: Making Medical Device Cybersecurity More Resilient MedTech innovation is revolutionizing healthcare but is also introducing new cyberattack vectors that can put manufacturers, hospitals, and patients at risk. In Episode 44 of the MedTech Speed to Data Podcast, Key Tech VP of Business Development Andy Rogers and Senior Computer Engineer Jamie Kendall discuss the FDA’s latest cybersecurity guidance. Need to know Smart, connected devices have greater risks — Medical devices are emerging vectors for bad actors targeting the healthcare industry.FDA’s 2025 cybersecurity guidance update — The agency recommends risk-based development frameworks to make device cybersecurity more resilient.Clarifying “cyber devices” — The FDA’s guidance applies to any medical device that runs software and could connect to the Internet.The nitty-gritty “Cybersecurity was always baked into our process,” Jaime explains. More specifically, Key Tech has adapted the TIR57 risk-based standard for managing medical device security to the new rules. “[The FDA’s] 2023 guidance really laid the groundwork for our latest process. We’ve tweaked it slightly with the [latest update]. There are more explicit documentation requirements around vulnerability monitoring and more details on the software bill of materials (SBOMs).” Jamie goes on to describe how Key Tech’s cybersecurity risk management plan informs product development. The security team starts by developing a threat model based on evaluations of data flows, data storage, and the cybersecurity activities protecting that data.  “One of the first things that we always do is a threat model. This is a visual model of the system to show the elements of the device, where data is flowing, and where your trust boundaries are. This is a one-page, digestible visual that everyone can look at, assess, and go ‘yep, that makes sense’ and then build your initial architecture and risk assessment based on that.” The security team documents the resulting security architectures using the FDA’s recommended views: Global System View: Describes how software integrates with hardware and networks and the associated cybersecurity mitigations.Multi-Patient Harm View: Identifies mitigations for vulnerabilities or failures that could compromise multiple devices and harm multiple patients.Updateability/Patchability View: Summarizes the end-to-end process for distributing software updates and patches, especially if manufacturers do not control the entire path.Security Use Case View: Documents scenarios in which vulnerabilities can compromise the device’s safety or effectiveness.“To give a sense of scale,” Jamie says, “this isn’t one or two documents. It’s a pretty large effort, and it’s one of those things that you want to start early in your development process.” Data that made the difference: Throughout his conversation with Andy, Jamie shares some of the lessons Key Tech has learned about designing secure medical devices, including: Design for security from the beginning. Late changes are expensive, especially once in pre-production or after your FDA submission.Avoid cyber rabbit holes. Rather than addressing every possible threat, use data and risk to prioritize the real threats.Don’t roll your own cybersecurity. Stick to standard practices, or you risk introducing unknown, novel vulnerabilities.Fully document your SBOMs. Standard libraries introduce layers of dependencies that you must understand. That’s the only way to control your exposure to new vulnerabilities.Design devices that are truly safe. Cybersecurity risks are real. Don’t treat compliance as a check box. Watch the whole conversation in the video below to learn more about designing for cybersecurity, the importance of third-party penetration testing, and more.

Key Metrics

Back to top
Pitches sent
23
From PodPitch users
Rank
#14362
Top 28.7% by pitch volume (Rank #14362 of 50,000)
Average rating
N/A
Ratings count may be unavailable
Reviews
N/A
Written reviews (when available)
Publish cadence
N/A
Episode count
45
Data updated
Feb 10, 2026
Social followers
694

Public Snapshot

Back to top
Country
United States
Language
English
Language (ISO)
Release cadence
N/A
Latest episode date
Thu Jan 29 2026

Audience & Outreach (Public)

Back to top
Audience range
Under 4K / month
Public band
Reply rate band
Under 2%
Public band
Response time band
1–2 days
Public band
Replies received
1–5
Public band

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
694
Contact available
Yes
Masked on public pages
Sponsors detected
No
Guest format
No

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
a***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch MedTech Speed to Data

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #14362 by pitch volume, with 23 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
Rating unavailable
RatingsN/A
Written reviewsN/A

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About MedTech Speed to Data

Back to top

What is MedTech Speed to Data about?

Speed-to-data determines go-to-market success for medical devices. You need to inform critical decisions with user data, technical demonstration data, and clinical data. We interview med tech leaders about the critical data-driven decisions they make during their product development projects.

How often does MedTech Speed to Data publish new episodes?

MedTech Speed to Data publishes on a variable schedule.

How many listeners does MedTech Speed to Data get?

PodPitch shows a public audience band (like "Under 4K / month"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch MedTech Speed to Data?

Use PodPitch to access verified outreach details and pitch recommendations for MedTech Speed to Data. Start at https://podpitch.com/try/1.

Which podcasts are similar to MedTech Speed to Data?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact MedTech Speed to Data?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.