Cyber Survivor
Podcast Description
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
Podcast Insights
Content Themes
The show primarily focuses on healthcare cybersecurity, resilience in the face of cyber threats, and innovative practices. Episodes cover topics like ransomware recovery, effective incident response planning, and the importance of communication during security breaches, while showcasing real-world insights from experts in the field.

Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
A hospital room can hold 10 to 20 networked devices, each vital to care—and each a potential doorway for attackers. We sit down with Phil Englert, VP of Medical Device Security at Health ISAC, to explore how connected care improves outcomes while reshaping risk, and why building resilience and rapid recovery plans is now as critical as prevention.
Phil traces the evolution from clinician-driven data sharing to an era where massive datasets attract criminal interest. We dig into the Patch Act’s new authority for the FDA, how SBOMs change accountability, and what secure-by-design looks like for both embedded systems and devices running full operating systems. The conversation gets practical: segment where you can, monitor where you must, and treat cyber as a failure mode. That mindset leads to faster restorations—ghosted drives ready to swap, configs backed up, and downtime measured in hours rather than weeks.
We also pull back the curtain on Health ISAC’s member-led workstreams: aligning manufacturers and providers on a concise set of priority controls, creating shared security metrics that resonate from boardroom to engineering, and running joint tabletop exercises to close response gaps. Beyond the hospital, we examine AI-enabled diagnostics and the rise of hospital-at-home, where patient-owned tech can’t be trusted as a control point and multilingual, culturally aware resources become essential for scale. Throughout, we tackle tough questions—why attackers target data over device manipulation, whether paying ransom actually speeds recovery, and how to keep care moving when the EHR or network goes dark.
If you care about medical device security, healthcare cybersecurity, ransomware resilience, or the future of connected care, this conversation offers clear takeaways and next steps. Listen, share with your team, and help raise the floor across healthcare. Subscribe, leave a review, and tell us: what control would you prioritize first?

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.