Redesigning Trust: A Service Design Concept for Cybersecurity traning in Connected Medical Devices

A service-design driven investigation and design addressing medical device cybersecurity

training across stakeholders in the connected medical device lifecycle.

COMPANY

EU project NEMECYS/

EXPERTISE

UX/Service Design

YEAR

2023-2025

METHODOLOGIES

Mapping the neighbourhood

The hidden relationships

A sense of contrast

Desk audit on:

Topic background & exploration on existing CMD lifecycle management process and effective cybersecurity in this process

2

3

4

5

6

7

8

Literature review on existing regulations on cybersecurity compliance

Synthesis to identify problems and inform design opportunities and hypothesis

User research

?

Research

Interpret

Ideate

Develop/Pilot

First Design hypothesis-a improved scenario

Exploration of underlying concepts to support the design proposal

Case studies based on design proposal to develop new service concept


Design brief: System assets of the final service concept

?

What practices and strategies,or behavioural patterns can be readapted or improved to apply in the new design scenario?

What are the problems identified in top priority and the design opportunities?

?

what are the current CMD Cybersecurity challenges during the lifecycle and its management process?

1

PRELIMINARY RESEARCH

How I crafted the whole research phases


To proceed with the preliminary research, I have compiled some major domain-specific guidelines, standards, and best practices, along with the feedback from stakeholder workshops, to draft a medical device cybersecurity management lifecycle.

Three majors focus area was digged into:

From the preliminary research,

· Background of medical device cybersecurity

· A comprehensive view of CMD cybersecurity compliance process, identified relevant SD assets, eg. stakeholder map

· A systematic review of current standards, guidelines and best practices applied to CMD, in 29 the context of cybersecurity lifecycle management

THE UNMET CHALLENGES

Compliance in CMDs Cybersecurity


By consolidating and analysing the secondary research completed in the previous three sections, I have initially uncovered the following vulnerabilities and problems in existing regulations, guidelines and best practices, standards, which will potentially lead to issues regarding of cybersecurity regulatory compliance process in CMDs.

Uniformity and harmonization

The lack of uniformity and harmonization in existing regulations, standards, guidelines and best practices is one of the challenges faced by medical device manufacturers when it comes to figuring out what regulations apply to their devices.

Sharing responsibility among primary stakeholders

While the majority of guidelines and best practices recogniSe that cybersecurity is a collective responsibility among all stakeholders involved, half of the publications that are identified in this project have primarily only emphasiSe the actions required from medical device manufacturers.

USER RESEARCH



1. Gather in-depth insights from key stakeholders(CMD manufacture, integrator, operator) regarding CMD cybersecurity lifecycle management work and communication issues.

2. Engage stakeholders in a collaborative setting for a deeper understanding and exploration of practical needs, improvements and potential resolutions.

Semi-structured survey

Focusing on 3 pillars

>Approaches on CMD cybersecurity
>Cybersecurity awareness

>Compliance issues

3 CMD manufacturers

2 CMD integrators

4 CMD operators

Pre-workshop survey and workshops

Across 4 countries with over 40

participants including all three primary stakeholder groups

The workshops followed 3 stages:

>Create a shared understanding
>Defining problem statements

>Future scenario exploitation


RESEARCH SYNTHESIS

Although a large amount of quantitative data emerged during the survey, I highlight the qualitative data to showcase the most condensed insights from the entire research phase.


A thorough thematic analysis has been employed to examine qualitative data, which encompasses information pertaining to opinions, thoughts, feelings, and other descriptive details. The main themes I distilled and summarised in this were the following: • • • Existing work flow on cybersecurity lifecycle management Challenges identified
Future recommendations

Synthesised results pulling off the research objectives

Extracted insights from the interviews and workshops

RESHAPING VAGUE CHALLENGES

After extensive studies, both through desk research and user research, I have successfully identified the most critical and significant challenges that medical device cybersecurity is now facing. The figures below illustrate that these challenges are not only crucial but also demand prompt attention and strategic solutions.

Rapid changes in
regulations

The driving forces


/Rapid technological advancements with limited cybersecurity resources and expertise


/Emerging malicious actors (hackers) and evolving threat landscape


/A reactive approach is costly in development, infrastructure, and documentation efforts, without providing any visible benefits or added value to customers.



Fragmented dialogue
within healthcare
personnel

The driving forces


/Static nature of regulations and challenges


/Coordination and enforcement Challenges


/Cumbersome processes and information dissemination


/Lack of interoperability and data siloses


Cybersecurity awareness
and training

The driving forces


/Rapid technological advancements and complexity


/Diversity in personnel backgrounds and literacy levels


/Disconnection between technological advancements and inherent understanding

Flexibility in monitoring and responding incidents

The driving forces


/Increasing need for additional personnel to manage monetary costs.


/Demand for more complex data infrastructure and cloud computing solutions.


/The rise of automated and self-monitored systems.


/Growing requirement for processes that enable the exercise of the right to data erasure.

SEEKING THE OPPORTUNITIES-RESOURCE REALLOCATION

Following the initial research, I extracted key insights to identify potential design opportunities. The extraction of these opportunities was grounded in the previously mapped CMD cybersecurity management life cycle, and the interaction flow among the three primary stakeholder groups.


Then an evaluation of the desirability, feasibility and viability of identified user research-based high-level opportunities was conducted.


From where I mapped out the opportunities that implied an integration in responsibilities, static information, and incident response:


Interpersonnel communication

The most significant of these problems is a recognised lack of engagement with healthcare personnel, which is critical to the proper deployment of cybersecurity measures.

Educational
significance

Furthermore, the need to increase cybersecurity knowledge and training stands out, emphasising the critical role of education in bolstering defences against emerging threats.

Incident
response

The requirement for more flexibility in monitoring and responding utilising scenario-based approaches emerges as a critical goal for guaranteeing adaptation in the face of changing cybersecurity landscapes.

HOW MIGHT WE…?

Lifecycle-Design

-How might we enhance communication and shared responsibility with integrators and operators during the integration and operation phase? -How might we foster collaboration among stakeholders to improve risk response in the CMD lifecycle? -How might we increase cybersecurity awareness among manufacturers, integrators, and operators involved in device deployment? -How might we create a culture of open dialogue and transparency in addressing risks during integration and operation?

Lifecycle-Integration

-How might we collaborate more effectively with manufacturers and other stakeholders on cybersecurity awareness? -How might we streamline processes for addressing cybersecurity risks during integration and operation? -How might we encourage proactive discussions on risk management during the CMD lifecycle? -How might we empower integrators and operators to take an active role in cybersecurity measures?

Lifecycle-CMD End-user

-How might we increase awareness of cybersecurity protocols and best practices among end-users? -How might we empower end-users to play a proactive role in ensuring device security during operation? -How might we promote a sense of shared responsibility for cybersecurity among all stakeholders in the CMD lifecycle?

INITIAL DESIGN HYPOTHESIS TO UNCOVER UNDERLYING CONCEPT

Problem definition

Who:

CMD manufacturers, integrators, operators


What:

In CMD lifecycle design, integration and operation phases, there is lack of dialogue and shared responsibility with involved stakeholder (manufacturers, integrator and operators) in monitoring and responsing incident, and cybersecurity awareness and training, which will cause the neglect of some necessary co-operation and sharing, allocation of resources.


When:

Primarily in all situations that encompass the three fundamental CMD lifecycles.

Design hypothesis

What:

Promote a platform with information sharing and cybersecurity training for The targeted stakeholders : CMD manufacturers, integrators, operators .(Which are recognised as "users" in this project)


Who:

CMD manufactures, integrators, operators, CMD end-users


When:

During the CMD cybersecurity lifecycle management process, the primary focus is on the design, integration, and operation phases.

From the design hypothesis

to uncover underlying concepts

With further academic research, I have summarised the incremental behavioural model for cybersecurity training and awareness as follows: the first stage involves acquiring knowledge, followed by the second phase where capabilities built up, and ultimately, cybersecurity awareness is strengthened. As shown in the first image.

In the second image, incorporating prior research and potential design prospects, the design proposal I am presenting asserts that cybersecurity training should be included into every stage of the CMD cybersecurity lifecycle management process within the scope of my project.

A self-reflection framework to inform design proposal

By integrating the research findings with the initial design hypotheses, I have developed a framework to inform the final design concept.

Information sharing assists in detecting potential facilitates emergency preparedness by supporting rapid dissemination of information concerning imminent natural or man-made threats or response . (Brown, 2015). Through an examination and amalgamation of the risk-management framework put forth by the NIST, I have discerned the ways in which information sharing will contribute to the cybersecurity training and awareness system.

THE FINAL SERVICE DESIGN ASSETS


Case studies:

By investigating and conducting a general research inquiry into exemplary cases within the realm of CMD cybersecurity information-sharing and training platforms or services. Three main pillars were explicitly discovered, which include:

· Scenario-based training

· Game exercises

· Online academy/repository

The service offering model


/What :

A scenario-based training and respond platform for multi- stakeholders during the CMD lifecycle management process

/Who:

CMD manufacturers, integrators and operators (as well as other indirectly involved stakeholers)

/When and where:

Existed in the three essential CMD lifecycle phases (design, integration and operation) of CMD cybersecurity lifecycle management process, within the relevant organisations.

Service overview

Scesta is an online platform designed to enhance the capabilities and collaboration among medical device manufacturers, integrators, and operators in the realm of Connected Medical Device (CMD) cybersecurity lifecycle management.

This service leverages a scenario-based training and response system to empower stakeholders, focusing on three key pillars.

Live-Wiki for knowledge acquisition

Features


/Aggregate existing CMD cybersecurity information from reputable sources.

/Enable real-time updates and contributions from stakeholders.


/Categorize information for easy navigation and understanding.


Digital platform functionalities


/Static and incident-specific information

/Contribute to Cross-functional interaction pattern

/Behaviour/tasks matrix

/CMD Lifecycle overview

/Incident/threat sizing


Scenario base for capacity building

Features


/Respond questions of Other Scenarios:

/Complete Exercises (Select and input task-resource and skills): Designed exercises that based on real-world CMD cybersecurity lifecycle management scenarios created by other stakeholders

Digital platform functionalities


/LIVE WIKI assistance

/Create new scenarios

/Respond to scenarios by scenario-guiding questions

/Exercises in specific scenarios

/Task lists, resources/knowledge/

skills/tools repository

Performance reporting for strengthening awareness

Features


/Generate scenario response reports that highlight successful strategies and areas for improvement.


/Issue performance reports after completing exercises, showcasing proficiency in CMD lifecycle management.


/Utilize performance metrics to tailor personalized learning paths for stakeholders.


Digital platform functionalities


/Comparative analysis

/Weak factors

/Capacity Levels

/Vulnerability management

/Unsatisfactory and satisfactory


Service Blueprint



Service Prototypes





1. Gather in-depth insights from key stakeholders(CMD manufacture, integrator, operator) regarding CMD cybersecurity lifecycle management work and communication issues.

2. Engage stakeholders in a collaborative setting for a deeper understanding and exploration of practical needs, improvements and potential resolutions.

CONCLUSION AND FUTURE IMPROVEMENTS

Conclusion

This designed service explores the complexities of connected medical device (CMD) cybersecurity lifecycle management within the EU research project NEMECYS. Through both secondary and primary research, it examines the challenges faced by key stakeholders—manufacturers, integrators, and operators—in maintaining secure CMD ecosystems.


Early research revealed gaps in communication, shared responsibility, incident response, and cybersecurity awareness. These disconnects often lead to insufficient collaboration and poor allocation of resources across the lifecycle.


To address these issues, I developed an service concept which deliver an online, scenario-based training and response platform designed to strengthen cybersecurity knowledge, build capacity, and enhance awareness. The platform strengthens cross-stakeholder collaboration and supports more coordinated, effective responses to the evolving cybersecurity risks present in real healthcare environments.


Future improvements

/Exploring the integration of emerging technologies such as artificial intelligence, machine learning, or blockchain to enhance the platform's capabilities in adapting to new cybersecurity challenges in CMD lifecycle management and providing more dynamic and personalised scenarios.

/Conducting longitudinal studies to measure the long-term impact of the training platform on the CMD cybersecurity lifecycle management.

/Ensuring the platform's accessibility and inclusivity by considering different training styles, languages, and work backgrounds. This would enhance the effectiveness of the training for a diverse range of stakeholders.


Want to check out the whole thesis? Contact me via email directly!

Follow me on other channels