Grand Rounds
This speaker series consists of one-hour virtual lectures and panels on cybersecurity topics with application to medical device security and biomedical engineering. The goal is to introduce key concepts of cybersecurity science and engineering via distinguished academic speakers to the biomedical engineering and manufacturing communities. Topics covered include human factors for cybersecurity, trustworthy medical device software, security engineering for machine learning, cybersecurity of computer vision, threat modeling, software bills of materials, software safety, cybersecurity regulations, and the science of cybersecurity. This speaker series is an educational opportunity.
Seminars are held on every third Thursday of the month at 3pm Eastern Time
MAY 2026
About the Speaker:
Matthew Scholl was the Chief of the Computer Security Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). His responsibilities included Cryptographic Standards used by the US Government and the Nation as well as internationally by allies and NATO partners. He was also responsible for Cybersecurity Research and Development at NIST, as well as Cybersecurity Standards and Guidelines used for Federal Agency Security Programs. He led NIST participation with Cybersecurity National and Internationals Standards Development Organizations (SDOs) and associated conformance testing programs. Mr. Scholl has a Masters in Information Systems from the University Of Maryland and a Bachelors Degree from the University of Richmond and now is an independent consultant on cybersecurity issues and an ISO 17025 Technical Auditor.
APRIL 2026
Brain and Neural Implant Cybersecurity
ABOUT THE WEBINAR:
Brain and neural implant technologies are transforming healthcare and enabling new brain-computer interactions. As connectivity increases, so do cybersecurity risks affecting patient safety, data privacy, and device reliability. This webinar explores key threats, potential attack scenarios, and the need for proactive, collaborative approaches to secure these emerging technologies.
WHAT YOU WILL LEARN:
- How neural implants and brain-computer interfaces work
- Key cybersecurity risks affecting connected neural devices
- Realistic attack scenarios and their potential impact
- Challenges in protecting sensitive neural data
- Challenges in protecting sensitive neural data

.png?width=750&height=902&name=Archimedes_May21_event_socialrev%20(1).png)