Founders Who Finish

Build Cyber Resilience Before You Need It

Back to Field Notes
May 2, 2026 Founders Who Finish

Stryker reported Q1 2026 results on April 30 with three weeks of operational disruption from a March cyber incident absorbed into the numbers. Sales missed analyst estimates by roughly $320 million, adjusted EPS missed by $0.38, and Mako installations posted a record Q1 anyway. One week earlier, Medtronic disclosed and contained a separate cyberattack with no operational impact, supported by an architectural separation between corporate IT and product systems that limited the blast radius. The two reports together describe a connected medtech environment in which cyber resilience has moved from an IT line item to a strategic-grade operating decision, and the surgical robotics founders who finish in this environment will be the ones who built the resilience early when nobody was asking about it.

If You Are Building a Company in This Environment

The default first-time surgical robotics founder treats cybersecurity, network architecture, and incident-response readiness as work that comes after the device works. The internal logic is that the company has finite engineering capacity, the cleared device is the gating milestone, and the security and resilience work can be retrofitted once there is something for an attacker to actually target. Most founders make that call without thinking about it. The plan looks responsible because it concentrates engineering effort on the device that produces clearance, and the security work feels like the kind of activity that can be staffed up later when the company has the cash and the reason.

That plan is wrong for surgical robotics and connected interventional devices in 2026. The Stryker and Medtronic incidents bracket the situation cleanly. Stryker absorbed roughly three weeks of operational disruption, lost roughly $320 million in expected Q1 revenue, and recovered the customer relationships through what Lobo called fast threat removal and successful backup recovery. Medtronic absorbed a parallel attack with no operational impact because the corporate IT environment was architecturally separated from product, manufacturing, and distribution systems. The architectural decision that produced the Medtronic outcome was made years before the incident, by people who were not under attack at the time and who had to choose to do the harder work when nothing was on fire.

The retrofit version of that work is far more expensive and far less effective. Pulling apart a corporate and operational network architecture after the company has scaled is an 18 to 24 month engineering program with significant risk to existing operations, and it cannot be completed during an active incident. The founder who deferred the architectural separation work until after first clearance discovers in the middle of the first major hospital deployment that the operational and corporate environments are entangled in ways that make a serious cyber incident a multi-week shutdown rather than a contained event. The cost of doing the work late is paid in revenue, customer trust, and capital plan compression, and it is much larger than the cost of doing the work early.

The Pattern That Costs Surgical Robotics Founders the Resilience They Will Need

The pattern that breaks first-time surgical robotics founders on operational resilience is treating the security, network architecture, and incident-response work as a category that can be staffed reactively. The pattern produces a predictable timeline. The company ships the cleared device, lands the first hospital deployments, raises the next round on the strength of the commercial traction, and then receives the first round of hospital procurement diligence questions about cybersecurity posture. The diligence questions arrive with a level of specificity that exposes the gap between the actual security architecture and the architecture that hospital and investor counterparties now expect. The company spends the next 12 to 18 months trying to retrofit the resilience posture, and the next round of capital is partially consumed paying for work that should have been done from Day 1.

The cost shows up in two specific places. The first is hospital procurement velocity. Hospital IT and procurement committees are now asking suppliers about network segmentation, incident-response runbooks, recovery time objectives, and the demonstrated separation between corporate and operational systems. A surgical robotics company that does not have credible answers to those questions stalls in evaluation while competitors with better-built resilience postures advance. The second is investor diligence at the next round. Late-stage and strategic investors are now graduating cybersecurity-readiness from a checklist item into a category that competes for credit alongside clinical evidence, regulatory clearance velocity, and reimbursement strategy.

The companies that finish in this environment do the opposite. They treat cyber resilience as a Day-1 architectural decision, fund it as a capital line item, and protect it during the busy quarters when the obvious operational pressure is on the device clearance. The work is harder during the run-up to first commercial launch, and it is what gives the company the resilience posture the next hospital deployment and the next investor diligence cycle will require.

What Resilience Discipline Looks Like at Operating Scale

The companies that win on operational resilience in connected medtech do specific work that is easy to defer and expensive to skip. They build the corporate and operational network environments as separate domains from initial product architecture, with explicit boundary controls and documented data flows between them. They write and rehearse the incident-response runbooks before there is an incident, including the decision trees for when to take systems offline, how to communicate with hospital customers during a disruption, and how to coordinate with the salesforce and the executive team. They invest in supply-chain resilience for the components and services that would be most disruptive if a vendor experienced an incident, including documented recovery paths for cloud-hosted device-management systems, telemetry pipelines, and software update infrastructure.

At the operating level, this discipline shows up as a security and resilience function that has senior-leadership ownership and operating-cadence visibility, not a single security engineer reporting into the CTO with a quarterly review. The function is staffed for the architectural work that prevents incidents from becoming multi-week outages, and it is funded as a percentage of R&D rather than as a residual line on the IT budget. The cadence includes regular tabletop exercises with executive participation, regular review of the recovery time objectives for the operational systems, and regular audit of the separation between corporate and operational network domains.

The Stryker and Medtronic outcomes demonstrate what the discipline produces when it is sustained through scale and tested by an actual incident. Founders building surgical robotics platforms that are still treating cyber resilience as a compliance category should be moving it onto the same critical path as the device development and the regulatory program, with the same operational ownership and the same capital prioritization. The work is invisible until it is tested, and then it determines whether the company recovers in days, recovers in weeks, or does not recover at all.

The Five Questions for the Surgical Robotics Resilience Founder

The five-question framework in Founders Who Finish reframes what operational resilience actually requires the team to deliver, and where the operational risk concentrates.

Question 1

What are you actually finishing?

If the answer is a cleared device, the company is finishing the part of the platform that sits inside the hospital and ignoring the part that determines whether the platform stays operational when an attacker hits the corporate IT environment. The cleared device with a documented architectural separation between operational and corporate systems, an incident-response posture that has been tested, and a recovery time objective that hospital IT can underwrite is the actual completion state. Founders who finish are running the resilience track in parallel with the device track, not after.

Question 2

Who decides you are done?

The hospital IT security committee evaluating the platform decides, alongside the procurement committee. The IT committee does not approve a connected device whose vendor cannot demonstrate network segmentation, incident-response readiness, and recovery time commitments. Founders who finish have been engaging the hospital IT counterparties in parallel with procurement and clinical for years before the first deployment, and they have been showing those committees the security architecture as it matures.

Question 3

What does your evidence actually prove?

Device clearance evidence proves the device is safe and effective. Resilience evidence proves the platform stays operational when the corporate IT environment is under attack, that the customer-facing systems remain available when an upstream vendor has an incident, and that the company can recover documented backups inside the recovery time objective the hospital expects. Founders who finish design the resilience evidence base, including the tabletop exercises, the recovery drills, and the architectural documentation, on the same cadence as the clinical evidence.

Question 4

What does your path to reimbursement look like?

The reimbursement strategy for a connected surgical robotics platform now includes the IT and security diligence that hospital systems run before they commit to multi-year capital purchases. A platform whose vendor cannot demonstrate the resilience posture the hospital IT environment requires is not going to land the procurement decision regardless of the procedure economics. Founders who finish run a commercial program that treats the hospital IT and security stakeholders as primary counterparties, not as a downstream sign-off.

Question 5

What does the finish line look like to a strategic acquirer?

Strategic acquirers of surgical robotics platforms now pay premiums for systems with cleanly separated corporate and operational network architectures, demonstrated incident-response postures, and documented recovery time objectives that hospital IT counterparties have already underwritten. They pay much smaller premiums for platforms whose resilience posture is unproven and whose architecture would require a multi-year retrofit to meet enterprise-grade hospital IT standards. Founders who finish are positioning their companies to land in the first category, and the architectural work that produces that positioning is the resilience discipline that needs to be embedded in the company from years before scale.

Founders Who Finish

The guide for founders building in regulated markets

The five-question framework for building medical device, surgical robotics, and advanced interventional companies that finish what they start, in the regulatory and operational environment as it actually exists.

Get the Book