What Really Happens When Hackers Attack Medical Devices
Michael Kijewski, CEO, MedCrypt
This session will review a hack on healthcare delivery organizations, with emphasis on medical devices as entry points. FDA guidance and evolution will then be reviewed to learn how medical devices are regulated. Closing with a live demo of a hacker attacking an HDO network and giving attendees a chance to interact with code that could be implemented on a device and how it works to ensure data integrity.Pre-Requisites: Basic understanding of how product security relates to a broader networked ecosystem.
Видео What Really Happens When Hackers Attack Medical Devices канала RSA Conference
This session will review a hack on healthcare delivery organizations, with emphasis on medical devices as entry points. FDA guidance and evolution will then be reviewed to learn how medical devices are regulated. Closing with a live demo of a hacker attacking an HDO network and giving attendees a chance to interact with code that could be implemented on a device and how it works to ensure data integrity.Pre-Requisites: Basic understanding of how product security relates to a broader networked ecosystem.
Видео What Really Happens When Hackers Attack Medical Devices канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
The Five Most Dangerous New Attack Techniques and How to Counter ThemSupply Chain Security in the Software EraHealthcare's Many Cybersecurity ChallengesHow Google Protects Its Corporate Security Perimeter without FirewallsHow to perform your Process Validation for medical devices? (IQ OQ PQ)Running an SQL Injection Attack - ComputerphileTricky Issues and Practical Guidance in Medical Device CybersecurityJames Lyne: Everyday cybercrime -- and what you can do about itBuffer Overflow Attack - ComputerphileHow Israel Rules The World Of Cyber Security | VICE on HBODesign Control for Medical Devices - Online introductory courseA View from the Front Lines of CybersecurityMedical Devices CybersecurityEllisys Bluetooth Video 7: Security Part 1A Cloud Security Architecture WorkshopThree Things the Security Industry Isn’t Talking About (but Should Be)Bloodborne Pathogens Safety TrainingThe Cryptographers’ Panel - 2017Weaponization of the InternetThe CyberSec Professional Viewpoint