Economics of Medical Device Cybersecurity
Vidya Murthy, VP of Operations, MedCrypt
Pressed to share their big idea in less than 7 min, these experts will dive into the economics of medical device security, the opaque usage of DNA data collected during Covid testing, and address how social engineering was changed during the pandemic. After each big idea, the audience will have 5 min of moderated Q&A to dig deeper.
https://www.rsaconference.com/library/Presentation/USA/2021/pandemicperil3expertsunpackchallengesfacedinhealthcaresecurity
Видео Economics of Medical Device Cybersecurity канала RSA Conference
Pressed to share their big idea in less than 7 min, these experts will dive into the economics of medical device security, the opaque usage of DNA data collected during Covid testing, and address how social engineering was changed during the pandemic. After each big idea, the audience will have 5 min of moderated Q&A to dig deeper.
https://www.rsaconference.com/library/Presentation/USA/2021/pandemicperil3expertsunpackchallengesfacedinhealthcaresecurity
Видео Economics of Medical Device Cybersecurity канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![SSL, TLS, HTTP, HTTPS Explained](https://i.ytimg.com/vi/hExRDVZHhig/default.jpg)
![Inside Russia’s Hacker Underworld](https://i.ytimg.com/vi/GWKB2AeUR04/default.jpg)
![Reality Check: The Story of Cybersecurity](https://i.ytimg.com/vi/AjU6K39x75U/default.jpg)
![Global chip shortage: How microchips became one of the worlds most precious resources](https://i.ytimg.com/vi/vIcDqs5GLNw/default.jpg)
![Meet a 12-year-old hacker and cyber security expert](https://i.ytimg.com/vi/7TpsYofbAPA/default.jpg)
![How Israel Rules The World Of Cyber Security | VICE on HBO](https://i.ytimg.com/vi/ca-C3voZwpM/default.jpg)
![How to Speak](https://i.ytimg.com/vi/Unzc731iCUY/default.jpg)
![How to Make Sense of Cybersecurity Frameworks](https://i.ytimg.com/vi/dt2IqidgpS4/default.jpg)
![Quick Look: Bringing Zero Trust to Industrial Control Systems](https://i.ytimg.com/vi/eeODd6Bt0r8/default.jpg)
![Webcast: Challenges, Burnout and the Future of Cybersecurity](https://i.ytimg.com/vi/f4JISRps7Ac/default.jpg)
![No More Firewalls! How Zero-Trust Networks Are Reshaping Cybersecurity](https://i.ytimg.com/vi/pyyd_OXHucI/default.jpg)
![Basic Skills for Computer Jobs - What you should know about IT Basics](https://i.ytimg.com/vi/tRUKUqyQUXQ/default.jpg)
![Cyber Security in Healthcare](https://i.ytimg.com/vi/ybytf2ciuCc/default.jpg)
![The Five Most Dangerous New Attack Techniques and How to Counter Them](https://i.ytimg.com/vi/sibeN4U1fOg/default.jpg)
![A View from the Front Lines of Cybersecurity](https://i.ytimg.com/vi/7EH7ehAY3_w/default.jpg)
![Insights from NSA’s Cybersecurity Threat Operations Center](https://i.ytimg.com/vi/C7hHSdp6JhI/default.jpg)
![Quick Look: AI: Legal and Policy Considerations and Landmines to Avoid](https://i.ytimg.com/vi/mPtQ6iSbC6g/default.jpg)
![Day in the Life of a Cybersecurity Student](https://i.ytimg.com/vi/VxRX2u0Bk2g/default.jpg)
![The Five Most Dangerous New Attack Techniques, and What's Coming Next](https://i.ytimg.com/vi/aoIPIIB4xlA/default.jpg)
![Peek into the Future: The Security Operations Center of 2020](https://i.ytimg.com/vi/U7UBQ4-2MR4/default.jpg)