Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Medical Device Security - From Detection to Compromise

via YouTube

Overview

Explore medical device security vulnerabilities and potential attack vectors in this 49-minute conference talk from BSides San Francisco 2015. Delve into the personal and professional impacts of security breaches, initial findings from Shodan searches, and healthcare organization discoveries. Learn about various potential attacks, including physical, phishing, and pivot methods. Examine the role of application security and technical properties in medical device vulnerabilities. Gain insights into problem awareness and current state assessments, concluding with recommendations for improving medical device security practices.

Syllabus

Intro
Personal Impact
Professional Impact
What We Are Doing
Shodan Search Initial Findings
Initial Healthcare Organization Discovery
Why Does This Matter?
Getting A Little Warmer!
Summary Of Devices Inside Organization
Potential Attacks - Physical
Potential Attacks - Phishing
Potential Attacks - Pivot
Is AppSec A Problem?
Technical Properties
Problem Awareness
Continue As-ls Summary of Current State
A Better Way

Reviews

Start your review of Medical Device Security - From Detection to Compromise

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.