Главная
Study mode:
on
1
Intro
2
My first security evaluation
3
The IT Tour
4
Security Breaches
5
Xray Disks
6
Medical Devices
7
Security in Healthcare
8
Unique to Healthcare
9
Healthcare Applications
10
Control by Software
11
Hacking a Fitbit
12
Hacking a Blood Pressure Monitor
13
Healthcare is dangerous
14
Medical Device
15
Backend Systems
16
Profiling
17
Isolation
18
Cloud Providers
19
Control Access
20
Authentication
21
Conclusion
Description:
Explore the unique challenges of healthcare IT security in this 21-minute conference talk from USENIX Enigma 2016. Delve into the complexities of securing medical data and devices in an environment where doctors, regulators, patients, and entrepreneurs all have different priorities and expectations. Learn about the risks associated with cloud-based health data, Internet-connected medical devices, and wearable technology. Discover real-world examples of security breaches, including hacked Fitbits and blood pressure monitors. Examine the dangers inherent in healthcare applications and the importance of proper control, authentication, and access management. Gain insights into potential solutions such as isolation techniques and specialized cloud providers. Understand why healthcare IT security requires a unique approach compared to other industries.

Hacking Health - Security in Healthcare IT Systems - USENIX Enigma 2016

USENIX Enigma Conference
Add to list
0:00 / 0:00