Рет қаралды 266
Cybersecurity is becoming a growing concern for medical devices. As these devices are designed to last over a decade, how do we ensure they remain safe in an ever-changing threat landscape?
In this insightful talk, Veronica Schmitt-also known as the "Log Genie"-shares her personal journey as both a cybersecurity expert and a patient with a life-sustaining medical device. With a PhD in medical device logging, Veronica takes us "through the looking glass" into the world of medical device cybersecurity, offering hope and practical solutions to these complex challenges.
Key takeaways:
Learn about the unique cybersecurity challenges in healthcare.
Discover how medical devices, designed to last up to 17 years, become vulnerable over time.
Explore diverse perspectives from hospitals, manufacturers, and patients on maintaining device security without compromising usability.
Don’t miss this eye-opening conversation that could change how we view cybersecurity in medical technology!
👉 Watch Now and Join the Conversation: Whether you're a cybersecurity enthusiast, healthcare professional, or a patient, this talk offers invaluable insights into the future of medical device security.
--
This session was a part of the SANS 3rd Annual Healthcare Forum 2024: Tackling Challenges, Building Cyber Resilience
Healthcare and medical organizations are increasingly becoming targets of cybersecurity attacks, especially ransomware-focused attacks. These incidents can severely disrupt daily operations, causing significant challenges and delays in providing healthcare services.
Join us for our 3rd annual SANS Healthcare Forum where we’re bringing together top cybersecurity experts and industry leaders to offer clear explanations and practical solutions for tackling cyber threats.
We’ll address key topics including, crisis management, risk management, medical device security and industrial control systems security.
Earn up to 4 CPE credits by attending this event.
www.sans.org/m...
SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.