Medical device security
|
|
|
- Stanley Simpson
- 10 years ago
- Views:
Transcription
1 Medical device security -- Anirudh Duggal Disclaimer: The views in the presentation are entirely my own and do not reflect the views of my employer.
2 Before we begin Thank you HITCON Specially thank the organizing team Jal, Pineapple, Turkey, Shanny, Shang and all the people whom I ve troubled till now
3 About me Senior Software Engineer at Philips health tech Sustainability enthusiast Interested in medical devices, IOT devices and hardened OS Part of Null community
4 Nullcon CFP is out!
5 Agenda What is a medical device? Range of medical devices Medical record value and breaches Challenges Besides challenges Hl7 messaging
6 What is a medical device? A medical device is an instrument, apparatus, implant, in vitro reagent, or similar or related article that is used to diagnose, prevent, or treat disease or other conditions, and does not achieve its purposes through chemical action within or on the body (which would make it a drug) -- wiki
7 Range of devices Cost: 5 2$ (50% off) Fits in pocket Cost: can reach up to 3 million $ Size: about the size of a truck (don t ask the weight ;) )
8 And the memory A simple DIY device A hospital data center
9 And. Patient monitors Insulin monitors Pacemakers Heart rate devices smart bands Home monitoring solutions
10 Rapid Innovation Everyone wants mobility (patient, doctors, nurses, clinicians) Diagnostics Big data analysis Information gathering
11 Why hospitals and medical devices? Easy targets Many entry points Good payoff Medical records
12 The impact of an attack Privacy Financial a medical record fetches 32x a credit card record Physical?
13
14 Lets take a case study
15
16 Analyzing a hospital scenario
17 A typical hospital scenario Other systems Other hospitals Doctor's PC / Secretary PC Patient monitors LAN / WIFI/ Bluetooth/ EMR (electronic medical record) Doctor's Mobile/ Nurse mobile
18 A typical patient monitor Other peripheral devices Lan / WiFI TCP / IP EMR Serial ports USB HL7
19 Diving into medical devices They have an OS (sometimes ) They have connectivity ( Fuzzers ;) ) They do have logical errors Protocols Compare the low end devices to IOT infrastructure Can crash / misbehave Known to have APT s discovered in them Trapx discovered a APT recently google
20 Potential entry points Wifi / Lan Serial ports USB - Firmware The sensors Keyboard / mouse Firewire Protocols
21 Challenges with these devices Patching Servicing Uptime Cost Longevity
22 Technical issues observed on the ground Lack of encryption between the devices Lack of skilled personnel
23 From a manufacturer perspective Support 10 years and counting! How do you define a device to be vulnerable? Security a joint exercise between hospitals and the vendors
24 From a hospital perspective If it works its all good Cybersecurity needs more investment and skilled individuals Vendors should take care of all security issues why will someone attack a hospital computer go hack NASA we are doctors, not cyber warriors
25 Hospitals need to understand Cybersecurity!= more money BUT Cybersecurity == better functioning Risks of a cyber attack Patching is a problem, but absolutely worth it Having IDS / IPS Say no to outdated infrastructure (this is changing rapidly )
26 Securing these devices Having a policy in place cybersecurity policy anyone? DO NOT CONNECT THESE DEVICES TO THE INTERNET unless intended Make sure the systems are patched Know your hospital ( public and private networks anyone? )
27 Policies / agencies in place FDA HIPAA
28
29 $100 to $50,000 per violation (or per record), with a maximum penalty of $1.5 million per year for violations of an identical provision
30 My opinion We need better regulations - now! Awareness A working group towards security (lets take things global too ) More research on the APT and exploits
31 What is HL7? Healthcare level standards Most popular in healthcare devices (HL7 2.x) Quite old designed in 1989 FHIR is the next gen
32 HL7 2.x Most popular HL7 version New messages / fields added
33 HL7 (only for v2 messaging and CDA) HL7
34 Things to know MSH message header segment defines the delimiters e.g. MSH ^~\& The primary delimiter is and sub delimiters in the order they are present after The standards define the message structure not the implementation
35 An HL7 message MSH ^~\& MegaReg XYZHospC SuperOE XYZImgCtr ADT^A01^ADT_A P 2.5 EVN PID ^^^UAReg^PI KLEINSAMPLE^BARRY^Q^JR M ^^HL70005^RA99113^^XYZ 260 GOODWIN CREST DRIVE^^BIRMINGHAM^AL^35209^^M~NICKELL S PICKLES^10000 W 100TH AVE^BIRMINGHAM^AL^35200^^O 0105I30001^^^99DEF^AN PV1 I W^389^1^UABH^^^^ ^MORGAN^REX^J^^^MD^0010^UAMC^L 67890^GRAINGER^LUCY^X^^^MD^0010^UAMC^L MED A ^POTT ER^SHERMAN^T^^^MD^0010^UAMC^L OBX 1 NM ^Body Height 1.80 m^meter^iso+ F OBX 2 NM ^Body Weight 79 kg^kilogram^iso+ F AL1 1 ^ASPIRIN DG ^CHEST PAIN, UNSPECIFIED^I9 A
36 MSH ^~\& MegaReg XYZHospC SuperOE XYZImgCtr ADT^A01^ADT_A P 2.5 EVN PID ^^^UAReg^PI KLEINSAMPLE^BARRY^Q^JR M ^^HL70005^RA99113^^XYZ 260 GOODWIN CREST DRIVE^^BIRMINGHAM^AL^35209^^M~NICKELL S PICKLES^10000 W 100TH AVE^BIRMINGHAM^AL^35200^^O 0105I30001^^^99DEF^AN PV1 I W^389^1^UABH^^^^ ^MORGAN^REX^J^^^MD^0010^UAMC^L 67890^GRAINGER^LUCY^X^^^MD^0010^UAMC^L MED A ^POTT ER^SHERMAN^T^^^MD^0010^UAMC^L OBX 1 NM ^Body Height 1.80 m^meter^iso+ F OBX 2 NM ^Body Weight 79 kg^kilogram^iso+ F AL1 1 ^ASPIRIN DG ^CHEST PAIN, UNSPECIFIED^I9 A
37 Message header information Message type / event type Patient identifier MSH ^~\& MegaReg XYZHospC SuperOE XYZImgCtr ADT^A01^ADT_A P 2.5 EVN PID ^^^UAReg^PI KLEINSAMPLE^BARRY^Q^JR M ^^HL70005^RA99113^^XYZ 260 GOODWIN CREST DRIVE^^BIRMINGHAM^AL^35209^^M~NICKELL S PICKLES^10000 W 100TH AVE^BIRMINGHAM^AL^35200^^O 0105I30001^^^99DEF^AN PV1 I W^389^1^UABH^^^^ ^MORGAN^REX^J^^^MD^0010^UAMC^L 67890^GRAINGER^LUCY^X^^^MD^0010^UAMC^L MED A ^POTT Patient name ER^SHERMAN^T^^^MD^0010^UAMC^L OBX 1 NM ^Body Height 1.80 m^meter^iso+ F OBX 2 NM ^Body Weight 79 kg^kilogram^iso+ F AL1 1 ^ASPIRIN DG ^CHEST PAIN, UNSPECIFIED^I9 A Physician name
38 MSH ^~\& MegaReg XYZHospC SuperOE XYZImgCtr ADT^A01^ADT_A P 2.5 EVN PID ^^^UAReg^PI KLEINSAMPLE^BARRY^Q^JR M ^^HL70005^RA99113^^XYZ 260 GOODWIN CREST DRIVE^^BIRMINGHAM^AL^35209^^M~NICKELL S PICKLES^10000 W 100TH AVE^BIRMINGHAM^AL^35200^^O 0105I30001^^^99DEF^AN PV1 I W^389^1^UABH^^^^ ^MORGAN^REX^J^^^MD^0010^UAMC^L 67890^GRAINGER^LUCY^X^^^MD^0010^UAMC^L MED A ^POTT ER^SHERMAN^T^^^MD^0010^UAMC^L OBX 1 NM ^Body Height 1.80 m^meter^iso+ F OBX 2 NM ^Body Weight 79 kg^kilogram^iso+ F Potential Entry Point AL1 1 ^ASPIRIN DG ^CHEST PAIN, UNSPECIFIED^I9 A
39 MSH ^~\& MegaReg XYZHospC SuperOE XYZImgCtr ADT^A01^ADT_A P 2.5 EVN PID ^^^UAReg^PI KLEINSAMPLE^BARRY^Q^JR M ^^HL70005^RA99113^^XYZ 260 GOODWIN CREST DRIVE^^BIRMINGHAM^AL^35209^^M~NICKELL S PICKLES^10000 W 100TH AVE^BIRMINGHAM^AL^35200^^O 0105I30001^^^99DEF^AN PV1 I W^389^1^UABH^^^^ ^MORGAN^REX^J^^^MD^0010^UAMC^L or my evil script MED A ^POTTER^SHERMAN^T^^^MD^0010^UAMC^L OBX 1 NM ^Body Height 1.80 m^meter^iso+ F OBX 2 NM ^Body Weight kg^kilogram^iso+ F AL1 1 ^ASPIRIN DG ^CHEST PAIN, UNSPECIFIED^I9 A
40 Time for a demo
41 Questions
42 Thank you! Minatee Mishra Ben Kokx Christopher Melo Sanjog Panda Ajay Pratap Singh Geethu Aravind Michael Mc Neil Shashank Shekhar Madhu Jiggyasu Sharma Pardhiv Reddy My uptown friends ;)
HL7 EHR to PowerSoftMD Visit Import Specifications
HL7 EHR to PowerSoftMD Visit Import Specifications Data Tec, Inc. www.powersoftmd.com 1 P a g e R e v M a y 2 0 1 3 Introduction HL7 EMR to PS Interface Specs PowerSoftMD uses HL7 2.3.1 specifications.
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
LIS Interfaces: Basics, Implementation and Pitfalls
A Review of Pathology Informatics LIS Interfaces: Basics, Implementation and Pitfalls James H. Harrison, Jr., M.D., Ph.D. Division of Biomedical Informatics Departments of Public Health Sciences and Pathology
Considerations for using the Web for Medical Device Applications
Considerations for using the Web for Medical Device Applications MEDS, San Diego August 23 rd, 2012 Daniel Sterling, President Who is Sterling? Your Partner in Medical Device Development What we do: o
20/20 Integration Guide
20/20 Integration Guide March 15 2013 A guide to Modality Work List and Spectacle-Link Overview Within medical imaging there are two common interfaces or integrations that most practices find helpful if
HL7 Interface Specification. HL7 Interface 1.2
Interface Specification Interface 1.2 May 2004 Interface 1.2 Specification TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Purpose...3 1.2 Related Documents...3 2 IMPLEMENTATION... 4 3 COMMUNICATION PROFILE...
AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES
AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES INTRODUCTION Cybersecurity has become an increasing concern in the medical device
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Notable Changes to NERC Reliability Standard CIP-010-3
C L AR I T Y AS S U R AN C E R E S U LT S M I D W E S T R E LIAB I L I T Y ORGAN I Z AT I ON Notable Changes to NERC Reliability Standard CIP-010-3 Cyber Security Configuration Change Management and Vulnerability
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
Medical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Introduction to Epic Bridges. Empowering Extraordinary Patient Care
Introduction to Epic Bridges Empowering Extraordinary Patient Care Your phone has been automatically muted. Please use the Q&A panel to ask questions during the presentation! Introduction Michael Botieri
HL7 Interface Specification Merge LabAccess v. 3.6
HL7 Interface Specification Merge LabAccess v. 3.6 Merge Healthcare 900 Walnut Ridge Drive Hartland, WI 53029 USA 877.44.MERGE 12 Merge Healthcare. The information contained herein is confidential and
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Running head: USING NESSUS AND NMAP TOOLS 1
Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:
The Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
HL7 & KMEHR. A comparison. Medical informatics AJ 2013/2014. Authors: Tessa Borloo Nele Pien
HL7 & KMEHR A comparison Medical informatics AJ 2013/2014 Authors: Tessa Borloo Nele Pien 2 Overview 1988 HL7 v2 2002 KMEHR 2004 HL7 v3 Introduction HL7 v2 KMEHR HL7 v3 Comparison Overview 3 Health care
NURSING INFORMATICS. Nikole L. Farmer, MSN, RN, PMP September 6, 2014
NURSING INFORMATICS Nikole L. Farmer, MSN, RN, PMP September 6, 2014 WHAT IS NI? Nursing Informatics (NI): Specialty that integrates nursing science, computer science, and information science to manage
Bring Your Own Internet of Things: BYO IoT
SESSION ID: CSV F02 Bring Your Own Internet of Things: BYO IoT Carsten Eiram Chief Research Officer Risk Based Security @carsteneiram Jake Kouns CISO Risk Based Security @jkouns Agenda What is IoT? What
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Web of Things Architecture
Web of Things Architecture 1. Introduction This document is an explanation about the architecture of Web Of Things (WoT). The purpose of this document is to provide (a) a guideline of the mapping between
Digital Pathways. Penetration Testing
Penetration Testing [email protected] Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro Background Liwei Ren Research interests Data security & privacy, network security Data compression, math modeling & algorithms
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.1 Part Number 1G0119 Version 1.0 Eastman Kodak Company, Health Group
Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008
Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE About the Author. Acknowledgments. Introduction. Chapter 1 Understanding the Threats. Quantifying the Threat.
What is Quantified Self (QS)?
Subtitle Title Content Quantified Self (QS) (Sensitive) Personal data Security risks QS Privacy risks QS Art. 29 Working Party (WP29) on QS WP29 on ehealth WP29 on Internet of Things (IoT) QS data at risk
Securing the Internet of Things WHITEPAPER
Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible
EHS Privacy and Information Security
EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System
HL7 Format and Electronic Sharing
HL7 Format and Electronic Sharing Mark Madrilejo ([email protected]) Application Engineer, network180, Member HIE Standards Committee and Working Subcommittees for CCD and Consent Management
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
UMA in Health Care: Providing Patient Control or Creating Chaos?
SESSION ID: IDY-F03 UMA in Health Care: Providing Patient Control or Creating Chaos? David Staggs JD, CISSP Technologist / IP Attorney Staggs PLLC UMA Value Proposition User Managed Access (UMA) brings
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
MEDICAL DEVICE Cybersecurity.
MEDICAL DEVICE Cybersecurity. 2 MEDICAL DEVICE CYBERSECURITY Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
D* SEE SAP DIR DIGITAL SIGNATURE LOG FOR APPROVER NAME AND DATE OF APPROVAL
Page 1 of 21 Version Sec, Pg, Para Changed Author(s): Philip Traynor & Christopher Keegan Description of Change Reason for Change Date Version Created Version Created By (initials) A N/A Initial Version
Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems
Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems SESSION ID: HTA-R01 Mariano Nunez CEO Onapsis Inc. @marianonunezdc Why Should We Care? Over 95% of the ERP systems analyzed were exposed
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab [email protected]
Building a Security Operations Center Randy Marchany VA Tech IT Security Office and Lab [email protected] CyberSecurity Operations Center Security Operations Center (SOC) term is being taken over by physical
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Cybersecurity Implications in the US Chemical Industry. Modernization and Greenfield Opportunities
Cybersecurity Implications in the US Chemical Industry Modernization and Greenfield Opportunities April 2015 Contents Section Slide Number Executive Summary 3 Research Scope, Objectives, Methodology, and
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro Background Liwei Ren Research interests Data security & privacy, network security analysis Data compression, math modeling &
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
GE Healthcare. MAC 2000 ECG Analysis System Streamlined for your hospital
GE Healthcare MAC 2000 ECG Analysis System Streamlined for your hospital smart. MAC 2000 Complex hospital environments demand simple solutions. Equipment that simply works, every time. Technology that
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Privacy, Security, and Trust with Federated Identity Management
Privacy, Security, and Trust with Federated Identity Management Dr. Hellmuth Broda Distinguished Director and European CTO, Sun Microsystems Spokesperson, Member of the Business Marketing Expert Group,
An Independent Member of Baker Tilly International
Healthcare Security and Compliance July 23, 2015 Presenters Kelley Miller, CISA, CISM - Principal [email protected] Barbie Thomas, MBA, CHC [email protected] 2 Agenda Introductions Cybersecurity
A method for handling multi-institutional HL7 data on Hadoop in the cloud
A method for handling multi-institutional HL7 data on Hadoop in the cloud { Masamichi Ishii *1, Yoshimasa Kawazoe *1, Akimichi Tatsukawa 2*, Kazuhiko Ohe *2 *1 Department of Planning, Information and Management,
IRON-HID: Create your own bad USB. Seunghun Han
IRON-HID: Create your own bad USB Seunghun Han Who am I? Security researcher at NSR (National Security Research Institute of South Korea) Operating system and firmware developer Author of the book series
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
HIPAA: Bigger and More Annoying
HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) [email protected] www.laneykay.com OFFICIAL
IT HEALTHCHECK TOP TIPS WHITEPAPER
WHITEPAPER PREPARED BY MTI TECHNOLOGY LTD w: mti.com t: 01483 520200 f: 01483 520222 MTI Technology have been specifying and conducting IT Healthcheck s across numerous sectors including commercial, public
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Medical Device Software
Medical Device Software Bakul Patel Senior Policy Advisor 1 Overview Medical devices and software Oversight principles and Current approach Trends, Challenges and opportunities Addressing challenges 2
Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
Early Evaluation Center
www.winmedical.com Early Evaluation Center Early Evaluation Center - EEC is an intuitive and easy-to-use software for monitoring and evaluating a patient s clinical risk, and can acquire and process source
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
The State-of-the-State of Control System Cyber Security
The State-of-the-State of Control System Cyber Security Prepared for HTCIA September 19, 2012 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] Summary Control systems are
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
Cyber Security nei prodotti di automazione
Cyber Security nei prodotti di automazione Marco Biancardi, ABB SpA, Power System Division 11 dicembre 2013, Roma Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
