YoVDO

Medical Device Cyber Security - The First 164 Years

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Software Vulnerabilities Courses Malware Detection Courses

Course Description

Overview

Explore a comprehensive conference talk on the evolution of medical device cybersecurity over the past 164 years. Delve into topics such as paperless medical records, FDA draft guidance, implantable devices, and pacemakers. Examine trends in software, buffer overflow vulnerabilities, human factors, and user interface issues that have led to patient deaths. Investigate the balance between security and safety in medical devices, hospital architecture, and software updates. Learn about real-world incidents, including the Compounder Virus and Epilepsy Support Group attack. Discover the importance of security life cycles, malware detection, and signal injection in medical devices. Gain insights into the economics of cybersecurity in healthcare and the concept of "medicalized security" to better understand the challenges and future of medical device protection.

Syllabus

Introduction
Paperless Medical Records
FDA Draft Guidance
Implantable Devices
Bakos
Pacemaker
Trends in Software
Buffer Overflow
Human Factors
Deaths
User Interface
bolus duration
Wrong user interface
Safety world
Management
Users are helpless
FDA shared responsibility
Security
Privacy
Hacking pacemakers
Balancing security and safety
Eunos
Hospital Architecture
Google Safe Browsing
Compounder Virus
Software Updates
Do we need to worry about security
Tylenol
Epilepsy Support Group
Security Life Cycle
Virus Spreads
Good News
The Concept Phase
Whats Up Doc
Malware Detection
Signal Injection
Demonstration
Bluetooth Headset
Security Analogy
Pixie Dust Approach
Economics
Cyber Security
Medicalized Security


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube