YoVDO

Hacking Health - Security in Healthcare IT Systems - USENIX Enigma 2016

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses Cybersecurity Courses Cloud Computing Courses Medical Devices Courses Access Control Courses

Course Description

Overview

Explore the unique challenges of healthcare IT security in this 21-minute conference talk from USENIX Enigma 2016. Delve into the complexities of securing medical data and devices in an environment where doctors, regulators, patients, and entrepreneurs all have different priorities and expectations. Learn about the risks associated with cloud-based health data, Internet-connected medical devices, and wearable technology. Discover real-world examples of security breaches, including hacked Fitbits and blood pressure monitors. Examine the dangers inherent in healthcare applications and the importance of proper control, authentication, and access management. Gain insights into potential solutions such as isolation techniques and specialized cloud providers. Understand why healthcare IT security requires a unique approach compared to other industries.

Syllabus

Intro
My first security evaluation
The IT Tour
Security Breaches
Xray Disks
Medical Devices
Security in Healthcare
Unique to Healthcare
Healthcare Applications
Control by Software
Hacking a Fitbit
Hacking a Blood Pressure Monitor
Healthcare is dangerous
Medical Device
Backend Systems
Profiling
Isolation
Cloud Providers
Control Access
Authentication
Conclusion


Taught by

USENIX Enigma Conference

Related Courses

Adventures in Authentication and Authorization
USENIX Enigma Conference via YouTube
Navigating the Sandbox Buffet
USENIX Enigma Conference via YouTube
Meaningful Hardware Privacy for a Smart and Augmented Future
USENIX Enigma Conference via YouTube
Working on the Frontlines - Privacy and Security with Vulnerable Populations
USENIX Enigma Conference via YouTube
Myths and Lies in InfoSec
USENIX Enigma Conference via YouTube