Training

Healthcare , Industry Specific , Internet of Things Security

Medical Devices: Treat Them Like Untrusted End-User Devices

Medical Devices: Treat Them Like Untrusted End-User Devices

Protecting end-user devices is an essential part of any information security strategy. But many healthcare organizations have literally thousands of medical devices - from infusion pumps to heart monitors - used in patient treatment that can be vulnerable, opening the door to a broader cyberattack. In this session, one of the nation's leading medical device security experts will offer practical risk management advice as well as insights on when to take action based on alerts from third-party researchers, vendors or federal regulators.

See Also: 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.