Posted on
in Presentations
Co-presented by a practicing orthopedic trauma surgeon and leading IoT security expert, this unique session will analyze the real-world implications of exploiting connected medical devices. Unlike most healthcare security research, this session incorporates not only lessons from security research, but considers them from the viewpoint of the actual end user: the physician.
Learning Objectives:
1: Learn about the intersection of technical exploits and social engineering.
2: Learn how exploits on medical devices can manipulate physician behavior.
3: Learn how attackers can leverage care workflows to deliver payload.
Learning Objectives:
1: Learn about the intersection of technical exploits and social engineering.
2: Learn how exploits on medical devices can manipulate physician behavior.
3: Learn how attackers can leverage care workflows to deliver payload.
Participants
Dr. Konstantinos Triantafillou
Participant
Orthopaedic Trauma Surgeon and Assistant Professor, University of Tennessee Medical Center
Mobile & IoT Security Hackers & Threats
cyber espionage exploit of vulnerability hackers & threats social engineering biometrics
Topic
Mobile & IoT Security
Hackers & Threats
Subtopic
cyber espionage
exploit of vulnerability
hackers & threats
social engineering
biometrics
Share With Your Community