Securing Internet-Connected Devices in Healthcare: Life Saving Technology

Presented by

Peter Draper, Technical Director - EMEA, Gurucul

About this talk

There are many different types of medical devices such as infusion pumps, CT machines, scanners, bedside devices, and countless others. Many of these devices are utilizing old versions of operating systems, network protocol software and more.  Any medical device connected to the internet is at risk of a cyberattack, and devices that receive and transmit data are the most vulnerable.  Attend this webinar to understand how advanced behavior analytics detects anomalies associated with security risks that can threaten patient safety: - Creates a behavior baseline for all devices, and constantly monitors them for deviations in volume, activity, time, place, actions, etc. - Detects medical device anomalies indicative of unauthorized access, unintended changes and malfunctions before damage occurs - Discovers new medical devices on the hospital network which may not have been formally registered through the IT/security department

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (71)
Subscribers (3562)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.