InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Protecting Healthcare IoT Devices and Networks

Presented by

Mor Ahurvia, Product Marketing Manager, Check Point and Stephan Goldberg, VP of Systems Engineering, Medigate

About this talk

Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 82% of healthcare organizations use IoT, many hospitals and healthcare organizations are exposed. A range of IoT devices are connected to IT and OT networks including IP camera’s, MRI and ultrasound machines and patient monitors. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers. Join the webinar to learn how to prevent healthcare-related IoT cyber attacks by: •Exposing all IoT security risks across the network •Easily creating zero trust policies to secure thousands of IoT devices •Enforcing multi-layered protections at the network and device levels Can't join this session? Please join us for another session on July 20th at 9 am London | 11 am Paris | 4 pm HKT: https://bit.ly/3eDB2AR
Check Point Software

Check Point Software

58763 subscribers421 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics