What Hijacked Robots Tell Us About IoT Risks in Healthcare

Logo
Presented by

Chad Holmes, Asher Brass, Daniel Brody

About this talk

On April 12th a set of five vulnerabilities impacting Aethon TUG healthcare robots were disclosed by Cynerio. These vulnerabilities allowed researchers to remotely execute a wide range of attacks including accessing restricted areas, controlling elevators, interacting with patients, dispensing incorrect medications, and many more. This session will provide a deep dive into the findings, discuss how healthcare organizations can protect against them, and cover proactive steps to protect against similar findings in the future. We will also discuss the broader trends related to IoT adoption in healthcare and how organizations are balancing the associated risks and benefits of modern technologies.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (12)
Subscribers (491)
Healthcare is Cynerio's only business and our mission is simple: protect healthcare's weakest link to ensure patient safety, data confidentiality, and service availability. Our full-suite Healthcare IoT cybersecurity platform automates end-to-end, continuous asset discovery for every connected medical, IoT device, and OT system in the clinical ecosystem. We view cybersecurity as a standard part of patient care and cover every threat vector with proactive and preemptive attack prevention tools, automated risk reduction, threat mitigation, and step-by-step remediation programs built on the NIST Zero Trust framework to get healthcare facilities secure fast.