ZingBox
SPONSORED
The cyberthreat landscape for the healthcare industry continues to evolve with clear evidence that securing connected medical devices require a different approach to that of IT devices. Through year-long research, Zingbox analyzed the underlying vulnerabilities of connected medical devices, identified the particular type of medical devices requiring attention, and the security implications of IoT devices as a whole to the healthcare community. The research also found promising trends in how care providers are improving the security of their network. Join us as we provide the details of our findings.
SPONSORED
Quality & Safety
As WannaCry and NotPetya have demonstrated, connected medical devices in operation today were not designed with security in mind. In fact, many were not initially designed to be networked and certainly not exposed to the Internet. EMR and other initiatives have accelerated the need to network medical devices at the risk of security exposure. With traditional IT security solutions unable to secure connected medical devices, there are no easy answers to address the risk to the millions of devices currently in operation.
Dr. Maia Hightower, CMIO of Iowa University Health Care and Dr. May Wang, CTO of ZingBox will review the approach many organizations are taking to safeguard their network of connected medical devices and advancements that can be expected in the future.
Join this presentation to learn:
How and why hackers are aiming to disrupt healthcare services
Review real world scenarios and their significant impact to the healthcare organization
Tools and processes healthcare organizations should focus on for the future
SPONSORED
Connected medical devices present a challenging problem for security professionals in healthcare organizations. Such devices are typically not well protected and are now under near-constant cyber-attacks. This webinar presented by Mayuresh Ektare, VP of Product Management at ZingBox, will reveal the challenges in securing medical endpoints and discuss the steps security professionals can take to avoid being victims of cyber threats and significantly reduce their risk exposure.