![]() Security and privacy professionals from numerous healthcare organizations, government agencies, and medical device manufacturers are around, and most importantly, are completely approachable. You can also learn a lot from many of the security professionals that attend. If you want to learn how and why people configure what they have to meet their needs, this is the place to learn it. Having thousands of people, including the creators of the YouTube videos that many of them watch in once place gives an excellent opportunity to learn more about how security really works. This also gives an excellent view into how security can either be an assistance or an impediment, and whether controls we put in place are effective or not. We need to understand how these devices are used in the real world, and take that information back to improve how we deliver services. I consider talking with highly skilled people who know how to work past limitations to perceptively improve their quality of life to be part of what we should be doing. There is often also a gap between our perception of device usage and security, and the patient’s view. Many of them do not feel that technology solutions provided meet their needs, and will modify what they use to do so. There are a lot of people out there who learn about the devices they have by searching on the Internet, watching YouTube videos, and collaborating with others. One of the blind spots that we all have is the point of view of the populations that we serve. Environmental systems also play a significant part. This exhibit showed the complexity of supporting a patient environment, and that the scope of systems that support them is a lot more than just the devices we see. It showed how much work we have to do to address the inherent risks already present in our own facilities. This demonstration showed all of the electronics, networking, and telemetry present in a patient’s room. The most comprehensive and eye-opening exhibit was from the Nebraska Applied Research Institute, which demonstrated their Operational Technology Incident Simulator. Researchers and security executives from multiple medical device manufacturers were present. ![]() The Biohacking Village, which specialized in medical devices and healthcare, had live demonstrations and exhibits, actual medical devices for people to hack, and presentations and panels from a number of people in the industry. The village encompass live demonstrations, exhibits, specialized talks, and the ability to experiment with and hack on hardware and software along with others, including prominent security researchers. This conference is open to whoever can pay the $300 cash to attend.ĭEFCON is organized into a number of talks/presentations/demonstrations and villages. Additionally, the presentations and materials are heavily vetted. This is considered the conference you should go to if you want to know how security works. A number of healthcare IT and security professionals also attend. Some of the best security minds in the world present at this conference. It is considered to be the premier security conference in terms of content and technical acuity of the attendees. ![]() It occurs annually in Las Vegas and over 30,000 people attend it and several other concurrent security conferences, including Black Hat, BSides Las Vegas, and Diana Initiative. DEFCON is known as a hackers conference, so we wanted to share a healthcare CISO perspective on the event.ĭEFCON is the largest pure hacking and security conference in the US. We asked Mitch to share some insights and perspectives on the DEFCON conference that just happened in Las Vegas. ![]() The following is a guest write up by Mitchell Parker, MBA, CISSP ( and Executive Director, Information Security & Compliance at Indiana University Health. 10:30 - 11:30: The Hybrid Strategies of Autocratic States: Narrative Characteristics of Disinformation Campaigns in Relation To Issues of a Scientific-Health Nature - Workshop with Carlos Galán ġ1:30 - 13:30: Academic Integration (Lightning Talks)Įxamining the Urgency of Gendered Health Misinformation Online Through Three Case Studies - Jenna Sherman (Meedan). ![]()
0 Comments
Leave a Reply. |