SlideShare a Scribd company logo
1 of 41
Download to read offline
SESSION	ID:SESSION	ID:
#RSAC
Daniel	Miessler
Securing	Medical	Devices	Using	Adaptive	Testing	Methodologies
ASD-R10
Director of Advisory Services
IOActive, Inc.
@danielmiessler
SESSION	ID:SESSION	ID:
#RSAC
Daniel	Miessler
Securing	Medical	Devices	Using	Adaptive	Testing	Methodologies
ASD-R10
Director of Advisory Services
IOActive, Inc.
@danielmiessler
#RSAC
About
3
18	years	in	information	security	
Technical	testing	background	(net/web/mobile/IoT)	
Director	of	Advisory	Services	at	IOActive	
Previously	a	founding	member	and	principal	at	HPE	Fortify	on	Demand	
Work	on	a	number	of	OWASP	projects:	IoT	Security,	and	OWASP	Game	
Security	Framework	Project	
Read,	write,	podcast,	table	tennis
#RSAC
Agenda
4
Why	we	care?	
The	problem	
Adaptive	Testing	Methodology	
Practical	takeaways
#RSAC
Why	do	we	care?
#RSAC
6
- J&J	insulin	pump	(Animus	OneTouch	Ping)	
- Jay	Radcliffe,	diabetic	and	researcher		
- Unencrypted	command	traffic	
- Could	send	unauthorized	insulin	injections
Recent	Issues:	Johnson	&	Johnson
Image:	REUTERS	/	Weigmann
#RSAC
7
- St.	Jude	pacemaker	
- Many	vulnerabilities	found		
- PR	+	Shorting	of	stock	
- Vulns	included	wireless	god	key	
- MedSec	found	the	vulns	
- Muddy	Waters	shorted	stock
Recent	Issues:	St.	Jude
#RSAC
8
Hospitals	being	ransomed:	US	Hospitals
Hollywood	Presbyterian	Hospital	
Tried	to	get	help	from	authorities,	ended	up	paying	$17,000	
Methodist	Hospital	
Refused	to	pay,	had	to	shut	down	part	of	the	hospital		
Many,	many	more
#RSAC
9
Hospitals	being	ransomed:	NHS
One	NHS	area	had	to	transfer	patients	because	they	were	shut	down	
34%	of	Health	Trusts	in	the	U.K.	hit	with	ransomware	within	the	last	18	
months	
60%	of	Scottish	trusts	
Other	countries	affected	as	well,	including	Germany
#RSAC
10
Bitcoin	Readiness	(a	depressing	state)
When	ransomware	happens	the	payment	is	usually	in	bitcoin	
Companies	getting	hacked	often	don’t	know	anything	about	bitcoin	
The	time	it	takes	to	learn	about	and	acquire	bitcoin	often	costs	
companies	massive	amounts	of	money		
Many	are	hiring	law	firms	to	acquire	and	hold	bitcoin	for	them	in	case	
they	get	hacked	
I	like	the	preparation	piece,	but	it’s	still	quite	depressing
#RSAC
11
A	Dangerous	Combination
- Home	users	
- Schools	
- Governments	
- Small	businesses
#RSAC
12
A	Dangerous	Combination
- The	medical	space	is	
extremely	vulnerable	to	
these	issues.
#RSAC
The	problem
#RSAC
Recent	Issues
14
-	Lots	of	vulnerabilities	found
#RSAC
A	Disconnect
15
The	attack	surface	for	medical	devices	is	simply	larger	than	the	maturity	
of	standardized	procedures	to	test	those	surface	areas.
0
25
50
75
100
Current	A/ack	Surface Future	A/ack	Surface Tes8ng	Maturity
#RSAC
The	Attack	Surface
16
- Hardware	physical	interfaces	
- Physical	networking	ports	
- Debug	/	admin	ports	
- WiFi	/	RF	
- Data	transfer	and	storage	
- Cryptographic	implementations	
- HL7	implementations	
- Hardware	sensors	
- Input	parsing	/	validation	
- Command	/	data	authentication
#RSAC
Attack	Surface	vs.	Testers
17
- How	many	devices	are	there	already?	
- How	many	have	been	tested?	
- How	many	devices	will	there	be?	
- How	many	testers	will	be	required	to	
look	at	them?
#RSAC
Problem:	Tester	Desensitization
18
- Comprehensive	testing	methodologies	
are	usually	massive	
- Testers	can	usually	only	read	them	once	
or	twice	
- They	can’t	use	them	over	time	
- You	only	get	a	couple	of	strikes	
regarding	irrelevant	content
#RSAC
The	Adaptive	Testing	
Methodology	approach
#RSAC
Adaptive	Testing	Methodology
20
Contextual	testing	based	on	
attributes	of	the	target	or	situation
#RSAC
Adaptive	Testing	Methodology
21
Contextual	testing	based	on	
attributes	of	the	target	or	situation	
Can	apply	to	web	apps,	hosts,	IoT,	
medical	devices,	etc.
#RSAC
Adaptive	Testing	Methodology
22
Contextual	testing	based	on	
attributes	of	the	target	or	situation	
Can	apply	to	web	apps,	hosts,	IoT,	
medical	devices,	etc.	
Attribute	types	(potential)	
Target	attack	surfaces	
Time	available	
Tools	available	
Skill	level	available
#RSAC
23
#RSAC
24
OWASP	IoT:	Medical	Device	Testing
#RSAC
25
#RSAC
Real-world	Usage
26
Third-party	testing	requirements	
Trying	to	avoid	tester	fatigue	from	vendors	
Profile	a	piece	of	hardware	using	Adaptive	Testing		
See	which	surface	areas	are	in	play	
Create	a	customized	testing	methodology	for	that	device/ecosystem	
Reduce	the	size	of	a	testing	methodology	by	50-300%	
Every	section	is	relevant
#RSAC
Lessons	learned	over	the	years
27
Visibility	is	king	in	security	
You	can’t	defend	what	you	can’t	see	and	don’t	understand	
Medical	devices	have	many	unseen	attack	surfaces	
Because	it’s	an	ecosystem,	flaws	in	one	can	lead	to	overall	weakness	
With	vulnerabilities,	1	+	1	+	1	often	equals	7
#RSAC
Takeaways
28
Visibility	is	problem	#1
#RSAC
29
Monolithic	testing	
methodologies	can	lead	to	
tester	fatigue
Takeaways
#RSAC
30
Simple	methodology	is	
consumable,	and	consumable	
methodology	gets	used
Takeaways
#RSAC
31
Simple	methodology	is	
consumable,	and	consumable	
methodology	gets	used
Takeaways
#RSAC
32
Friends	don’t	let	friends	ship	things	without	understanding	the	attack	
surface
Takeaways
#RSAC
33
Friends	don’t	let	friends	buy	things	without	understanding	the	attack	
surface
Takeaways
#RSAC
34
Friends	don’t	let	friends	install	/	implement	things	without	
understanding	the	attack	surface
Takeaways
#RSAC
35
Place	stress	on	approachable	simplicity	for	understanding	attack	
surfaces
Takeaways
#RSAC
36
Modularize	and	streamline	your	testing	methodologies	to	avoid	
them	being	disregarded.
Takeaways
#RSAC
37
Focus	on	breadth	before	depth	when	covering	attack	surfaces.
Takeaways
#RSAC
Resources
38
OWASP	Internet	of	Things

https://www.owasp.org/index.php/
OWASP_Internet_of_Things_Project	
I	Am	The	Cavalry

https://www.iamthecavalry.org
#RSAC
Future	work:	Medical	Security	Scenarios	Project
39
Medical	Security	Scenarios	Project
#RSAC
Future	work:	Medical	Security	Scenarios	Project
40
Medical	Security	Scenarios	Project	
Attack	surface	
Vulnerability	type	
Skill-level	required	
Life-threatening	or	not
#RSAC
Thanks
41
Email:	daniel.miessler@ioactive.com	

												daniel@danielmiessler.com		
Twitter:	@danielmiessler	
Podcast:	Unsupervised	Learning

																danielmiessler.com/ul	
Reach	out	any	time!	Participate.	
We’re	always	hiring	at	IOActive!

More Related Content

What's hot

Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!John Wallix
 
ATAGTR2017 Security Testing for Healthcare applications
ATAGTR2017 Security Testing for Healthcare applicationsATAGTR2017 Security Testing for Healthcare applications
ATAGTR2017 Security Testing for Healthcare applicationsAgile Testing Alliance
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DevicePriyanka Aash
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringAaron Rinehart
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Sqrrl
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
 
Application Security by Ethical Hackers
Application Security by Ethical HackersApplication Security by Ethical Hackers
Application Security by Ethical HackersEntersoft
 
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InHybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InTechWell
 
Defending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowDefending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowLancope, Inc.
 
SplunkLive! London 2016 Operational Security Intelligence
SplunkLive! London 2016 Operational Security IntelligenceSplunkLive! London 2016 Operational Security Intelligence
SplunkLive! London 2016 Operational Security IntelligenceSplunk
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...bugcrowd
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationTripwire
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Zivaro Inc
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooAlex Stamos
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
 

What's hot (20)

Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
 
ATAGTR2017 Security Testing for Healthcare applications
ATAGTR2017 Security Testing for Healthcare applicationsATAGTR2017 Security Testing for Healthcare applications
ATAGTR2017 Security Testing for Healthcare applications
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
 
NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John WhitedNTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John Whited
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
 
Application Security by Ethical Hackers
Application Security by Ethical HackersApplication Security by Ethical Hackers
Application Security by Ethical Hackers
 
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InHybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
 
Defending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowDefending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlow
 
SplunkLive! London 2016 Operational Security Intelligence
SplunkLive! London 2016 Operational Security IntelligenceSplunkLive! London 2016 Operational Security Intelligence
SplunkLive! London 2016 Operational Security Intelligence
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 

Viewers also liked

Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesDaniel Miessler
 
Evolution of The Application
Evolution of The ApplicationEvolution of The Application
Evolution of The ApplicationDaniel Miessler
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Daniel Miessler
 
Gdz ridna mova_pentuluk_2006
Gdz ridna mova_pentuluk_2006Gdz ridna mova_pentuluk_2006
Gdz ridna mova_pentuluk_2006Lucky Alex
 
Configuracion,estilos,secciones
Configuracion,estilos,seccionesConfiguracion,estilos,secciones
Configuracion,estilos,seccionesDAYCIQUISHPE
 
Gdz angliskiy kalinina_2014
Gdz angliskiy kalinina_2014Gdz angliskiy kalinina_2014
Gdz angliskiy kalinina_2014Lucky Alex
 
Citas y organizaciones
Citas y organizacionesCitas y organizaciones
Citas y organizacionesDAYCIQUISHPE
 
Capturas wwe (3)
Capturas wwe (3)Capturas wwe (3)
Capturas wwe (3)Isaacklilop
 
El desarrollo sustentable y los procesos en la informatica
El desarrollo sustentable y los procesos en la informaticaEl desarrollo sustentable y los procesos en la informatica
El desarrollo sustentable y los procesos en la informaticaAdalif Mora
 
Contributing to open source
Contributing to open sourceContributing to open source
Contributing to open sourceDevin Abbott
 
Promoting a Fit and Active Future
Promoting a Fit and Active FuturePromoting a Fit and Active Future
Promoting a Fit and Active FutureLogan Profetto
 
Your Family is not obese yet
Your Family is not obese yetYour Family is not obese yet
Your Family is not obese yetTomas Kennedy
 
PGH-UP College of Medicine Social Media Policy DRAFT
PGH-UP College of Medicine Social Media Policy DRAFT PGH-UP College of Medicine Social Media Policy DRAFT
PGH-UP College of Medicine Social Media Policy DRAFT Iris Thiele Isip-Tan
 
NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...
NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...
NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...selcancinar
 
Health Literacy for Young Scientists
Health Literacy for Young ScientistsHealth Literacy for Young Scientists
Health Literacy for Young ScientistsIris Thiele Isip-Tan
 
RTI against Supreme Court of India dated 05.01.2017
RTI  against Supreme Court of India dated 05.01.2017 RTI  against Supreme Court of India dated 05.01.2017
RTI against Supreme Court of India dated 05.01.2017 Om Prakash Poddar
 
強化学習その2
強化学習その2強化学習その2
強化学習その2nishio
 
全脳アーキテクチャ若手の会 強化学習
全脳アーキテクチャ若手の会 強化学習全脳アーキテクチャ若手の会 強化学習
全脳アーキテクチャ若手の会 強化学習kwp_george
 
対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習
対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習
対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習Takahiro Kubo
 

Viewers also liked (20)

Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap Techniques
 
Evolution of The Application
Evolution of The ApplicationEvolution of The Application
Evolution of The Application
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]
 
Gdz ridna mova_pentuluk_2006
Gdz ridna mova_pentuluk_2006Gdz ridna mova_pentuluk_2006
Gdz ridna mova_pentuluk_2006
 
Configuracion,estilos,secciones
Configuracion,estilos,seccionesConfiguracion,estilos,secciones
Configuracion,estilos,secciones
 
Gdz angliskiy kalinina_2014
Gdz angliskiy kalinina_2014Gdz angliskiy kalinina_2014
Gdz angliskiy kalinina_2014
 
Citas y organizaciones
Citas y organizacionesCitas y organizaciones
Citas y organizaciones
 
Capturas wwe (3)
Capturas wwe (3)Capturas wwe (3)
Capturas wwe (3)
 
El desarrollo sustentable y los procesos en la informatica
El desarrollo sustentable y los procesos en la informaticaEl desarrollo sustentable y los procesos en la informatica
El desarrollo sustentable y los procesos en la informatica
 
Contributing to open source
Contributing to open sourceContributing to open source
Contributing to open source
 
Promoting a Fit and Active Future
Promoting a Fit and Active FuturePromoting a Fit and Active Future
Promoting a Fit and Active Future
 
Your Family is not obese yet
Your Family is not obese yetYour Family is not obese yet
Your Family is not obese yet
 
PGH-UP College of Medicine Social Media Policy DRAFT
PGH-UP College of Medicine Social Media Policy DRAFT PGH-UP College of Medicine Social Media Policy DRAFT
PGH-UP College of Medicine Social Media Policy DRAFT
 
Social Media & Healthcare
Social Media & HealthcareSocial Media & Healthcare
Social Media & Healthcare
 
NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...
NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...
NANOTECHNOLOGY APPLICATIONS AND EMERGING OPPORTUNITIES FOR CLEAN WATER #scich...
 
Health Literacy for Young Scientists
Health Literacy for Young ScientistsHealth Literacy for Young Scientists
Health Literacy for Young Scientists
 
RTI against Supreme Court of India dated 05.01.2017
RTI  against Supreme Court of India dated 05.01.2017 RTI  against Supreme Court of India dated 05.01.2017
RTI against Supreme Court of India dated 05.01.2017
 
強化学習その2
強化学習その2強化学習その2
強化学習その2
 
全脳アーキテクチャ若手の会 強化学習
全脳アーキテクチャ若手の会 強化学習全脳アーキテクチャ若手の会 強化学習
全脳アーキテクチャ若手の会 強化学習
 
対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習
対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習
対話破綻検出チャレンジ2016: NCMを用いた対話と破綻の同時学習
 

Similar to Securing Medical Devices Using Adaptive Testing Methodologies

Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoTJason Hong
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsDaniel Miessler
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesPriyanka Aash
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT securityTony Wilson
 
DevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructuresDevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructuresPriyanka Aash
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedSounil Yu
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
BISS - 11nov2011
BISS - 11nov2011BISS - 11nov2011
BISS - 11nov2011Agora Group
 
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...warezjoe
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 

Similar to Securing Medical Devices Using Adaptive Testing Methodologies (20)

Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoT
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT security
 
DevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructuresDevSecOps - Building continuous security into it and app infrastructures
DevSecOps - Building continuous security into it and app infrastructures
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
BISS - 11nov2011
BISS - 11nov2011BISS - 11nov2011
BISS - 11nov2011
 
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 

More from Daniel Miessler

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security FrameworkDaniel Miessler
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security FrameworkDaniel Miessler
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResilienceDaniel Miessler
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015Daniel Miessler
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingDaniel Miessler
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryDaniel Miessler
 

More from Daniel Miessler (9)

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security Framework
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
 
Peak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to ResiliencePeak Prevention: Moving from Prevention to Resilience
Peak Prevention: Moving from Prevention to Resilience
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change Everything
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Securing Medical Devices Using Adaptive Testing Methodologies