SlideShare a Scribd company logo
HACKING A BLUETOOTH-ENABLED
MEDICAL DEVICE IS TOO EASY
Mike Kijewski
mike@medcrypt.co
PREDICTION: >50% OF MEDICAL DEVICES
WILL BE INTERNET-ENABLED BY 2030
HEALTHCARE IS MOVING TO THE HOME
WE ONLY GET PAID IF DEVICES ARE WORKING
THERES AN INTERNET GATEWAY
IN YOUR POCKET
WE HACKED A DEVICE
WE’RE NOT A HEDGE FUND
Basestation Cloud AppMeasurement
Device
COMMON AMBULATORY DEVICE ARCHITECTURE
#
Mobile App
BTLE WiFi
Basestation
Cloud AppMeasurement
Device
# Mobile App
BTLE WiFi
Measurement device packages data,
broadcasts over BTLE V4.0
COMMON AMBULATORY DEVICE ARCHITECTURE
Basestation
Cloud AppMeasurement
Device
# Mobile App
BTLE WiFi
COMMON AMBULATORY DEVICE ARCHITECTURE
Basestation sees advertised data,
interprets measurement, sends to cloud
app.
Basestation
Cloud AppMeasurement
Device
# Mobile App
BTLE WiFi
COMMON AMBULATORY DEVICE ARCHITECTURE
Measurement is shown to user via mobile app.
Basestation Cloud AppMeasurement
Device
#
Mobile App
BTLE WiFi
Various BTLE
vulnerabilities Lack of encryption /
TLS / data signing
COMMON AMBULATORY DEVICE ARCHITECTURE
#
Basestation
Cloud AppMeasurement
Device
# Mobile App
BTLE WiFi
BTLE
Raspberry Pi Raspberry Pi
Measurement
Device
Basestation
ANONYMIZED EXAMPLE HACK
ANONYMIZED EXAMPLE HACK
BTLE
Raspberry Pi Raspberry Pi
Measurement
Device
Basestation
Raspberry Pi
Hacker
DEMO
TECHNICAL REASONS FOR VULNERABILITY
•Bluetooth advertising, not pairing
•Data being sent in plain text
•Bluetooth V4.0 is inherently insecure (key exchange
vulnerability)
•No signing of data
TECHNICAL FIXES
•Use BTLE V4.2 Bonding
•Assign unique public/private keys to monitors, basestations
•Encrypt data on monitor before transmit
•Cryptographically sign data on monitor before transmit
•Check data signature at basestation before reporting to cloud
app
ORGANIZATIONAL REASONS FOR VULNERABILITY
• Research project becomes prototype, becomes MVP, becomes V1
• Infinite number of feature requests, finite number of engineers
• Need to launch by CES / RSNA / HIMSS / etc.
• “Why would anyone actually want to hack this?”
“Not a big deal because it would require
physical proximity.”
Security is not a distraction from your
business; it’s imperative for the success of
your business.
Takeaway #1
If your device connects to a network, you’re
an internet company.
Takeaway #2
Things Internet Companies Do
• Deliver product continuously
• Only build what isn’t available as Open Source
• Scour internet for known vulnerabilities
• Pay hackers via “bug bounties”
Takeaway #3:
DOESN’T CARE ABOUT
CERTIFICATIONS
HOW WE’RE ADDRESSING THIS
•Security software gets “baked in” your device’s software
•Secure communications, instructions between devices
•Monitor device behavior for suspicious behavior
•Features designed specifically to meet FDA guidelines
Final Thought:
“Has this ever actually happened?”
Questions?
mike@medcrypt.co

More Related Content

What's hot

Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Zscaler
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
Zscaler
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
Zscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
Zscaler
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
Zscaler
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
Zscaler
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
Zscaler
 
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the TrenchesMobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
Yair Amit
 
Canopy SF Home Automation Meetup Slides 10/14/2014
Canopy SF Home Automation Meetup Slides 10/14/2014Canopy SF Home Automation Meetup Slides 10/14/2014
Canopy SF Home Automation Meetup Slides 10/14/2014
gregulator
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
Cambridge Intelligence
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
Zscaler
 
Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!
Memoori
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
Zscaler
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
Zscaler
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
Zscaler
 
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths BustedBeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
Ivan Dwyer
 
Intro to AWS IoT - Pop-up Loft London
Intro to AWS IoT - Pop-up Loft LondonIntro to AWS IoT - Pop-up Loft London
Intro to AWS IoT - Pop-up Loft London
Boaz Ziniman
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
Zscaler
 

What's hot (20)

Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the TrenchesMobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
 
Canopy SF Home Automation Meetup Slides 10/14/2014
Canopy SF Home Automation Meetup Slides 10/14/2014Canopy SF Home Automation Meetup Slides 10/14/2014
Canopy SF Home Automation Meetup Slides 10/14/2014
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths BustedBeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
 
Intro to AWS IoT - Pop-up Loft London
Intro to AWS IoT - Pop-up Loft LondonIntro to AWS IoT - Pop-up Loft London
Intro to AWS IoT - Pop-up Loft London
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 

Similar to Hacking A Bluetooth-Enabled Medical Device Is Too Easy

iBeacon security overview
iBeacon security overviewiBeacon security overview
iBeacon security overview
Localz
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeacons
Janusz Chudzynski
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
Winston Morton
 
How ZipKey improves Wi-Fi Products
How ZipKey improves Wi-Fi ProductsHow ZipKey improves Wi-Fi Products
How ZipKey improves Wi-Fi Products
Cirrent
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Duo Security
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
Bernard Kufluk
 
pptt.pptx
pptt.pptxpptt.pptx
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
Bernard Kufluk
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
WSO2
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
Icomm Technologies
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
WSO2
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
voversbyobersby
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
Pete Wassell
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
Jay Nagar
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
ProductNation/iSPIRT
 
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
AirTight Networks
 

Similar to Hacking A Bluetooth-Enabled Medical Device Is Too Easy (20)

iBeacon security overview
iBeacon security overviewiBeacon security overview
iBeacon security overview
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeacons
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
How ZipKey improves Wi-Fi Products
How ZipKey improves Wi-Fi ProductsHow ZipKey improves Wi-Fi Products
How ZipKey improves Wi-Fi Products
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
 

More from IFAH

M Health – A Revolution
M Health – A RevolutionM Health – A Revolution
M Health – A Revolution
IFAH
 
Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...
Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...
Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...
IFAH
 
Blockchain Technology In Healthcare As A Trustworthy Solution For IoT
Blockchain Technology In Healthcare As A Trustworthy Solution For IoTBlockchain Technology In Healthcare As A Trustworthy Solution For IoT
Blockchain Technology In Healthcare As A Trustworthy Solution For IoT
IFAH
 
Shaping the Business of Wellness & Healthcare
Shaping the Business of Wellness & HealthcareShaping the Business of Wellness & Healthcare
Shaping the Business of Wellness & Healthcare
IFAH
 
Work & Life In The Age Of AI & Robots
Work & Life In The Age Of AI & RobotsWork & Life In The Age Of AI & Robots
Work & Life In The Age Of AI & Robots
IFAH
 
The Role Of Data and Emergent Technologies In Managing Health
The Role Of Data and Emergent Technologies In Managing Health The Role Of Data and Emergent Technologies In Managing Health
The Role Of Data and Emergent Technologies In Managing Health
IFAH
 
Pharmacovigilance Inspections
Pharmacovigilance InspectionsPharmacovigilance Inspections
Pharmacovigilance Inspections
IFAH
 
Sir Ganga Ram Hospital Model: A Different Model for Healthcare Delivery
Sir Ganga Ram Hospital Model: A Different Model for Healthcare DeliverySir Ganga Ram Hospital Model: A Different Model for Healthcare Delivery
Sir Ganga Ram Hospital Model: A Different Model for Healthcare Delivery
IFAH
 
Reversing Diabetes and Lifestyle Disorders
Reversing Diabetes and Lifestyle DisordersReversing Diabetes and Lifestyle Disorders
Reversing Diabetes and Lifestyle Disorders
IFAH
 
DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...
DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...
DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...
IFAH
 
Innovative Approaches To Service For Patients In Pharma Sector
Innovative Approaches To Service For Patients In Pharma SectorInnovative Approaches To Service For Patients In Pharma Sector
Innovative Approaches To Service For Patients In Pharma Sector
IFAH
 
Digital Nutrition
Digital NutritionDigital Nutrition
Digital Nutrition
IFAH
 
Evolution Of Traditional Medical Devices Industry
Evolution Of Traditional Medical Devices IndustryEvolution Of Traditional Medical Devices Industry
Evolution Of Traditional Medical Devices Industry
IFAH
 
Is Pharma Drug Pricing Being Disrupted?
Is Pharma Drug Pricing Being Disrupted?Is Pharma Drug Pricing Being Disrupted?
Is Pharma Drug Pricing Being Disrupted?
IFAH
 
Advanced Cardiology Treatment
Advanced Cardiology TreatmentAdvanced Cardiology Treatment
Advanced Cardiology Treatment
IFAH
 
Integrative Healthcare
Integrative HealthcareIntegrative Healthcare
Integrative Healthcare
IFAH
 
Invisible But Indispensable: Caregivers In An Aging World
Invisible But Indispensable: Caregivers In An Aging WorldInvisible But Indispensable: Caregivers In An Aging World
Invisible But Indispensable: Caregivers In An Aging World
IFAH
 
Population Health Management & Volume To Value Based Care
Population Health Management & Volume To Value Based CarePopulation Health Management & Volume To Value Based Care
Population Health Management & Volume To Value Based Care
IFAH
 
Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...
Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...
Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...
IFAH
 
Accounting & Financial Reporting In Healthcare Institutions
Accounting & Financial Reporting In Healthcare InstitutionsAccounting & Financial Reporting In Healthcare Institutions
Accounting & Financial Reporting In Healthcare Institutions
IFAH
 

More from IFAH (20)

M Health – A Revolution
M Health – A RevolutionM Health – A Revolution
M Health – A Revolution
 
Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...
Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...
Meaningful Access To Healthcare - The Good, The Bad - The Future of Healthcar...
 
Blockchain Technology In Healthcare As A Trustworthy Solution For IoT
Blockchain Technology In Healthcare As A Trustworthy Solution For IoTBlockchain Technology In Healthcare As A Trustworthy Solution For IoT
Blockchain Technology In Healthcare As A Trustworthy Solution For IoT
 
Shaping the Business of Wellness & Healthcare
Shaping the Business of Wellness & HealthcareShaping the Business of Wellness & Healthcare
Shaping the Business of Wellness & Healthcare
 
Work & Life In The Age Of AI & Robots
Work & Life In The Age Of AI & RobotsWork & Life In The Age Of AI & Robots
Work & Life In The Age Of AI & Robots
 
The Role Of Data and Emergent Technologies In Managing Health
The Role Of Data and Emergent Technologies In Managing Health The Role Of Data and Emergent Technologies In Managing Health
The Role Of Data and Emergent Technologies In Managing Health
 
Pharmacovigilance Inspections
Pharmacovigilance InspectionsPharmacovigilance Inspections
Pharmacovigilance Inspections
 
Sir Ganga Ram Hospital Model: A Different Model for Healthcare Delivery
Sir Ganga Ram Hospital Model: A Different Model for Healthcare DeliverySir Ganga Ram Hospital Model: A Different Model for Healthcare Delivery
Sir Ganga Ram Hospital Model: A Different Model for Healthcare Delivery
 
Reversing Diabetes and Lifestyle Disorders
Reversing Diabetes and Lifestyle DisordersReversing Diabetes and Lifestyle Disorders
Reversing Diabetes and Lifestyle Disorders
 
DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...
DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...
DESTINY – An Innovative Platform for Personalized Medicine from Doctors for D...
 
Innovative Approaches To Service For Patients In Pharma Sector
Innovative Approaches To Service For Patients In Pharma SectorInnovative Approaches To Service For Patients In Pharma Sector
Innovative Approaches To Service For Patients In Pharma Sector
 
Digital Nutrition
Digital NutritionDigital Nutrition
Digital Nutrition
 
Evolution Of Traditional Medical Devices Industry
Evolution Of Traditional Medical Devices IndustryEvolution Of Traditional Medical Devices Industry
Evolution Of Traditional Medical Devices Industry
 
Is Pharma Drug Pricing Being Disrupted?
Is Pharma Drug Pricing Being Disrupted?Is Pharma Drug Pricing Being Disrupted?
Is Pharma Drug Pricing Being Disrupted?
 
Advanced Cardiology Treatment
Advanced Cardiology TreatmentAdvanced Cardiology Treatment
Advanced Cardiology Treatment
 
Integrative Healthcare
Integrative HealthcareIntegrative Healthcare
Integrative Healthcare
 
Invisible But Indispensable: Caregivers In An Aging World
Invisible But Indispensable: Caregivers In An Aging WorldInvisible But Indispensable: Caregivers In An Aging World
Invisible But Indispensable: Caregivers In An Aging World
 
Population Health Management & Volume To Value Based Care
Population Health Management & Volume To Value Based CarePopulation Health Management & Volume To Value Based Care
Population Health Management & Volume To Value Based Care
 
Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...
Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...
Photobiomodulation, Biophysics and Energy Medicine Technology: The Science an...
 
Accounting & Financial Reporting In Healthcare Institutions
Accounting & Financial Reporting In Healthcare InstitutionsAccounting & Financial Reporting In Healthcare Institutions
Accounting & Financial Reporting In Healthcare Institutions
 

Recently uploaded

FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
aditigupta1117
 
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
PsychoTech Services
 
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
xkute
 
muscluskeletal assessment...........pptx
muscluskeletal assessment...........pptxmuscluskeletal assessment...........pptx
muscluskeletal assessment...........pptx
RushikeshHange1
 
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and EngagementPrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx Program
 
National Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptxNational Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptx
Jyoti Chand
 
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DR Jag Mohan Prajapati
 
Sectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptxSectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptx
SatvikaPrasad
 
Mental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdfMental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdf
shindesupriya013
 
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
gjsma0ep
 
geriatric changes in endocrine system.pdf
geriatric changes in endocrine system.pdfgeriatric changes in endocrine system.pdf
geriatric changes in endocrine system.pdf
Yes No
 
nurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdfnurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdf
Carolyn Harker
 
Hypotension and role of physiotherapy in it
Hypotension and role of physiotherapy in itHypotension and role of physiotherapy in it
Hypotension and role of physiotherapy in it
Vishal kr Thakur
 
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPTNURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
blessyjannu21
 
GIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure andGIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure and
MuzafarBohio
 
Innovative Minds France's Most Impactful Healthcare Leaders.pdf
Innovative Minds France's Most Impactful Healthcare Leaders.pdfInnovative Minds France's Most Impactful Healthcare Leaders.pdf
Innovative Minds France's Most Impactful Healthcare Leaders.pdf
eurohealthleaders
 
English Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptxEnglish Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptx
MatSouthwell1
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
40fortunate
 
Friendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa AjmanFriendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa Ajman
Malayali Kerala Spa Ajman
 
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdfVEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
Vedanta A
 

Recently uploaded (20)

FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
 
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
 
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
 
muscluskeletal assessment...........pptx
muscluskeletal assessment...........pptxmuscluskeletal assessment...........pptx
muscluskeletal assessment...........pptx
 
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and EngagementPrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and Engagement
 
National Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptxNational Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptx
 
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
 
Sectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptxSectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptx
 
Mental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdfMental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdf
 
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
 
geriatric changes in endocrine system.pdf
geriatric changes in endocrine system.pdfgeriatric changes in endocrine system.pdf
geriatric changes in endocrine system.pdf
 
nurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdfnurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdf
 
Hypotension and role of physiotherapy in it
Hypotension and role of physiotherapy in itHypotension and role of physiotherapy in it
Hypotension and role of physiotherapy in it
 
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPTNURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
 
GIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure andGIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure and
 
Innovative Minds France's Most Impactful Healthcare Leaders.pdf
Innovative Minds France's Most Impactful Healthcare Leaders.pdfInnovative Minds France's Most Impactful Healthcare Leaders.pdf
Innovative Minds France's Most Impactful Healthcare Leaders.pdf
 
English Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptxEnglish Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptx
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Friendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa AjmanFriendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa Ajman
 
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdfVEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
 

Hacking A Bluetooth-Enabled Medical Device Is Too Easy