SlideShare a Scribd company logo
1 of 2
Download to read offline
Urgent/11 Delivers Real-World
Test for Torrance Memorial
S U C C E S S B R I E F
CHALLENGE
Urgent/11 is a unique group of vulnerabilities that allows
attackers to circumvent NAT/security policies and take
remote control of network devices via the TCP/IP stack.
When the threat was announced, reputable healthcare
sources believed that a significant percentage of medical
devices would be impacted.
The Urgent/11 threat was announced shortly after Medigate
was implemented at Torrance Memorial. Torrance Memorial's
IT security and biomed staff had a limited amount of time
using the Medigate platform to guide their remediation efforts
and little collaborative history dealing with the cross-device
complexities presented by URGENT/11.
RESULTS
Torrance Memorial action plans were developed and
prioritized based on potential risk to patients. Potentially
impacted devices were immediately identified. Insights
provided by Medigate included:
• 19% more connected medical devices were
discovered and profiled than estimated;
• 26% more non-medical IoT devices were discovered
and profiled than estimated;
• Consistent with Medigate's claims, device profiles
included make, model, MAC and IP addresses,
serial number, location, status and security posture.
Notably, firmware-level-details, including
configuration-specifics such as OS and application
versions were also provided;
• In addition to Urgent/11 questions, vulnerabilities
across Torrance Memorial's entire connected
inventory were identified and remediation
recommendations were acted upon.
COMPANY
Torrance Memorial
Medical Center
LOCATION
California, United States
SIZE
533 Beds
INDUSTRY
Healthcare
WEBSITE
www.torrancememorial.org
"Without Medigate,
my investigations
would have been
manual, taken
weeks and left me
with little confidence
in the accuracy of
my own findings."
Todd Felker
Information Security Officer
About Medigate
Medigate is the industry's first and leading dedicated
medical device security and asset management
platform, enabling providers to deliver secure, connected
care. Medigate fuses the knowledge and understanding
of medical workflow and device identity and protocols
with the reality of today's cybersecurity threats. With
Medigate, hospital networks can safely operate all
medical devices on their network, enabling deployment
of existing and new devices to patients while ensuring
privacy and safety.
In summary, Torrance Memorial relied on Medigate data to expedite its
inventory risk assessment relative to Urgent/11. While Urgent/11 proved
to be a non-issue for Torrance Memorial, "the point is, we knew," said
Todd Felker, Torrance Memorial's information security officer. "Without
Medigate, my investigations would have been manual, taken weeks and
left me with little confidence in the accuracy of my own findings." Added
Federico Nuno, a Torrance Memorial biomed executive: "We were able to
target our resources and remediation programming knowing exactly what
to look for. In fact, we've since found that Medigate's ability to provide
device location and maintenance state is saving us about 40-man hours
per week."
TAKEAWAY
Torrance Memorial security and biomed leadership gained visibility into
far more devices than it realized were connected to its networks. The
profiling data provided by Medigate was successfully applied when the
Urgent/11 threat became known. Significant time was saved as a result of
what was quickly learned about Urgent/11, allowing Torrance Memorial to
refocus its efforts on the remediation of other known vulnerabilities and
maintenance programming.
About Torrance Memorial Medical Center
Torrance Memorial was the first hospital in the Los
Angeles South Bay region, and is currently one of
just three burn centers in Los Angeles County. In
May 2017, Torrance Memorial formally affiliated with
Cedars-Sinai Medical Center under the new parent
organization, Cedars-Sinai Health System. Torrance
Memorial is a Magnet designated facility recognized
by the American Nurse Credentialing Center (ANCC)
for quality patient care, nursing excellence and
innovations in professional nursing practice.
"Medigate's ability
to provide device
location and
maintenance state
is saving us about
40-man hours per
week."
Federico Nuno
Biomed Executive

More Related Content

What's hot

Collaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare CybersecurityCollaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare CybersecurityDr Dev Kambhampati
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationInfocyte
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatAndrew Case
 
Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Robert Venekamp
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesAli Youssef
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationMedigate
 
World best web apps security and Active detection of malicious link
World best web apps  security and  Active detection of malicious linkWorld best web apps  security and  Active detection of malicious link
World best web apps security and Active detection of malicious link임채호 박사님
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approachIdexcel Technologies
 
Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps Centextech
 

What's hot (11)

Collaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare CybersecurityCollaborative Approaches for Medical Device & Healthcare Cybersecurity
Collaborative Approaches for Medical Device & Healthcare Cybersecurity
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
World best web apps security and Active detection of malicious link
World best web apps  security and  Active detection of malicious linkWorld best web apps  security and  Active detection of malicious link
World best web apps security and Active detection of malicious link
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps 
 

Similar to Urgent/11 Delivers Real-World Test for Torrance Memorial

INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Wannacry or learn?
Wannacry or learn?Wannacry or learn?
Wannacry or learn?dan hyde
 
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESEMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESIJNSA Journal
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
httppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docxhttppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docxadkinspaige22
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...IRJET Journal
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technologyErik R. Ranschaert, MD, PhD
 
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...John D. Haden
 
Wp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-securityWp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-securityAi K
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyNovoQuad
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsSpok
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 

Similar to Urgent/11 Delivers Real-World Test for Torrance Memorial (20)

2014 may iaem bulletin jifx
2014 may iaem bulletin jifx2014 may iaem bulletin jifx
2014 may iaem bulletin jifx
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Wannacry or learn?
Wannacry or learn?Wannacry or learn?
Wannacry or learn?
 
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESEMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
httppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docxhttppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docx
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
Security and ethical issues of mobile device technology
Security and ethical issues of mobile device technologySecurity and ethical issues of mobile device technology
Security and ethical issues of mobile device technology
 
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
 
Wp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-securityWp evolving-threats-endpoint-security
Wp evolving-threats-endpoint-security
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public Safety
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 

More from Medigate

Clinical Device Efficiency - Dynamic Record of Truth
Clinical Device Efficiency - Dynamic Record of TruthClinical Device Efficiency - Dynamic Record of Truth
Clinical Device Efficiency - Dynamic Record of TruthMedigate
 
Vulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksVulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksMedigate
 
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in HealthcareMedigate
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack Medigate
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack Medigate
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableMedigate
 
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformUnlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformMedigate
 
How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical NetworkMedigate
 
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementSimplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementMedigate
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management Medigate
 

More from Medigate (10)

Clinical Device Efficiency - Dynamic Record of Truth
Clinical Device Efficiency - Dynamic Record of TruthClinical Device Efficiency - Dynamic Record of Truth
Clinical Device Efficiency - Dynamic Record of Truth
 
Vulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksVulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise Networks
 
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
 
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformUnlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
 
How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical Network
 
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementSimplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management
 

Recently uploaded

Session-5-Birthing-Practices-Breastfeeding (1).ppt
Session-5-Birthing-Practices-Breastfeeding (1).pptSession-5-Birthing-Practices-Breastfeeding (1).ppt
Session-5-Birthing-Practices-Breastfeeding (1).pptMedidas Medical Center INC
 
Catheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptxCatheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptxAnushriSrivastav
 
VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...
VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...
VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...Model Neeha Mumbai
 
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptxclostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptxMuzammil Ahmed Siddiqui
 
No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...
No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...
No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...Model Neeha Mumbai
 
Antiepileptic-Drugs-and-Congenital-Anomalies copy.pptx
Antiepileptic-Drugs-and-Congenital-Anomalies copy.pptxAntiepileptic-Drugs-and-Congenital-Anomalies copy.pptx
Antiepileptic-Drugs-and-Congenital-Anomalies copy.pptxdrdeepikaj
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024minkseocompany
 
Etiology for RRT and Code Blue Workshop.
Etiology for RRT and Code Blue Workshop.Etiology for RRT and Code Blue Workshop.
Etiology for RRT and Code Blue Workshop.Brian Locke
 
Lactation Mraining Management Session-2-Comm-Building-Conf.ppt
Lactation Mraining Management  Session-2-Comm-Building-Conf.pptLactation Mraining Management  Session-2-Comm-Building-Conf.ppt
Lactation Mraining Management Session-2-Comm-Building-Conf.pptMedidas Medical Center INC
 
Navigating Conflict in PE Using Strengths-Based Approaches
Navigating Conflict in PE Using Strengths-Based ApproachesNavigating Conflict in PE Using Strengths-Based Approaches
Navigating Conflict in PE Using Strengths-Based ApproachesCHICommunications
 
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...jvomprakash
 
I urgently need a love spell caster to bring back my ex. +27834335081 How can...
I urgently need a love spell caster to bring back my ex. +27834335081 How can...I urgently need a love spell caster to bring back my ex. +27834335081 How can...
I urgently need a love spell caster to bring back my ex. +27834335081 How can...BabaJohn3
 
Technology transfer documentation and strategies
Technology transfer documentation and strategiesTechnology transfer documentation and strategies
Technology transfer documentation and strategiesNidhi Joshi
 
INTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptx
INTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptxINTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptx
INTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptxAnushriSrivastav
 
GENETICS and KIDNEY DISEASES /
GENETICS and KIDNEY DISEASES            /GENETICS and KIDNEY DISEASES            /
GENETICS and KIDNEY DISEASES /AFFIFA HUSSAIN
 
Anthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirts
Anthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirts
Anthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirtsrahman018755
 
Tortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdf
Tortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdfTortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdf
Tortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdfDr. Afreen Nasir
 
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...icha27638
 
Session-3-Promoting-Breastfeeding-During-Pregnancy.ppt
Session-3-Promoting-Breastfeeding-During-Pregnancy.pptSession-3-Promoting-Breastfeeding-During-Pregnancy.ppt
Session-3-Promoting-Breastfeeding-During-Pregnancy.pptMedidas Medical Center INC
 

Recently uploaded (20)

Session-5-Birthing-Practices-Breastfeeding (1).ppt
Session-5-Birthing-Practices-Breastfeeding (1).pptSession-5-Birthing-Practices-Breastfeeding (1).ppt
Session-5-Birthing-Practices-Breastfeeding (1).ppt
 
Catheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptxCatheterization Procedure by Anushri Srivastav.pptx
Catheterization Procedure by Anushri Srivastav.pptx
 
VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...
VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...
VIP ℂall Girls Panaji 8250077686 WhatsApp: Me All Time Serviℂe Available Day ...
 
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptxclostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
clostridiumbotulinum- BY Muzammil Ahmed Siddiqui.pptx
 
No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...
No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...
No.1 * Nizamabad ℂall Girls Reshma 👉 Just ℂALL ME: 8250077686 ✅❤️💯low cost un...
 
Antiepileptic-Drugs-and-Congenital-Anomalies copy.pptx
Antiepileptic-Drugs-and-Congenital-Anomalies copy.pptxAntiepileptic-Drugs-and-Congenital-Anomalies copy.pptx
Antiepileptic-Drugs-and-Congenital-Anomalies copy.pptx
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
 
Etiology for RRT and Code Blue Workshop.
Etiology for RRT and Code Blue Workshop.Etiology for RRT and Code Blue Workshop.
Etiology for RRT and Code Blue Workshop.
 
Lactation Mraining Management Session-2-Comm-Building-Conf.ppt
Lactation Mraining Management  Session-2-Comm-Building-Conf.pptLactation Mraining Management  Session-2-Comm-Building-Conf.ppt
Lactation Mraining Management Session-2-Comm-Building-Conf.ppt
 
Navigating Conflict in PE Using Strengths-Based Approaches
Navigating Conflict in PE Using Strengths-Based ApproachesNavigating Conflict in PE Using Strengths-Based Approaches
Navigating Conflict in PE Using Strengths-Based Approaches
 
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...ITM  HOSPITAL The hospital has also been recognised as the best emerging hosp...
ITM HOSPITAL The hospital has also been recognised as the best emerging hosp...
 
I urgently need a love spell caster to bring back my ex. +27834335081 How can...
I urgently need a love spell caster to bring back my ex. +27834335081 How can...I urgently need a love spell caster to bring back my ex. +27834335081 How can...
I urgently need a love spell caster to bring back my ex. +27834335081 How can...
 
Technology transfer documentation and strategies
Technology transfer documentation and strategiesTechnology transfer documentation and strategies
Technology transfer documentation and strategies
 
INTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptx
INTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptxINTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptx
INTERNATIONAL HEALTH AGENCIES BY ANUSHRI SRIVASTAV.pptx
 
GENETICS and KIDNEY DISEASES /
GENETICS and KIDNEY DISEASES            /GENETICS and KIDNEY DISEASES            /
GENETICS and KIDNEY DISEASES /
 
Anthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirts
Anthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirts
Anthony Edwards We Want Dallas T-shirtsAnthony Edwards We Want Dallas T-shirts
 
Tortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdf
Tortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdfTortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdf
Tortora PRINCIPLES OF ANATOMY AND PHYSIOLOGY - Tortora - 14th Ed.pdf
 
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
Obat aborsi Jakarta Timur Wa 081225888346 Jual Obat aborsi Cytotec asli Di Ja...
 
Abortion pills in Abu Dhabi ௵+918133066128௹Un_wandted Pregnancy Kit in Dubai UAE
Abortion pills in Abu Dhabi ௵+918133066128௹Un_wandted Pregnancy Kit in Dubai UAEAbortion pills in Abu Dhabi ௵+918133066128௹Un_wandted Pregnancy Kit in Dubai UAE
Abortion pills in Abu Dhabi ௵+918133066128௹Un_wandted Pregnancy Kit in Dubai UAE
 
Session-3-Promoting-Breastfeeding-During-Pregnancy.ppt
Session-3-Promoting-Breastfeeding-During-Pregnancy.pptSession-3-Promoting-Breastfeeding-During-Pregnancy.ppt
Session-3-Promoting-Breastfeeding-During-Pregnancy.ppt
 

Urgent/11 Delivers Real-World Test for Torrance Memorial

  • 1. Urgent/11 Delivers Real-World Test for Torrance Memorial S U C C E S S B R I E F CHALLENGE Urgent/11 is a unique group of vulnerabilities that allows attackers to circumvent NAT/security policies and take remote control of network devices via the TCP/IP stack. When the threat was announced, reputable healthcare sources believed that a significant percentage of medical devices would be impacted. The Urgent/11 threat was announced shortly after Medigate was implemented at Torrance Memorial. Torrance Memorial's IT security and biomed staff had a limited amount of time using the Medigate platform to guide their remediation efforts and little collaborative history dealing with the cross-device complexities presented by URGENT/11. RESULTS Torrance Memorial action plans were developed and prioritized based on potential risk to patients. Potentially impacted devices were immediately identified. Insights provided by Medigate included: • 19% more connected medical devices were discovered and profiled than estimated; • 26% more non-medical IoT devices were discovered and profiled than estimated; • Consistent with Medigate's claims, device profiles included make, model, MAC and IP addresses, serial number, location, status and security posture. Notably, firmware-level-details, including configuration-specifics such as OS and application versions were also provided; • In addition to Urgent/11 questions, vulnerabilities across Torrance Memorial's entire connected inventory were identified and remediation recommendations were acted upon. COMPANY Torrance Memorial Medical Center LOCATION California, United States SIZE 533 Beds INDUSTRY Healthcare WEBSITE www.torrancememorial.org "Without Medigate, my investigations would have been manual, taken weeks and left me with little confidence in the accuracy of my own findings." Todd Felker Information Security Officer
  • 2. About Medigate Medigate is the industry's first and leading dedicated medical device security and asset management platform, enabling providers to deliver secure, connected care. Medigate fuses the knowledge and understanding of medical workflow and device identity and protocols with the reality of today's cybersecurity threats. With Medigate, hospital networks can safely operate all medical devices on their network, enabling deployment of existing and new devices to patients while ensuring privacy and safety. In summary, Torrance Memorial relied on Medigate data to expedite its inventory risk assessment relative to Urgent/11. While Urgent/11 proved to be a non-issue for Torrance Memorial, "the point is, we knew," said Todd Felker, Torrance Memorial's information security officer. "Without Medigate, my investigations would have been manual, taken weeks and left me with little confidence in the accuracy of my own findings." Added Federico Nuno, a Torrance Memorial biomed executive: "We were able to target our resources and remediation programming knowing exactly what to look for. In fact, we've since found that Medigate's ability to provide device location and maintenance state is saving us about 40-man hours per week." TAKEAWAY Torrance Memorial security and biomed leadership gained visibility into far more devices than it realized were connected to its networks. The profiling data provided by Medigate was successfully applied when the Urgent/11 threat became known. Significant time was saved as a result of what was quickly learned about Urgent/11, allowing Torrance Memorial to refocus its efforts on the remediation of other known vulnerabilities and maintenance programming. About Torrance Memorial Medical Center Torrance Memorial was the first hospital in the Los Angeles South Bay region, and is currently one of just three burn centers in Los Angeles County. In May 2017, Torrance Memorial formally affiliated with Cedars-Sinai Medical Center under the new parent organization, Cedars-Sinai Health System. Torrance Memorial is a Magnet designated facility recognized by the American Nurse Credentialing Center (ANCC) for quality patient care, nursing excellence and innovations in professional nursing practice. "Medigate's ability to provide device location and maintenance state is saving us about 40-man hours per week." Federico Nuno Biomed Executive