You have added as attendee for it.
We will contact you soon.
- devices on the market, still not patched against known attacks
- devices that store personal medical information and sync it insecurely to the cloud
- devices that silently broadcast video feeds, share network access, or allow cyber-espionage
Part 2 presents best practices, using Securolytics products and features. Automate checks and logs, detect new devices, and secure ports individually.
Part 3 showcases Securolytics services to support responsible IT management and give you peace of mind regarding your information security.
This webinar presents free training on enterprise security for medical devices on the internet of things.
Part 1 presents examples of security problems with medical devices, such as