Saving changes...

Done

Error

Secure from the Start: Why Medical IoT Needs Protection Now

Secure from the Start: Why Medical IoT Needs Protection Now

Secure from the Start: Why Medical IoT Needs Protection Now

Hussein Syed and Ladi Adefala
Hussein Syed and Ladi Adefala
on behalf of Healthcare Information and Management Systems Society

$30.00 $ 30.00 $ 30.00

$30.00 $ 30.00 $ 30.00

$ 30.00 $ 30.00 $ 30.00
$ 30.00 $ 30.00 $ 30.00
Normal Price: $30.00 $30.00

Review:

Launch date: 15 Jun 2018
Expiry Date:

Last updated: 23 Aug 2018

Reference: 189940

This course is no longer available

Exam is embedded in the course
No preview available
No Exam Available

Latest User Comments

I would like to...

Course Availability

This course is only available to trainees days after purchase. It would need to be repurchased by the trainee if not completed in the allotted time period. This course is no longer available. You will need to repurchase if you wish to take the course again.

Description

Healthcare organizations that don't learn how to operate in the new Digital Age, leveraging sensors and devices that make up Medical IoT, are not likely to survive. Each of these devices generates data that is collected, sorted, analyzed, stored, and examined somewhere - usually in or through the cloud. This data, and the new connected medical devices that create it, are changing how healthcare organizations are run and how clinicians assess, diagnose, treat, and interact with their patients. However, any device that can receive, collect, store or transmit data also has the potential to be compromised. How do healthcare organizations balance the value and risk of Medical IoT? Securely managing Medical IoT requires automated visibility and unified policies for sensors and devices and the data they generate; advanced detection enhanced with real-time threat intelligence; and centralized control that can automatically coordinate response.

Objectives

Recognize the security challenges that Medical IoT is creating for today's healthcare organizations
On completion of this course, the learner will be able to recognize the security challenges that Medical IoT is creating for today's healthcare organizations.
Discuss real-world use cases detailing how cutting-edge healthcare organizations are able to design security into transformational Medical IoT-based applications that begin providing protection from the moment they are launched
On completion of this course, the learner will be able to discuss real-world use cases detailing how cutting-edge healthcare organizations are able to design security into transformational Medical IoT-based applications that begin providing protection from the moment they are launched.
Explain how today's health systems can apply an integrated security strategy to provide the best patient care possible while protecting their most precious asset - human data
On completion of this course, the learner will be able to explain how today's health systems can apply an integrated security strategy to provide the best patient care possible while protecting their most precious asset - human data.
Hussein Syed and Ladi Adefala

Author Information Play Video Bio

Hussein Syed and Ladi Adefala
on behalf of Healthcare Information and Management Systems Society

Hussein Syed is the Chief Information Security Officer at RWJBarnabas Health, New Jersey’s largest integrated health care delivery system, providing treatment and services to more than two million patients each year. At RWJBarnabas Health, Hussein is responsible for information security and the organization’s HIPAA compliance and security governance program. Hussein and his team are responsible for information security functions for the healthcare system. A seasoned Information Technology professional, he has more than 22 years of experience. Hussein is currently the board chair for the Association for Executives in Healthcare Information Security (AEHIS).

Ladi Adefala is a passionate cybersecurity professional with a broad range of expertise that spans multiple security domains including security strategy, solution architectures, SIEMs, IDS/IPS, web security solutions, security assessments, network security, threat management, NAC and security training. Adefala’s background in information technology and security began with stints at Red Hat Consulting, AT&T and World Wide Technology Inc. Adefala has served in a variety of strategic technical and leadership roles that span a variety of disciplines including enterprise network, mobility, data center and advanced cybersecurity solutions. As a FortiGuard cybersecurity expert with Fortinet, Adefala advises and engages clients and executive leaders on solution strategies in a number of industry segments, including financial, healthcare, retail, utilities/energy, and numerous federal and state government agencies. Adefala’s research interests include cyberthreat intelligence and big data analytics. He also serves as adjunct faculty supporting students at Webster University’s Master of Science — Cyber Security Program, where he engages participating students in the domains of critical infrastructure protection, network forensics, and malware analysis and reverse engineering. His credentials include an MBA from Washington University and multiple industry certifications including GIAC exploit researcher and advanced penetration tester, GIAC reverse engineering malware, and GIAC network forensics analyst.

Current Accreditations

This course has been certified by or provided by the following Certified Organization/s:

  • Accreditation Council for Continuing Medical Education (ACCME)
  • 1.00 Credits
  • American Nurses Credentialing Center (ANCC)
  • 1.00 Hours

Faculty and Disclosures

Hussein Syed

Hussein Syed

Has no real or apparent conflicts of interest to report.
Ladi Adefala

Ladi Adefala

Has no real or apparent conflicts of interest to report.

Additional Contributors

Conflicts Declared

Conflicts of Interest declaration by Author:

null

User Reviews (0)

Go Back

Loading...


Saving changes...

Done

Error