Skip to main content

DefCon 19: I'm not a doctor, but I play one on your network

November 29, 2011

Have you ever been to the doctor and wondered where all the information gathered from you gets stored, or whom they share that data with?

Earlier this year, Tim Elrod and Stefan Morris of FishNet Security’s Security Assessments Team spoke at the DEFCON security conference in Las Vegas on this very subject. In this talk, Tim and Stefan discuss common healthcare protocols as well as ways to discover vulnerabilities in these protocols and what that might mean to a healthcare environment. They also discuss vulnerabilities they have discovered in products — from personal health record systems to prescription drug dispensing cabinets used by hospitals.

You can view the embedded video below.

Related Blogs

December 19, 2013

WiFi Management Tools Help Ensure WLAN Health

For many organizations, the wireless local area network (WLAN) has changed from an optional item to a mission-critical service. Customers and employee...

See Details

August 13, 2014

What Does a Risk Assessment Do For Your Organization?

The purpose of a risk assessment is two-fold: to identify the threats that an organization faces and to help determine how to best prioritize resource...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Related Insights

July 21, 2015

Data Security Solutions

Learn how we can help secure your date throughout its lifecycle.

See Details

July 21, 2015

Network Security Solutions

Learn how we help protect your environment while maintaining connectivity.

See Details

July 21, 2015

Application Security Solutions

Learn how Optiv can help with web, email and application protection.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.