10 Properties of  
  Secure Medical Systems

2020 was the fourth consecutive year to break records in the number of recorded security flaws in embedded systems (US-CERT Vulnerability Database). Securing medical systems has never been more imperative – or more challenging.

Join Mike Mehlberg for a discussion of the current threat landscape as well as the security principles that can achieve a multiplicative effect in helping your organization protect medical systems. View the entire session above, or pick and choose the sections you’re most interested in below.

Mike Mehlberg

   Choose Your Chapters   

play Modern Threat Landscape

Modern Threat Landscape

play Properties 1-4

1–4: Data at Rest, Secure Boot, Attack Surface, Partitioning

play Properties 5-8

5–8: Implicit Distrust, MAC, Data Validation, OS Validation

play Properties 9-10

9–10: Containerization & Monitoring

play QA

3 Key Questions Answered