The Dark Side of the Cloud How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=ah4_HjL-dHQ



Duration: 31:54
2 views
0


Black Hat - USA - 2020
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-10Stopping Snake Oil with Smaller Healthcare Providers Addressing Security with Actionable Plans
2022-01-10Room for Escape Scribbling Outside the Lines of Template Security
2022-01-10When TLS Hacks You
2022-01-10Stress Testing Democracy Election Integrity During A Global Pandemic
2022-01-10Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
2022-01-10Routopsy Modern Routing Protocol Vulnerability Analysis and Exploitation
2022-01-10Ruling StarCraft Game Spitefully Exploiting the Blind Spot of AI Powered Game Bots
2022-01-10All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate
2022-01-10Superman Powered by Kryptonite Turn the Adversarial Attack into Your Defense Weapon
2022-01-10Security Research on Mercedes Benz From Hardware to Car Control
2022-01-10The Dark Side of the Cloud How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
2022-01-10An Unauthenticated Journey to Root Pwning Your Company's Enterprise Software Servers
2022-01-10The Devils in the Dependency Data Driven Software Composition Analysis
2022-01-10Mind Games Using Data to Solve for the Human Element Copy
2022-01-10Beyond Root Custom Firmware for Embedded Mobile Chipsets
2022-01-10The Paramedic's Guide to Surviving Cybersecurity
2022-01-10Operation Chimera APT Operation Targets Semiconductor Vendors
2022-01-10Detecting Fake 4G Base Stations in Real Time
2022-01-10TiYunZong Exploit Chain to Remotely Root Modern Android Devices Pwn Android Phones from 2015 2020
2022-01-10OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
2022-01-10Uncommon Sense Detecting Exploits with Novel Hardware Performance Counters and ML Magic



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering